Search dblp for Publications

export results for "toc:db/conf/ccc2/ccc2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccc2/Al-ZewairiSS16,
  author       = {Malek Al{-}Zewairi and
                  Dima Suleiman and
                  Adnan Shaout},
  title        = {Multilevel Fuzzy Inference System for Risk Adaptive Hybrid {RFID}
                  Access Control System},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.9},
  doi          = {10.1109/CCC.2016.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/Al-ZewairiSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AlhanahnahC16,
  author       = {Mohannad Alhanahnah and
                  David W. Chadwick},
  title        = {Boosting Usability for Protecting Online Banking Applications Against
                  APTs},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {70--76},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.13},
  doi          = {10.1109/CCC.2016.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/AlhanahnahC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AlqatawnaHAK16,
  author       = {Ja'far Alqatawna and
                  Ali Hadi and
                  Malek Al{-}Zewairi and
                  Mariam Khader},
  title        = {A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {65--69},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.16},
  doi          = {10.1109/CCC.2016.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/AlqatawnaHAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AlshammaryH16,
  author       = {Esra'a Alshammary and
                  Ali Hadi},
  title        = {Reviewing and Evaluating Existing File Carving Techniques for {JPEG}
                  Files},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {55--59},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.21},
  doi          = {10.1109/CCC.2016.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/AlshammaryH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AlsmadiA16,
  author       = {Izzat Alsmadi and
                  Iyad Alazzam},
  title        = {Websites' Input Validation and Input-Misuse-Based Attacks},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {113--116},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.31},
  doi          = {10.1109/CCC.2016.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/AlsmadiA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AlswitiAAFH16,
  author       = {Wedyan Alswiti and
                  Ja'far Alqatawna and
                  Bashar Al{-}Shboul and
                  Hossam Faris and
                  Heba Hakh},
  title        = {Users Profiling Using Clickstream Data Analysis and Classification},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {96--99},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.27},
  doi          = {10.1109/CCC.2016.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/AlswitiAAFH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AssmuthCKRMVSFW16,
  author       = {Andreas Assmuth and
                  Paul Cockshott and
                  Jana Kipke and
                  Karen Renaud and
                  Lewis Mackenzie and
                  Wim Vanderbauwhede and
                  Matthias S{\"{o}}llner and
                  Tilo Fischer and
                  George R. S. Weir},
  title        = {Improving Resilience by Deploying Permuted Code onto Physically Unclonable
                  Unique Processors},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {144--150},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.30},
  doi          = {10.1109/CCC.2016.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/AssmuthCKRMVSFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/Babatunde16,
  author       = {John Oluwole Babatunde},
  title        = {Experimental and Analytical Evaluation of the Impact of Security Compliance
                  on System Performance of Web Applications},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {130--136},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.19},
  doi          = {10.1109/CCC.2016.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/Babatunde16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/BarakatH16,
  author       = {Akram Barakat and
                  Ali Hadi},
  title        = {Windows Forensic Investigations Using PowerForensics Tool},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {41--47},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.18},
  doi          = {10.1109/CCC.2016.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/BarakatH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/BenchikhaKZB16,
  author       = {Nadia Benchikha and
                  Mohamed Krim and
                  Khaled Zeraoulia and
                  Chafika Benzaid},
  title        = {IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {35--40},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.23},
  doi          = {10.1109/CCC.2016.23},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/BenchikhaKZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/DrooganW16,
  author       = {Julian Droogan and
                  Lise Waldek},
  title        = {Where are All the Cyber Terrorists? From Waiting for Cyber Attack
                  to Understanding Audiences},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {100--106},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.20},
  doi          = {10.1109/CCC.2016.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/DrooganW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/Ghatasheh16,
  author       = {Nazeeh Ghatasheh},
  title        = {Fraud Prevention Framework for Electronic Business Environments: Automatic
                  Segregation of Online Phishing Attempts},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {89--95},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.17},
  doi          = {10.1109/CCC.2016.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/Ghatasheh16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/HalasehA16,
  author       = {Rola Al Halaseh and
                  Ja'far Alqatawna},
  title        = {Analyzing CyberCrimes Strategies: The Case of Phishing Attack},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {82--88},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.25},
  doi          = {10.1109/CCC.2016.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/HalasehA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/IsmailII16,
  author       = {Umar Mukhtar Ismail and
                  Syed Islam and
                  Shareeful Islam},
  title        = {Towards Cloud Security Monitoring: {A} Case Study},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {8--14},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.8},
  doi          = {10.1109/CCC.2016.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/IsmailII16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/IzkiW16,
  author       = {Fathiya Al Izki and
                  George R. S. Weir},
  title        = {Management Attitudes toward Information Security in Omani Public Sector
                  Organisations},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {107--112},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.28},
  doi          = {10.1109/CCC.2016.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/IzkiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/KhaderHH16,
  author       = {Mariam Khader and
                  Ali Hadi and
                  Amjad Hudaib},
  title        = {Covert Communication Using Port Knocking},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {22--27},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.12},
  doi          = {10.1109/CCC.2016.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/KhaderHH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/Moore16,
  author       = {Chris Moore},
  title        = {Detecting Ransomware with Honeypot Techniques},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {77--81},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.14},
  doi          = {10.1109/CCC.2016.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/Moore16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/QbeahAS16,
  author       = {Mohammad Qbea'h and
                  Mohammad Aref Alshraideh and
                  Khair Eddin Sabri},
  title        = {Detecting and Preventing {SQL} Injection Attacks: {A} Formal Approach},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {123--129},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.26},
  doi          = {10.1109/CCC.2016.26},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/QbeahAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/RenaudW16,
  author       = {Karen Renaud and
                  George R. S. Weir},
  title        = {Cybersecurity and the Unbearability of Uncertainty},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {137--143},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.29},
  doi          = {10.1109/CCC.2016.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/RenaudW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/SaadehSQA16,
  author       = {Maha Saadeh and
                  Azzam Sleit and
                  Mohammed Qatawneh and
                  Wesam Almobaideen},
  title        = {Authentication Techniques for the Internet of Things: {A} Survey},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {28--34},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.22},
  doi          = {10.1109/CCC.2016.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/SaadehSQA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/SalemZSS16,
  author       = {Asma Salem and
                  Dema Zaidan and
                  Andraws I. Swidan and
                  Ramzi R. Saifan},
  title        = {Analysis of Strong Password Using Keystroke Dynamics Authentication
                  in Touch Screen Devices},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {15--21},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.11},
  doi          = {10.1109/CCC.2016.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/SalemZSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/TangAL16,
  author       = {MingJian Tang and
                  Mamoun Alazab and
                  Yuxiu Luo},
  title        = {Exploiting Vulnerability Disclosures: Statistical Framework and Case
                  Study},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {117--122},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.10},
  doi          = {10.1109/CCC.2016.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/TangAL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/Zaabi16,
  author       = {Khulood Ali Al Zaabi},
  title        = {Android Forensics: Investigating Social Networking Cybercrimes against
                  Man-in-the-Middle Attacks},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {48--54},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.15},
  doi          = {10.1109/CCC.2016.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/Zaabi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/ZaidAH16,
  author       = {Aisha Zaid and
                  Ja'far Alqatawna and
                  Ammar Huneiti},
  title        = {A Proposed Model for Malicious Spam Detection in Email Systems of
                  Educational Institutes},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  pages        = {60--64},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCC.2016.24},
  doi          = {10.1109/CCC.2016.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/ZaidAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccc2/2016,
  title        = {Cybersecurity and Cyberforensics Conference, {CCC} 2016, Amman, Jordan,
                  August 2-4, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7593909/proceeding},
  isbn         = {978-1-5090-2657-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics