Conference Program
 
Cybersecurity & Cyberforensics Conference
King Abdullah II School for Information Technology (KASIT)
University of Jordan (UoJ)
Amman, Jordan
2-4 August 2016
 
Day 1 (Tuesday 2/8/2016)
Time
Event
location
8:30 – 9:30 AM
Registration
KASIT
Opening Ceremony:     M.C.   Dr. Ja'far Alqatawna, UJ, Jordan
9:30 – 9:35
National Anthem
Recitation from the Holy Quran
Auditorium/KASIT
9:35 – 9: 45
Dr. Azzam Sleit, Honorary Chair
Auditorium/KASIT
9:45 – 9:55
Dr. Mamoun Alazab, General Chair
Auditorium/KASIT
9:55 – 10:00
Dr. Omar Arabiat, Local Chair
Auditorium/KASIT
10:00 – 10:35
Coffee Break and Companies' Showcase
KASIT
Keynote Speech: Cybersecurity and Cyberterrorism: Myth and Reality
10:35 -  11:05
Speaker: Dr Julian Droogan, Expert in Cyber Security and Terrorism, Macquarie University, Australia
Auditorium/KASIT
Session 1:   Chair Dr. Ameer Alnemrat, UEL, UK
Keynote Speech: Cyber Threats Intelligence sharing is the new security paradigm in the SDN Age
11:05- 11:35
Keynote Speaker: Haitham Saif, Network Security Consultant, Juniper
Auditorium/KASIT
11:35 - 11:55         
Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System
Malek Al-Zewairi, Dima Suleiman, Adnan Shaout
Auditorium/KASIT
11:55 – 12: 15      
Towards Cloud Security Monitoring: A Case Study
Umar Mukhtar Ismail, Syed Islam, Shareeful Islam
Auditorium/KASIT
12:15 – 12:35
Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices
Asma Salem, Dema Zaidan, Andraws Swidan, Ramzi Saifan
Auditorium/KASIT
12:35 – 12:55        
Covert Communication Using Port Knocking
Mariam Khader, Ali Hadi, Amjad Hudaib
Auditorium/KASIT
12:55 -  1:15                       
Authentication Techniques for the Internet of Things: A Survey
Maha Saadeh, Azzam Sleit, Mohammed Qatawneh, Wesam Almobaideen
Auditorium/KASIT
1:15 – 2:30
Lunch Break
University Restaurant
Session 2:      Chair Dr. Ali Hadi, PSUT, Jordan
2:30 – 2:50             
IWNetFAF: An Integrated Wireless Network Forensic Analysis Framework
Nadia Benchikha, Mohamed Krim, Khaled Zeraoulia, Chafika Benzaid
Auditorium/KASIT
2:50 –3:10              
Windows Forensic Investigations using PowerForensics Tool
Akram Fawwaz A. Abu Failat Barakat, Ali Hussein Hadi
Auditorium/KASIT
3:10 – 3:30 
Android Forensics: Investigating Social Networking Cybercrimes against Man-in-the-Middle Attacks
 Khulood Ali Jumah Al Jarman Al Zaabi
Auditorium/KASIT
3:30 – 3:50
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
Esra’a Alshammary, Ali Hadi
Auditorium/KASIT
Day 2 (Wednesday 3/8/2016)
Session 3:      Chair Dr. Khair Eddin Sabri, UJ
Keynote Speech: Secured Mobility & Adaptive Trust Security
9:00 - 9:30
Keynote Speaker: Mr. Shadi AlKhatib, Territory Manager and Network Security Expert, HP LEVANT
Auditorium/KASIT
9:30 – 9:50
A Proposed Model for Malicious Spam Detection In Email Systems of Educational Institutes
Aisha Zaid, Ja'far Alqatawna, Ammar Huneiti
Auditorium/KASIT
9:50 – 10:10
A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes
Ja'far Alqatawna, Ali Hadi, Malek Al-Zwairi, Mariam Khader
Auditorium/KASIT
10:10 – 10:30
Boosting usability for Protecting Online Banking Applications Against APTs
Mohannad Alhanahnah, David Chadwick
Auditorium/KASIT
10:30 – 10:50                    
Detecting and Preventing SQL Injection Attacks: A Formal Approach
Mohammad Qbea'h, Mohammad Alshraideh, Khair Eddin Sabri
Auditorium/KASIT
10:50 – 11:20
Coffee Break
KASIT
 
 
 
Session 4:     Chair Dr. Chafika Benzaid, UST, Algeria
Keynote Speech:  Web Application Firewalls (WAFs), the security landscape currently for the web attacks and where the WAF fits in.
11:20 -  11:50
Keynote Speaker: Khalid Muasher, Country Manager and Security Expert, F5 Networks.
Auditorium/KASIT
11:50 – 12:10        
Analyzing Cybercrime Strategies: The Case of Phishing Attack
Rola Al Halaseh, Ja'far Alqatawna
Auditorium/KASIT
12:10 – 12:30        
Fraud Prevention Framework for Electronic Business Environments: Automatic Segregation of Online Phishing Attempts
Nazeeh Ghatasheh
Auditorium/KASIT
12:30 -  12:50        
Users profiling using clickstream data analysis and classification
Wedyan Alswiti      , Ja'far Alqatawna, Bashar Al-Shboul, Hossam Faris, Heba Hakh
Auditorium/KASIT
12:50 – 1:10                       
Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences
Julian Droogan, Lise Waldek
Auditorium/KASIT
1:10 - 2:25
Lunch Break
University Restaurant              
Session 5: Chair Dr. Omar Arabiat, BAU, Jordan
Keynote Speech:  Breach Prevention by Simplifying the Complex World Of Threats
2:25 - 2:55
Keynote Speaker: Mohammad Hamdan, Security Expert, Palo Alto Networks
Auditorium/KASIT
2:55 - 3:15
Management Attitudes Toward Information Security in Omani Public Sector Organisations
Fathiya Al Izki and George Weir.
Auditorium/KASIT
3:15 - 3:35
Websites’ Input Validation and Input-Misuse-Based Attacks
Izzat Alsmadi and Iyad Alazzam
Auditorium/KASIT
3:35 - 3:55
Exploiting Vulnerability Disclosures: Statistical Framework and Case Study
MingJian Tang, Mamoun Alazab, and Yuxiu Luo
Auditorium/KASIT
3:55 - 4:15
Detecting Ransomware with Honeypot Techniques
Chris Moore
Auditorium/KASIT
4:15 - 4:35
Experimental and Analytical Evaluation of the Impact of Security Compliance on System Performance of Web Applications
John O. Babatunde
Auditorium/KASIT
4:35 - 4:55
Cybersecurity and the Unbearability of Uncertainty
Karen Renaud and George R. S. Weir
Auditorium/KASIT
4:55 -5:15
Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors
Andreas Aßmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Söllner, Tilo Fischer, and George Weir
Auditorium/KASIT
7:00-9:00
Gala Dinner & Closing Ceremony
M.C. Dr. Ameer Alnemrat
 
 
Dr. Ameer Alnemrat, General Chair
 
 
Eng. Ismael Btoush, Ad-Tech, Sponsors Representative
 
 
Awards and certificates
 
Day 3 (Thursday 4/8/2016)
Trip
 
 
 
 
 
 
Navigate Up
Sign In