Tuesday, 10 November 2015

08:00 – 20:00

Registration

08:30 – 10:00

Workshop – 1

Workshop – 2

Workshop – 3

Network Vulnerability Scanning and Assessment Mobile Device Forensics Biometric Security and its Applications
1. Mr. Taher Adel Salaheldin Mohamed Azab/Desjardins Technology Group, Montreal, Canada.

2. Mr. Tran Thai Son/Intel, Montreal, Canada.

Mr. Florian Lukavsky, SEC Consult Singapore Pte Ltd Dr. Bouridane Ahmed / Northumbria University Newcastle, United Kingdom
(English)  (English)  (Arabic)

10:00 – 10:15

Coffee Break

10:15 – 11:30

Network Vulnerability Scanning and Assessment (Continued) Mobile Device Forensics (Continued) Biometric Security and its Applications (Continued)

12:30 – 14:00

Workshop – 4

Workshop – 5

Workshop – 6

Develop An Effective Human Security Awareness System Intrusion Detection and Prevention Systems Cybercrime – Seizing and Securing Digital Evidence
Dr. Fadi Ahmed AlAlool / American
University of Sharjah
1. Dr. Magdy Mohamed AbdelMonem Saeb / Arab Academy of Science, Technology & Maritime Transport

2. Dr. Ghita Kouadri Mostefaoui/University College London, United Kingdom

Dr. Mohamed Mohamed Saleh Elalfy — Ministry of Justice, Egypt
(English)  (English)  (Arabic)

14:00 – 14:15

Coffee Break

14:15 – 15:30

Develop An Effective Human Security Awareness System (Continued) Intrusion Detection and Prevention Systems (Continued) Cybercrime – Seizing and Securing Digital Evidence (Continued)

16:30 – 17:30

Workshop – 7 Workshop – 8 Workshop – 9
Malware Detection and
Analysis
Capture the Flag (CTF) Tutorial Social Networking : The Latest Security Issues and How to Manage Them
 Dr. Sami Zhioua – KFUPM, Saudi Arabia 1. Mr. Taher Adel Salaheldin Mohamed Azab/Desjardins Technology Group, Montreal, Canada.

2. Mr. Tran Thai Son/Intel, Montreal, Canada.

Dr. Laith Alsumliman – IMSIU, Saudi Arabia
(English)  (English)  (Arabic)

17:30 – 17:45

Coffee Break

17:45 – 19:30

Malware Detection and
Analysis (Continued)
Capture the Flag (CTF) Tutorial (Continued) Social Networking : The Latest Security Issues and How to Manage Them (Continued)

20:00 – 21:00

ICACC 2015 -Opening Ceremonies

Under the Patronage of the Custodian of the Two Holy Mosques

King Salman Bin Abdulaziz Al Saud

Wednesday, 11 November 2015

07:30
-
19:00

Registration
07:30
-
08:00

Refreshments

08:00
-
09:30
Exhibition Paper Session 1

Paper No.

Paper Title Authors

Track

37

Detecting Unknown Vulnerabilities Using Honeynet Anas Abd Almonim CPFT

64

Security Evaluation of Saudi Arabia’s Websites Using Open Source Tools Mohammed S. AL-Sanea, Ahmad A. Al-Daraiseh CPFT

91

Cyber Security in Civil Aviation A. Stander,  J. Ophoff, Elmer Hoeksema CPFT

36

Harmonizing Substantive Cybercrime Law through European Union Directive 2013/40/EU – From European Legislation to International Model Law? Adrian Haase LILL

82

Cyber Crime and Laws: A Comparative Analysis of Pakistan, KSA and UAE Muhammad Bakhsh, Amjad Mahmood, Israr Iqbal Awan LILL
09:30
-
10:30
Keynote Speaker I (The Role of Education in Social Media Networks Ethics)
10:30
-
10:45
Coffee Break
10:45
-
11:45
Invited Talks I (International Perspectives of the Cybercrime)
Laura Jacob, Past President, IEEE Society on Social Implications of Technology (SSIT), USA.
11:45
-
12:45
Prayer Break / Lunch
12:45
-
14:00
Panel Discussion I
Topic Participants
The Role of Institutions to Protect E-Infrastructure – Global Experiences
  • Saudi Arabian Monetary Agency
  • Saudi Arabian Oil Company (Aramco)
  • Ministry of Interior – Technical Affairs
  • Communication and Information Technology Commission
  • International experts
14:00
-
15:00
Keynote Speaker II: Eugene Spafford (Policy and Law of Cybercrime – International Perspectives)
15:00
-
15:15

Prayer Break

15:15
-
16:45

Exhibition

Paper Session
2

Paper No.

Paper Title

Authors

Track

19

Using Location Aware Business Rules for Preventing Retail Banking Frauds Ayhan Demiriz, Betul Ekizoglu ITCD

49

Service Enthalpy for Analyzing Cybercrime Arif Bramantoro ITCD

50

Securing Cognitive Radio Enabled Smart Grid Systems against Cyber Attacks Waleed Ejaz, Mehak Basharat, Syed Hassan Ahmed ITCD

59

Forensic Investigation Framework for VoIP Protocol Saied Abd El- Atty,  Manesh T, Muhammed Sha, Brijith B, K Vivekanandan ITCD

95

Website Fingerprinting as a Cybercrime Investigation Model: Role and Challenges Taher Ahmed Ghaleb ITCD

16:45
-
17:15

Coffee Break -  Prayer Break

17:15
-
18:45

Paper Session
3

Paper No.

Paper Title Authors

Track

60

Classification of Cyber Attacks based on Rough Set Theory Adnan Amin, Sajid Anwar, Awias Adnan, Muhammad Amir Khan, Zafar Iqbal CRTP

72

A Novel Multi-frame Super Resolution algorithm for Algorithm for
Surveillance Camera Image Reconstruction
Aunsia Khan, Muhammad Khan, Faisal Obaid,  Sultanullah Jadoon, Mudasar Khan, Misba Sikandar CRTP

90

Pakistan and Cyber Crimes: Problems and Preventions Sultan Ullah, Muhammad Aamir, Mudasser Khan, Kamran Habib , Hamid Asmat CRTP

133

Building adaptive defense against cybercrimes using real-time data mining Nouman Sami,  Baber Majid Bhatti CRTP

21

Protecting the content through learning object metadata Shaina Qamar, Syed Raza Bashir EFEK

18:45
-
19:00

Prayer Break

19:00
-
20:15

Public Talk I: Public Security (Saudi Anti-Cybercrime Law)

20:15
-
21:15

Dinner

Thursday, 12 November 2015

07:30
-
19:00

Registration

07:30
-
8:00

Refreshments

08:00
-
09:30

Exhibition

Paper Session
4

Paper No.

Paper Title Authors

Track

38

Secure Internet on Google Chrome: Client Side Anti-Tabnabbing Extension Asma K. Al-Khamis, Ayman A. Khalafallah TSDA

62

A new Chinese Wall Security Policy Model Based On the Subject’s Wall and Object’s Wall Saad Fehis, Omar Nouali, Tahar Kechadi TSDA

131

Protocols for Secure Multi-Party Private Function Evaluation Feras Aljumah, Wen Ming Liu, Mourad Debbabi, Andrei Soeanu TSDA

92

Application of New Alteration Attack on Biometric Authentication Systems Maryam Lafkih , Patrick Lacharme, Cristophe Rsoenberger, Mounia Mikram, Sanaa Ghouzali, Mohammed El Haziti, Wadood Abdul, Driss Aboutajdine TSDA

102

Digital Watermarking using Combination of Ranklets and Wavelets Zahoor Jan, Nazia Azeem, Faryal Zahoor TSDA

09:30
-
10:30

Keynote Speaker III (Cyberbullying: Dangers and Combat Strategies)

10:30
-
10:45

Coffee Break

10:45
-
11:45

Invited Talks II (Toward an Multidisciplinary Curriculum in Cyberscience)
Dr. John Impagliazzo, Professor Emeritus, Computer Science, Hofstra University, USA.
Dr. Andrew T. Phillips, Academic Dean and Provost, United States Naval Academy, USA.

11:45
-
12:45

Prayer Break / Lunch

12:45
-
14:00

Panel Discussion II

Topic

Participants

Best Practices in Confidentiality and Integrity of E-Transactions
  • Saudi Arabian Monetary Agency
  • Ministry of Communication and Information Technology
  • National Information Center
  • Ministry of Finance
  • International experts

14:00
-
15:00

Keynote Speaker IV: Dale Waterman (Public-Private Partnership to Create a Safer Digital World)

15:00
-
15:15

Prayer Break

15:15
-
16:45

Exhibition

Paper Session
5

Paper No. Paper Title

Authors

Track

52

Implementation Attacks on Post-Quantum Cryptographic Schemes Mostafa Taha, Thomas Eisenbarth CCAC

81

Fingerprinting Tor Protocol Through Wavelet Packet Decomposition Majdi Saeed Bin Salman, Sami Zhioua, Rafiul Hassan CCAC

107

Causes and Consequences of Cybercrimes: An Exploratory Study of Pakistan Adnan Riaz, Adeel Riaz CCAC

45

Big Data−An Evolving Concern for Forensic Investigators Shahzaib Tahir, Waseem Iqbal CHDF

121

Swarm Intelligence Based Author Identification for Digital Typewritten Text  Abdul Rauf Baig, Hassan Kayani CHDF

16:45
-
17:15

Coffee Break -  Prayer Break

17:15
-
18:45

Paper Session
6

Paper No.

Paper Title

Authors

Track

7

Cyber Insecurity as a Manifestation of New Form of Global Urban Vulnerability Aliyu Salisu Barau EPML

57

Sharing Copyrighted Materials by using BitTorrent in Saudi Arabia Arif Bramantoro, Soumayah AlGhannam, Mona AlAwadh, Dalal AlWeda’ah EPML

13

Discarded Hard Disks – A Treasure Trove for Cybercriminals: A Case Study of Recovered Sensitive Data from a Discarded Hard Disk Saad Zafar, Muhammad Bab SPAC

85

Toward Improving University Students Awareness of
Spam Email and Cybercrime: Case Study of Jordan
Ahmed Mansour Mohammed Manasrah, Mohammed Akour, Emad Alsukhni SPAC

77

Do people intend to purchase using their smartphone apps? The effect of the privacy concern in Malaysian buyers Zakariya Belkhamza DBPT

18:45
-
19:00

Prayer Break

19:00
-
20:15

Public Talk II: Public Security (Cybercrime: Dangers and Prevention Strategies)

20:30
-
21:15

Closing Ceremonies