Submissions from 2020
State of the Art in Digital Forensics for Small Scale Digital Devices, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, and Farkhund Iqbal
4P based forensics investigation framework for smart connected toys, Benjamin Yankson, Farkhund Iqbal, and Patrick C.K. Hung
Drone Forensics: A Detailed Analysis of Emerging DJI Models, Maryam Yousef, Farkhund Iqbal, and Mohammed Hussain
Submissions from 2019
Drone forensics: A case study on DJI phantom 4, Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, and Aine MacDermott
Detection of SQL Injection Attacks: A Machine Learning Approach, Musaab Hasan, Zayed Balbahaith, and Mohammed Tarique
A comparative analysis of cyberbullying and cyberstalking laws in the UAE, US, UK and Canada, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, and Djedjiga Mouheb
Smart Home Systems Security, Abir Hussain, Deimante Marcinonyte, Farkhund Iqbal, Hissam Tawfik, Thar Baker, and Dhiya Al-Jumeily
Memory Forensics: Recovering Chat Messages and Encryption Master Key, Abdullah Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, and Khalil Al-Hussaeni
Robot computing for music visualization, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal
Towards a music visualization on robot (MVR) prototype, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal
Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild, Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled Shaban, and Abdelkarim Erradi
Submissions from 2017
Charging infrastructure placement for electric vehicles: An optimization prospective, Waleed Ejaz, M. Naeem, M. R. Ramzan, Farkhund Iqbal, and A. Anpalagan
A study of children facial recognition for privacy in smart TV, Patrick C.K. Hung, Kamen Kanev, Farkhund Iqbal, David Mettrick, Laura Rafferty, Guan Pu Pan, Shih Chia Huang, and Benjamin C.M. Fung
SONAR: Automatic detection of cyber security events over the twitter stream, Quentin Le Sceller, El Mouatez Billah Karbab, Mourad Debbabi, and Farkhund Iqbal
Submissions from 2016
Information quality of enterprise systems in healthcare: An empirical study, Ahed Abugabah
Magec: An image searching tool for detecting forged images in forensic investigation, S. Al Sharif, M. Al Ali, N. Al Reqabi, F. Iqbal, T. Baker, and A. Marrington
Fusion: Privacy-preserving distributed protocol for high-dimensional data mashup, Gaby G. Dagher, Farkhund Iqbal, Mahtab Arafati, and Benjamin C.M. Fung
Al Ain Oases Mapping Project: Qattārah Oasis, past and present (poster), Timothy Power, Peter Sheehan, Shamsa Mohamed Al Dhaheri, Mariyam Abd Al Aziz Al Hammadi, Khuloud Ibrahim Al Hammadi, Afra Adnan Al Noaimi, Ayesha Muhsen Al Subaihi, Hamda Hasan Al Omar, Fatima Thani Al-Romeithi, Muzna Khalifa Al Mansoori, Leqa Jawher Al Zaabi, Zainab Rubaiya Al Naemi, Mohamed Khalifa, and Mohamed Al Dhaheri
Submissions from 2015
Identification and analysis of free games' permissions in Google Play, Eiman Alothali, Fatna Belqasmi, Omar Alfandi, and Farkhund Iqbal
Intelligent cloud computing first international conference, ICC 2014 Muscat, Oman, february 24–26, 2014 revised selected papers, Asma Al-Saidi, Rudolf Fleischer, Zakaria Maamar, and Omer F. Rana
Distributed computing and artificial intelligence, 12th international conference, Sigeru Omatu, Qutaibah M. Malluhi, Sara Rodríguez González, Grzegorz Bocewicz, Edgardo Bucciarelli, Gianfranco Giulioni, and Farkhund Iqbal
Submissions from 2014
CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal
An approach for the validation of file recovery functions in digital forensics' software tools, Sultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, and Omar Alfandi
A forensic analysis framework for recovering encryption keys and BB10 backup decryption, Halima Al Shehhi, Dua'A Abu Hamdi, Izzeddin Asad, and Farkhund Iqbal
Analysis of the Rhode Island schumann resonance daily-average data, Robert Boldi, Earle Williams, and Anirban Guha
Privacy-preserving medical reports publishing for cluster analysis, Ali Hmood, Benjamin C.M. Fung, and Farkhund Iqbal
Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili
Submissions from 2013
Towards a unified agent-based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal
Submissions from 2012
Mining criminal networks from chat log, Farkhund Iqbal, Benjamin C.M. Fung, and Mourad Debbabi
Entrepreneurship games: Overview and their future in the UAE, Abu Talib Manar, Al Fandi Omar, Al Ammari Heba, Al Amri Asma, and Al Mansoori Asma
Submissions from 2011
Incorporating innovative practices in software engineering education, Ghazi Alkhatib, Zakaria Maamar, Ghassan Issa, Aiman Turani, Daoud Daoud, and M. Ibrahim Zaroor
Submissions from 2009
E-portfolio Assessment System for an Outcome-Based Information Technology Curriculum, Abdallah Tubaishat, Azzedine Lansari, and Akram Al-Rawi
Submissions from 2008
Globalization and state autonomy in Singapore, Habibul Haque Khondker
Exploring UAE women's experiences with IT, Maha Shakir, Kathy Shen, Shahper Vodanovich, and Cathy Urquhart
Submissions from 2005
General chair's foreword, Brian J. D'Auriol, Hamid R. Arabnia, Ping Tsai Chung, Kathy Liszka, Yi Pan, Behrooz Parhami, Antonio Pescapè, Jan Smid, Abdullah Abonamah, Tarek Alameldin, Jaafar M. Alghazo, Padma Apparao, Virendra Bhavsar, Saad Biaz, Rajendra V. Boppana, Anu Bourgeois, Herwig Bruneel, Seyed Mohamed Buhari, Henry Chan, Zhao Chen, Clincy Victor, Yuanshun Dai, Xuan Hien Dang, Filip De Turck, Frank Dehne, Thomas Engel, M. Rasit Eskicioglu, Edward E.E. Frietman, Jose Garrido, and Marina L. Gavrilova