Skip to content. | Skip to navigation

Personal tools

This Logo Viewlet registered to Business4 Theme
You are here: Home / Events / WORLDCOMP'16 / Program / SAM'16: Wednesday, July 27, 2016 Schedule

SAM'16: Wednesday, July 27, 2016 Schedule

To select a different schedule  CLICK HERE


7:00am - 5:00pm:  REGISTRATION (Second Floor, Conference Lobby: 1-5)
 
 
SESSION 7-SAM:    SECURITY EDUCATION + INFORMATION ASSURANCE +
                  HARDWARE SECURITY
                  Co-Chairs: Prof. Levent Ertaul,
                             California State University East Bay, USA;
                             Prof. Ken Ferens,
                             University of Manitoba, Canada
                  July 27, 2016 (Wednesday); 08:00am - 10:20am
                  (LOCATION: Ballroom 2)
 
08:00 - 08:20am:  FREE SLOT
 
08:20 - 08:40am:  An Automated Tool for Evaluating Hardware Trojans and Detection
                  Methods
                  Nicholas Houghton, Samer Moein, Fayez Gebali, Aaron T. Gulliver
                  Department of Electrical and Computer Engineering,
                  University of Victoria, B.C., Canada
 
08:40 - 09:00am:  Generic Semantics Specification and Processing for Inter-System
                  Information Flow Tracking
                  Pascal Birnstill, Christoph Bier, Paul Wagnery, Juergen Beyerer
                  Fraunhofer Institute of Optronics, System Technologies and Image
                  Exploitation IOSB, Karlsruhe, Germany;
                  Karlsruhe Institute of Technology, Karlsruhe, Germany
 
09:00 - 09:20am:  Selecting Classification Features for Detection of Mass Emergency
                  Events on Social Media
                  Viktor Pekar, Jane Binner, Hossein Najafi, Chris Hale
                  Business School, University of Birmingham, Birmingham, UK;
                  Computer Science and Information Systems, University of Wisconsin,
                  River Falls, Wisconsin, USA;  Electronic Systems Lab,
                  Georgia Institute of Technology, USA
 
09:20 - 09:40am:  PUF Based Lightweight Hardware Trust Anchor for Secure Embedded
                  Systems
                  Kai Fischer, Erwin Hess, Andreas Mucha, Fabian Riess
                  Siemens AG. Corporate Technology, Munich, Germany
 
09:40 - 10:00am:  Towards a Mathematical Model for Autonomously Organizing Security
                  Metric Ontologies
                  Gregory Vert, Bryce Barrette, Bilal Gonen
                  College of Security and Intelligence, Embry Riddle Aeronautical
                  University, Florida, USA;
                  Computer Science, University of West Florida, Florida, USA
 
10:00 - 10:20am:  Secret Sharing Scheme Based on Edge Dominating Set
                  Nadia M. G. Al-Saidi, Mohammed M. Abdulhadi, Mustafa Saed
                  Applied Mathematics, University of Technology, Baghdad, Iraq
 
10:20 - 10:40pm:  BREAK
 
 
SESSION 8-SAM:    BIOMETRICS AND FORENSICS
                  Co-Chairs: Dr. Haydar Teymourlouei,
                             Bowie State University, USA;
                             Dr. Khaled Ali Shehata,
                             Arab Academy for Science & Technology, Egypt
                  July 27, 2016 (Wednesday); 10:40am - 12:20pm
                  (LOCATION: Ballroom 2)
 
10:40 - 11:00am:  Subject Movement at Different Force Levels in a Fingerprint
                  Recognition System
                  Kevin Chan, Jeffrey Chudik, Katrina Molina, Alex Hirsch,
                  Brennon Morning, Evan Pulliam, Drew Radcliff, Stephen Elliott
                  Department of Technology Leadership and Innovation,
                  Purdue University, West Lafayette, Indiana, USA
 
11:00 - 11:20am:  Digital Forensic Analysis of SIM Cards
                  Mohamed T. Abdel Azim, Ahmed F. Shosha
                  Nile University, Cairo, Egypt
 
11:20 - 11:40am:  A Multimodal Biometric System with Several Degrees of Feature
                  Fusion for Target Identities Recognition
                  Sorin Soviany, Cristina Soviany, Sorin Puscoci
                  I.N.S.C.C., Romania;  Feature Analytics, Belgium
 
11:40 - 12:00pm:  Digital Forensic Analysis of Web-Browser Based Attacks
                  Sally M. Mohamed, Nashwa Abdelbaki, Ahmed F. Shosha
                  School of Communication and Information Technology,
                  Nile University Cairo, Egypt
 
12:00 - 12:20pm:  EasyAuth - Implementation of a Multi-Factor Authentication Scheme
                  Based on Sound, Fingerprint and One Time Passwords (OTP)
                  Levent Ertaul, Ishita Thanki
                  California State University East Bay, Hayward, California, USA
 
12:20 - 01:20pm:  LUNCH (On Your Own)
 
 
SESSION 9-SAM:    CRYPTOGRAPHICS TECHNOLOGIES II
                  Chair: Dr. Greg Vert,
                         Embry Riddle Aeronautical University, USA
                  July 27, 2016 (Wednesday); 01:20am - 03:00pm
                  (LOCATION: Ballroom 2)
 
01:20 - 01:40pm:  FREE SLOT
 
01:40 - 02:00pm:  KERMAN: A Key Establishment Algorithm Based on Harvesting
                  Randomness in MANETs
                  Mohammad Reza Khalili Shoja, George Traian Amariucai,
                  Shuangqing Weiy, Jing Dengz
                  Department of ECE, Iowa State University, Iowa, USA;
                  School of EECS, Louisiana State University, Louisiana, USA;
                  Department of CS, University North Carolina at Greensboro,
                  North Carolina, USA
 
02:00 - 02:20pm:  Performance Comparison of AES-CCM and AES-GCM Authenticated
                  Encryption Modes
                  Levent Ertaul, Anup Mudan, Nausheen Sarfaraz
                  California State University East Bay, Hayward, California, USA
 
02:20 - 02:40pm:  A DNA-Based Cryptographic Key Generation Algorithm
                  Shakir M. Hussain, Hussein Al-Bahadili
                  Faculty of IT, University of Petra, Amman, Jordan
 
02:40 - 03:00pm:  FREE SLOT
 
 
03:00 - 03:40pm:  POSTER SESSION C-SAM
                  (INCLUDES POSTER + SHORT & POSITION PAPERS)
                  July 27, 2016 (Wednesday)
                  (LOCATION: Hallways of Ballrooms 1-5)
 
                  O.  A Denied-Events Based Detection Method Against SSH Brute-Force
                      Attack in Supercomputing Service Environment
                      Jae-Kook Lee, Sung-Jun Kim, Taeyoung Hong
                      Department of Supercomputing Infrastructure, KISTI,
                      Daejeon, Korea
                  O.  How to Realize a Soft Tracking of People in Temporary Reception
                      Centres
                      G. L. Masala, M. L. Ganadu
                      Department of Political Science, Communication, Engineering and
                      Information Technologies and Department of Humanities and Social
                      Sciences, University of Sassari, Sassari, Italy
                  O.  ...
 
 
SESSION 10-SAM:   COMPUTER SECURITY + SECURITY APPLICATIONS
                  Chair: Dr. Kazi Zunnurhain,
                         Northern Kentucky University, USA
                  July 27, 2016 (Wednesday); 03:40am - 05:40pm
                  (LOCATION: Ballroom 2)
 
03:40 - 04:00pm:  Using DroidDream Android Malware Behavior for Identification of
                  Other Android Malware Families
                  YeKung Kim, Kathy J. Liszka, Chien-Chung Chan
                  Department of CS, The University of Akron, Akron, Ohio, USA
 
04:00 - 04:20pm:  Anomaly Detection and Machine Learning Methods for Network
                  Intrusion Detection: an Industrially Focused Literature Review
                  Colin Gilmore, Jason Haydaman
                  TRTech., Winnipeg, Canada
 
04:20 - 04:40pm:  Cloud Application Model Personal Healthcare Record Implementation
                  Amer Jneid, Ashraf Gaffar
                  Arizona State University, Tempe, Arizona, USA;
                  Arizona State University, Meza, Arizona, USA
 
04:40 - 05:00pm:  Using OWASP Vulnerabilities to Evaluate Open Source Web Scanners
                  Kathryn Johnston, Mario A. Garcia
                  Computer Science, California State University San Bernardino,
                  San Bernardino, California, USA;  Department of Computer Science,
                  Texas A&M Corpus Christi, Corpus Christi, Texas, USA
 
05:00 - 05:20pm:  Live Migration of Virtual Machine in Cloud: Survey of Issues
                  and Solutions
                  Hani Alshahrani, Ali Alshehri, Raed Alharthi, and
                  Abdulrahman Alzahrani
                  Department of Computer Science and Engineering,
                  Oakland University, Rochester, Michigan, USA
 
05:20 - 05:40pm:  FREE SLOT
 
 
05:40 - 08:30pm:  TUTORIALS + DISCUSSIONS
                  (Please refer to the lists at the begining of the program
                  book for details)


To select a different schedule  CLICK HERE

Navigation

« December 2016 »
December
MoTuWeThFrSaSu
1234
567891011
12131415161718
19202122232425
262728293031

Important Dates

  Past Events