ICWN'16: Wednesday, July 27, 2016 Schedule
To select a different schedule CLICK HERE
7:00am - 5:00pm: REGISTRATION (Second Floor, Conference Lobby: 1-5)
SESSION 3-ICWN: WIRELESS NETWORKS AND NOVEL APPLICATIONS +
MOBILE SYSTEMS
Chairs: TBA
July 27, 2016 (Wednesday); 08:00am - 10:40am
(LOCATION: Copper Room)
08:00 - 08:20am: A Novel Security System for Preventing DoS Attacks on
4G LTE Networks
Sundus Ayaz, Muazzam A. Khan
Department of CE, National University of Sciences and
Technology, Islamabad, Pakistan
08:20 - 08:40am: Implentation of EAX Mode of Operation Within a Real-time
Android Chatting Application
Levent Ertaul, Nikhitha Vadla Konda, Dharani G. Ramasamy
Department of CS, California State University,
East Bay, California, USA
08:40 - 09:00am: Open-Source Based Mobile Application for Helping Handicapped
Students Play Chess and Educational Video Games on Computers
Tong Lai Yu, Ronald Yu
School of CSE, California State University, San Bernardino,
California, USA; Department of CS, University of Southern
California, Los Angeles, California, USA
09:00 - 09:20am: Using SDR for Cost-Effective DTV Applications
J. Kwak, Y. Park, H. Kim
Department of CSE, Korea University, Seoul, Korea
09:20 - 09:40am: A Routing Technique Based on Least Delay Path for Medical
Application Networks
R. Plovas, S. Motoyama
Faculdade Campo Limpo Paulista (FACCAMP),
Campo Limpo Paulista, SP, Brazil
09:40 - 10:00am: Advanced Pattern Recognition for Optimal Bandwidth and
Power Utilization for Wireless Intelligent Motes for IoT
Applications
Kenny C. Gross, Kalyan Vaidyanathan, Majid Valiollahzadeh
Oracle Corporation, USA
10:00 - 10:20am:
10:20 - 10:40am: Performance of Cluster Based Multipath Routing in
Wireless Sensor Networks
P. G. V. Suresh Kumar, Daneil Abebe, M.S. Chakravarthy
Centre for ITSC, School of ECE, AAiT, Addis Ababa
University, Ethiopia; Department of Management,
Samara University, Samara, Ethiopia
NOTE THE CHANGE IN ROOM LOCATION - PLEASE GO TO Ballroom 2
FOR SECURITY APPLICATIONS
SESSION 8-SAM: BIOMETRICS AND FORENSICS
Co-Chairs: Dr. Haydar Teymourlouei,
Bowie State University, USA;
Dr. Khaled Ali Shehata,
Arab Academy for Science & Technology, Egypt
July 27, 2016 (Wednesday); 10:40am - 12:20pm
(LOCATION: Ballroom 2)
10:40 - 11:00am: Subject Movement at Different Force Levels in a Fingerprint
Recognition System
Kevin Chan, Jeffrey Chudik, Katrina Molina, Alex Hirsch,
Brennon Morning, Evan Pulliam, Drew Radcliff, Stephen Elliott
Department of Technology Leadership and Innovation,
Purdue University, West Lafayette, Indiana, USA
11:00 - 11:20am: Digital Forensic Analysis of SIM Cards
Mohamed T. Abdel Azim, Ahmed F. Shosha
Nile University, Cairo, Egypt
11:20 - 11:40am: A Multimodal Biometric System with Several Degrees of Feature
Fusion for Target Identities Recognition
Sorin Soviany, Cristina Soviany, Sorin Puscoci
I.N.S.C.C., Romania; Feature Analytics, Belgium
11:40 - 12:00pm: Digital Forensic Analysis of Web-Browser Based Attacks
Sally M. Mohamed, Nashwa Abdelbaki, Ahmed F. Shosha
School of Communication and Information Technology,
Nile University Cairo, Egypt
12:00 - 12:20pm: EasyAuth - Implementation of a Multi-Factor Authentication Scheme
Based on Sound, Fingerprint and One Time Passwords (OTP)
Levent Ertaul, Ishita Thanki
California State University East Bay, Hayward, California, USA
12:20 - 01:20pm: LUNCH (On Your Own)
SESSION 9-SAM: CRYPTOGRAPHICS TECHNOLOGIES II
Chair: Dr. Greg Vert,
Embry Riddle Aeronautical University, USA
July 27, 2016 (Wednesday); 01:20am - 03:00pm
(LOCATION: Ballroom 2)
01:20 - 01:40pm: FREE SLOT
01:40 - 02:00pm: KERMAN: A Key Establishment Algorithm Based on Harvesting
Randomness in MANETs
Mohammad Reza Khalili Shoja, George Traian Amariucai,
Shuangqing Weiy, Jing Dengz
Department of ECE, Iowa State University, Iowa, USA;
School of EECS, Louisiana State University, Louisiana, USA;
Department of CS, University North Carolina at Greensboro,
North Carolina, USA
02:00 - 02:20pm: Performance Comparison of AES-CCM and AES-GCM Authenticated
Encryption Modes
Levent Ertaul, Anup Mudan, Nausheen Sarfaraz
California State University East Bay, Hayward, California, USA
02:20 - 02:40pm: A DNA-Based Cryptographic Key Generation Algorithm
Shakir M. Hussain, Hussein Al-Bahadili
Faculty of IT, University of Petra, Amman, Jordan
02:40 - 03:00pm: FREE SLOT
03:00 - 03:40pm: POSTER SESSION B
(INCLUDES POSTER + SHORT & POSITION PAPERS)
July 27, 2016 (Wednesday)
(LOCATION: Hallways of Ballrooms 1-5)
O. A Denied-Events Based Detection Method Against SSH Brute-Force
Attack in Supercomputing Service Environment
Jae-Kook Lee, Sung-Jun Kim, Taeyoung Hong
Department of Supercomputing Infrastructure, KISTI,
Daejeon, Korea
O. How to Realize a Soft Tracking of People in Temporary Reception
Centres
G. L. Masala, M. L. Ganadu
Department of Political Science, Communication, Engineering and
Information Technologies and Department of Humanities and Social
Sciences, University of Sassari, Sassari, Italy
O. ...
SESSION 10-SAM: COMPUTER SECURITY + SECURITY APPLICATIONS
Chair: Dr. Kazi Zunnurhain,
Northern Kentucky University, USA
July 27, 2016 (Wednesday); 03:40am - 05:40pm
(LOCATION: Ballroom 2)
03:40 - 04:00pm: Using DroidDream Android Malware Behavior for Identification of
Other Android Malware Families
YeKung Kim, Kathy J. Liszka, Chien-Chung Chan
Department of CS, The University of Akron, Akron, Ohio, USA
04:00 - 04:20pm: Anomaly Detection and Machine Learning Methods for Network
Intrusion Detection: an Industrially Focused Literature Review
Colin Gilmore, Jason Haydaman
TRTech., Winnipeg, Canada
04:20 - 04:40pm: Cloud Application Model Personal Healthcare Record Implementation
Amer Jneid, Ashraf Gaffar
Arizona State University, Tempe, Arizona, USA;
Arizona State University, Meza, Arizona, USA
04:40 - 05:00pm: Using OWASP Vulnerabilities to Evaluate Open Source Web Scanners
Kathryn Johnston, Mario A. Garcia
Computer Science, California State University San Bernardino,
San Bernardino, California, USA; Department of Computer Science,
Texas A&M Corpus Christi, Corpus Christi, Texas, USA
05:00 - 05:20pm: Live Migration of Virtual Machine in Cloud: Survey of Issues
and Solutions
Hani Alshahrani, Ali Alshehri, Raed Alharthi, and
Abdulrahman Alzahrani
Department of Computer Science and Engineering,
Oakland University, Rochester, Michigan, USA
05:20 - 05:40pm: FREE SLOT
05:40 - 08:30pm: TUTORIALS + DISCUSSIONS
(Please refer to the lists at the begining of the program
book for details)To select a different schedule CLICK HERE