Day 1 (Tuesday 2/8/2016) |
Time |
Event |
location |
8:30 – 9:30 AM |
Registration |
KASIT |
Opening Ceremony: M.C. Dr. Ja'far Alqatawna, UJ, Jordan |
9:30 – 9:35 |
National Anthem Recitation from the Holy Quran |
Auditorium/KASIT |
9:35 – 9: 45 |
Dr. Azzam Sleit, Honorary Chair |
Auditorium/KASIT |
9:45 – 9:55 |
Dr. Mamoun Alazab, General Chair |
Auditorium/KASIT |
9:55 – 10:00 |
Dr. Omar Arabiat, Local Chair |
Auditorium/KASIT |
10:00 – 10:35 |
Coffee Break and Companies' Showcase |
KASIT |
Keynote Speech: Cybersecurity and Cyberterrorism: Myth and Reality |
10:35 - 11:05 |
Speaker: Dr Julian Droogan, Expert in Cyber Security and Terrorism, Macquarie University, Australia |
Auditorium/KASIT |
Session 1: Chair Dr. Ameer Alnemrat, UEL, UK |
Keynote Speech: Cyber Threats Intelligence sharing is the new security paradigm in the SDN Age |
11:05- 11:35 |
Keynote Speaker: Haitham Saif, Network Security Consultant, Juniper |
Auditorium/KASIT |
11:35 - 11:55 |
Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System Malek Al-Zewairi, Dima Suleiman, Adnan Shaout |
Auditorium/KASIT |
11:55 – 12: 15 |
Towards Cloud Security Monitoring: A Case Study Umar Mukhtar Ismail, Syed Islam, Shareeful Islam |
Auditorium/KASIT |
12:15 – 12:35 |
Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices Asma Salem, Dema Zaidan, Andraws Swidan, Ramzi Saifan |
Auditorium/KASIT |
12:35 – 12:55 |
Covert Communication Using Port Knocking Mariam Khader, Ali Hadi, Amjad Hudaib |
Auditorium/KASIT |
12:55 - 1:15 |
Authentication Techniques for the Internet of Things: A Survey Maha Saadeh, Azzam Sleit, Mohammed Qatawneh, Wesam Almobaideen |
Auditorium/KASIT |
1:15 – 2:30 |
Lunch Break |
University Restaurant |
Session 2: Chair Dr. Ali Hadi, PSUT, Jordan |
2:30 – 2:50 |
IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid |
Auditorium/KASIT |
2:50 –3:10 |
Windows Forensic Investigations using PowerForensics Tool Akram Fawwaz A. Abu Failat Barakat, Ali Hussein Hadi |
Auditorium/KASIT |
3:10 – 3:30 |
Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks
Khulood Ali Jumah Al Jarman Al Zaabi |
Auditorium/KASIT |
3:30 – 3:50 |
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files Esra’a Alshammary, Ali Hadi |
Auditorium/KASIT |
Day 2 (Wednesday 3/8/2016) |
Session 3: Chair Dr. Khair Eddin Sabri, UJ |
Keynote Speech: Secured Mobility & Adaptive Trust Security |
9:00 - 9:30 |
Keynote Speaker: Mr. Shadi AlKhatib, Territory Manager and Network Security Expert, HP LEVANT |
Auditorium/KASIT |
9:30 – 9:50 |
A Proposed Model for Malicious Spam Detection In Email Systems of Educational Institutes Aisha Zaid, Ja'far Alqatawna, Ammar Huneiti |
Auditorium/KASIT |
9:50 – 10:10 |
A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes Ja'far Alqatawna, Ali Hadi, Malek Al-Zwairi, Mariam Khader |
Auditorium/KASIT |
10:10 – 10:30 |
Boosting usability for Protecting Online Banking Applications Against APTs Mohannad Alhanahnah, David Chadwick |
Auditorium/KASIT |
10:30 – 10:50 |
Detecting and Preventing SQL Injection Attacks: A Formal Approach Mohammad Qbea'h, Mohammad Alshraideh, Khair Eddin Sabri |
Auditorium/KASIT |
10:50 – 11:20 |
Coffee Break |
KASIT
|
Session 4: Chair Dr. Chafika Benzaid, UST, Algeria |
Keynote Speech: Web Application Firewalls (WAFs), the security landscape currently for the web attacks and where the WAF fits in. |
11:20 - 11:50 |
Keynote Speaker: Khalid Muasher, Country Manager and Security Expert, F5 Networks. |
Auditorium/KASIT |
11:50 – 12:10 |
Analyzing Cybercrime Strategies: The Case of Phishing Attack Rola Al Halaseh, Ja'far Alqatawna |
Auditorium/KASIT |
12:10 – 12:30 |
Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts Nazeeh Ghatasheh |
Auditorium/KASIT |
12:30 - 12:50 |
Users profiling using clickstream data analysis and classification Wedyan Alswiti , Ja'far Alqatawna, Bashar Al-Shboul, Hossam Faris, Heba Hakh |
Auditorium/KASIT |
12:50 – 1:10 |
Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences Julian Droogan, Lise Waldek |
Auditorium/KASIT |
1:10 - 2:25 |
Lunch Break |
University Restaurant |
Session 5: Chair Dr. Omar Arabiat, BAU, Jordan |
Keynote Speech: Breach Prevention by Simplifying the Complex World Of Threats |
2:25 - 2:55 |
Keynote Speaker: Mohammad Hamdan, Security Expert, Palo Alto Networks |
Auditorium/KASIT |
2:55 - 3:15 |
Management Attitudes Toward Information Security in Omani Public Sector Organisations Fathiya Al Izki and George Weir. |
Auditorium/KASIT |
3:15 - 3:35 |
Websites’ Input Validation and Input-Misuse-Based Attacks Izzat Alsmadi and Iyad Alazzam |
Auditorium/KASIT |
3:35 - 3:55 |
Exploiting Vulnerability Disclosures: Statistical Framework and Case Study MingJian Tang, Mamoun Alazab, and Yuxiu Luo |
Auditorium/KASIT |
3:55 - 4:15 |
Detecting Ransomware with Honeypot Techniques Chris Moore |
Auditorium/KASIT |
4:15 - 4:35 |
Experimental and Analytical Evaluation of the Impact of Security Compliance on System Performance of Web Applications John O. Babatunde |
Auditorium/KASIT |
4:35 - 4:55 |
Cybersecurity and the Unbearability of Uncertainty Karen Renaud and George R. S. Weir |
Auditorium/KASIT |
4:55 -5:15 |
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors Andreas Aßmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, and George Weir |
Auditorium/KASIT |
7:00-9:00 |
Gala Dinner & Closing Ceremony M.C. Dr. Ameer Alnemrat |
|
|
Dr. Ameer Alnemrat, General Chair |
|
|
Eng. Ismael Btoush, Ad-Tech, Sponsors Representative |
|
|
Awards and certificates |
|
Day 3 (Thursday 4/8/2016) |
Trip |