Skip to content. | Skip to navigation

Personal tools

This Logo Viewlet registered to Business4 Theme
You are here: Home / Events / WORLDCOMP'16 / Program / SAM'16: Wednesday, July 27, 2016 Schedule

SAM'16: Wednesday, July 27, 2016 Schedule

To select a different schedule  CLICK HERE

7:00am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)
                  HARDWARE SECURITY
                  Co-Chairs: Prof. Levent Ertaul,
                             California State University East Bay, USA;
                             Prof. Ken Ferens,
                             University of Manitoba, Canada
                  July 27, 2016 (Wednesday); 08:00am - 10:20am
                  (LOCATION: Ballroom 2)
08:00 - 08:20am:  FREE SLOT
08:20 - 08:40am:  An Automated Tool for Evaluating Hardware Trojans and Detection
                  Nicholas Houghton, Samer Moein, Fayez Gebali, Aaron T. Gulliver
                  Department of Electrical and Computer Engineering,
                  University of Victoria, B.C., Canada
08:40 - 09:00am:  Generic Semantics Specification and Processing for Inter-System
                  Information Flow Tracking
                  Pascal Birnstill, Christoph Bier, Paul Wagnery, Juergen Beyerer
                  Fraunhofer Institute of Optronics, System Technologies and Image
                  Exploitation IOSB, Karlsruhe, Germany;
                  Karlsruhe Institute of Technology, Karlsruhe, Germany
09:00 - 09:20am:  Selecting Classification Features for Detection of Mass Emergency
                  Events on Social Media
                  Viktor Pekar, Jane Binner, Hossein Najafi, Chris Hale
                  Business School, University of Birmingham, Birmingham, UK;
                  Computer Science and Information Systems, University of Wisconsin,
                  River Falls, Wisconsin, USA;  Electronic Systems Lab,
                  Georgia Institute of Technology, USA
09:20 - 09:40am:  PUF Based Lightweight Hardware Trust Anchor for Secure Embedded
                  Kai Fischer, Erwin Hess, Andreas Mucha, Fabian Riess
                  Siemens AG. Corporate Technology, Munich, Germany
09:40 - 10:00am:  Towards a Mathematical Model for Autonomously Organizing Security
                  Metric Ontologies
                  Gregory Vert, Bryce Barrette, Bilal Gonen
                  College of Security and Intelligence, Embry Riddle Aeronautical
                  University, Florida, USA;
                  Computer Science, University of West Florida, Florida, USA
10:00 - 10:20am:  Secret Sharing Scheme Based on Edge Dominating Set
                  Nadia M. G. Al-Saidi, Mohammed M. Abdulhadi, Mustafa Saed
                  Applied Mathematics, University of Technology, Baghdad, Iraq
10:20 - 10:40pm:  BREAK
                  Co-Chairs: Dr. Haydar Teymourlouei,
                             Bowie State University, USA;
                             Dr. Khaled Ali Shehata,
                             Arab Academy for Science & Technology, Egypt
                  July 27, 2016 (Wednesday); 10:40am - 12:20pm
                  (LOCATION: Ballroom 2)
10:40 - 11:00am:  Subject Movement at Different Force Levels in a Fingerprint
                  Recognition System
                  Kevin Chan, Jeffrey Chudik, Katrina Molina, Alex Hirsch,
                  Brennon Morning, Evan Pulliam, Drew Radcliff, Stephen Elliott
                  Department of Technology Leadership and Innovation,
                  Purdue University, West Lafayette, Indiana, USA
11:00 - 11:20am:  Digital Forensic Analysis of SIM Cards
                  Mohamed T. Abdel Azim, Ahmed F. Shosha
                  Nile University, Cairo, Egypt
11:20 - 11:40am:  A Multimodal Biometric System with Several Degrees of Feature
                  Fusion for Target Identities Recognition
                  Sorin Soviany, Cristina Soviany, Sorin Puscoci
                  I.N.S.C.C., Romania;  Feature Analytics, Belgium
11:40 - 12:00pm:  Digital Forensic Analysis of Web-Browser Based Attacks
                  Sally M. Mohamed, Nashwa Abdelbaki, Ahmed F. Shosha
                  School of Communication and Information Technology,
                  Nile University Cairo, Egypt
12:00 - 12:20pm:  EasyAuth - Implementation of a Multi-Factor Authentication Scheme
                  Based on Sound, Fingerprint and One Time Passwords (OTP)
                  Levent Ertaul, Ishita Thanki
                  California State University East Bay, Hayward, California, USA
12:20 - 01:20pm:  LUNCH (On Your Own)
                  Chair: Dr. Greg Vert,
                         Embry Riddle Aeronautical University, USA
                  July 27, 2016 (Wednesday); 01:20am - 03:00pm
                  (LOCATION: Ballroom 2)
01:20 - 01:40pm:  FREE SLOT
01:40 - 02:00pm:  KERMAN: A Key Establishment Algorithm Based on Harvesting
                  Randomness in MANETs
                  Mohammad Reza Khalili Shoja, George Traian Amariucai,
                  Shuangqing Weiy, Jing Dengz
                  Department of ECE, Iowa State University, Iowa, USA;
                  School of EECS, Louisiana State University, Louisiana, USA;
                  Department of CS, University North Carolina at Greensboro,
                  North Carolina, USA
02:00 - 02:20pm:  Performance Comparison of AES-CCM and AES-GCM Authenticated
                  Encryption Modes
                  Levent Ertaul, Anup Mudan, Nausheen Sarfaraz
                  California State University East Bay, Hayward, California, USA
02:20 - 02:40pm:  A DNA-Based Cryptographic Key Generation Algorithm
                  Shakir M. Hussain, Hussein Al-Bahadili
                  Faculty of IT, University of Petra, Amman, Jordan
02:40 - 03:00pm:  FREE SLOT
03:00 - 03:40pm:  POSTER SESSION C-SAM
                  July 27, 2016 (Wednesday)
                  (LOCATION: Hallways of Ballrooms 1-5)
                  O.  A Denied-Events Based Detection Method Against SSH Brute-Force
                      Attack in Supercomputing Service Environment
                      Jae-Kook Lee, Sung-Jun Kim, Taeyoung Hong
                      Department of Supercomputing Infrastructure, KISTI,
                      Daejeon, Korea
                  O.  How to Realize a Soft Tracking of People in Temporary Reception
                      G. L. Masala, M. L. Ganadu
                      Department of Political Science, Communication, Engineering and
                      Information Technologies and Department of Humanities and Social
                      Sciences, University of Sassari, Sassari, Italy
                  O.  ...
                  Chair: Dr. Kazi Zunnurhain,
                         Northern Kentucky University, USA
                  July 27, 2016 (Wednesday); 03:40am - 05:40pm
                  (LOCATION: Ballroom 2)
03:40 - 04:00pm:  Using DroidDream Android Malware Behavior for Identification of
                  Other Android Malware Families
                  YeKung Kim, Kathy J. Liszka, Chien-Chung Chan
                  Department of CS, The University of Akron, Akron, Ohio, USA
04:00 - 04:20pm:  Anomaly Detection and Machine Learning Methods for Network
                  Intrusion Detection: an Industrially Focused Literature Review
                  Colin Gilmore, Jason Haydaman
                  TRTech., Winnipeg, Canada
04:20 - 04:40pm:  Cloud Application Model Personal Healthcare Record Implementation
                  Amer Jneid, Ashraf Gaffar
                  Arizona State University, Tempe, Arizona, USA;
                  Arizona State University, Meza, Arizona, USA
04:40 - 05:00pm:  Using OWASP Vulnerabilities to Evaluate Open Source Web Scanners
                  Kathryn Johnston, Mario A. Garcia
                  Computer Science, California State University San Bernardino,
                  San Bernardino, California, USA;  Department of Computer Science,
                  Texas A&M Corpus Christi, Corpus Christi, Texas, USA
05:00 - 05:20pm:  Live Migration of Virtual Machine in Cloud: Survey of Issues
                  and Solutions
                  Hani Alshahrani, Ali Alshehri, Raed Alharthi, and
                  Abdulrahman Alzahrani
                  Department of Computer Science and Engineering,
                  Oakland University, Rochester, Michigan, USA
05:20 - 05:40pm:  FREE SLOT
05:40 - 08:30pm:  TUTORIALS + DISCUSSIONS
                  (Please refer to the lists at the begining of the program
                  book for details)

To select a different schedule  CLICK HERE


« October 2016 »

Important Dates

  Past Events