Submissions from 2016
Student Perspectives of eFolios – an Experience from an Outcome-Based University, Abdallah Tubaishat
IoT end-user applications provisioning in the cloud: State of the art, Sami Yangui, Roch H. Glitho, Fatna Belqasmi, Monique J. Morrow, and Paul A. Polakos
Android device hacking tricks and countermeasures, Khulood Al Zaabi
Android forensics: Investigating social networking cybercrimes against man-in-the-middle attacks, Khulood Ali Al Zaabi
Submissions from 2015
Smart parking system for vehicles, Sripriya Srikant Adhatarao, Omar Alfandi, Arne Bochem, and Dieter Hogrefe
Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters, Monther Aldwairi and Koloud Al-Khamaiseh
Challenges of leveraging mobile sensing devices in wireless healthcare, Omar Alfandi, Suhail Ahmed, May El Barachi, and Adil Khan
Received signal strength indication for movement detection, Omar Alfandi, Arne Bochem, Kirill Bulert, Dieter Hogrefe, and Alwin Maier
Social learning on the move - A research roadmap, Dima Alhadidi, Zakaria Maamar, and Farhi Marir
Towards HSS as a virtualized service for 5G networks, Hanieh Alipour, Fatna Belqasmi, Mohammad Abu-Lebdeh, and Roch Glitho
Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington
Identification and analysis of free games' permissions in Google Play, Eiman Alothali, Fatna Belqasmi, Omar Alfandi, and Farkhund Iqbal
A new information model towards context-aware service provisioning in the Internet-of-Things, Mohab Aly, May Elbarachi, and Rachida Dssouli
A novel cryptography based privacy preserving solution for urban mobility and traffic control, Mohamad Badra and Elyes Ben Hamida
An innovative platform for person-centric health and wellness support, Oresti Banos, Muhammad Bilal Amin, Wajahat Ali Khan, Muhammad Afzel, Mahmood Ahmad, Maqbool Ali, Taqdir Ali, Rahman Ali, Muhammad Bilal, Manhyung Han, Jamil Hussain, Maqbool Hussain, Shujaat Hussain, Tae Ho Hur, Jae Hun Bang, Thien Huynh-The, Muhammad Idris, Dong Wook Kang, Sang Beom Park, Hameed Siddiqui, Le Ba Vui, Muhammad Fahim, Asad Masood Khattak, Byeong Ho Kang, and Sungyoung Lee
NGNaaS: NGNs as cloud computing services, Fatna Belqasmi, May El Barachi, Jose M.Alcaraz Calero, Mohamad Badra, and Omar Alfandi
An RFID solution for the monitoring of storage time and localization of perishable food in a distribution center, Faouzi Kamoun, Omar Alfandi, and Sami Miniaoui
Weaving risk identification into crowdsourcing lifecycle, Faouzi Kamoun, Dima Alhadidi, and Zakaria Maamar
Correlating health and wellness analytics for personalized decision making, Wajahat Ali Khan, Muhammad Idris, Taqdir Ali, Rahman Ali, Shujaat Hussain, Maqbool Hussain, Muhammad Bilal Amin, Asad Masood Khattak, Yuan Weiwei, Muhammad Afzal, Sungyoung Lee, and Byeong Ho Kang
Secure and private management of healthcare databases for data mining, Noman Mohammed, Samira Barouti, Dima Alhadidi, and Rui Chen
Interface development for a gaze-controlled reading support application, Jim Morey, John Gammack, and Erik S. Thornquist
How can one learn mathematical word problems in a second language? A cognitive load perspective, Jase Moussa-Inaty, Mark Causapin, and Timothy Groombridge
Submissions from 2014
CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal
An information security awareness program to address common security concerns in IT unit, Shadi Al Awawdeh and Abdallah Tubaishat
A comparison of forensic acquisition techniques for android devices: A case study investigation of orweb browsing sessions, Nedaa Al Barghouthy and Andrew Marrington
Ethics behind cyber warfare: A study of Arab citizens awareness, Nedaa Baker Al Barghuthi and Huwida Said
An approach for the validation of file recovery functions in digital forensics' software tools, Sultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, and Omar Alfandi
A forensic analysis framework for recovering encryption keys and BB10 backup decryption, Halima Al Shehhi, Dua'A Abu Hamdi, Izzeddin Asad, and Farkhund Iqbal
Online engineering courses: Benchmarking quality, Maurice Danaher
Digital forensics and cyber crime: Fifth international conference, ICDF2C 2013 Moscow, Russia, September 26–27, 2013 revised selected papers, Pavel Gladyshev, Andrew Marrington, and Ibrahim Baggili
Privacy-preserving medical reports publishing for cluster analysis, Ali Hmood, Benjamin C.M. Fung, and Farkhund Iqbal
Differentiated QoS for overlay-based disaster response systems, Mohammadmajid Hormati, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi
An authentication scheme to protect the location privacy of femtocell users, Mohammed Hussain
Trust in Mobile Cloud Computing with LTE-based Deployment, Mohammed Hussain and Basel Mohamed Almourad
Effective third party auditing in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad
A new business model and architecture for context-aware applications provisioning in the cloud, Nadjia Kara, May El Barachi, Abderrahmane El Bardai, and Omar Alfandi
Impact of cloud computing adoption on firm stock price - An empirical research, Adam M. Mahmood, Faruk Arslan, Jagadish Dandu, Godwin Udo, and Aurelia Nicholas-Donald
Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili
Testing the forensic soundness of forensic examination environments on bootable media, Ahmed Fathy Abdul Latif Mohamed, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili
An infrastructure for robotic applications as cloud computing services, Carla Mouradian, Fatima Zahra Errounda, Fatna Belqasmi, and Roch Glitho
Adaptive SLA-based elasticity management algorithms for a virtualized IP multimedia subsystem, Hani Nemati, Arjun Singhvi, Nadjia Kara, and May El Barachi
A RESTfull architecture for enabling rapid development and deployment of companion robot applications, Razieh Safaripour, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi
Submissions from 2013
Deploying open source software (OSS) in UAE schools, Manar Abu Talib, Mezhel Bashayer, Abdulla Huda, Khalid Reem, and Ali Zamzam
Critical structure of ethics behind offensive cyber warfare, Nedaa B. Al Barghouthi and Huwida Said
Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs, Omar Alfandi, Arne Bochem, Ansgar Kellner, and Dieter Hogrefe
BlackBerry PlayBook backup forensic analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington
Towards a unified agent-based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study, Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, and Ayesha Al Zaabi
The forensic investigation of android private browsing sessions using orweb, Nedaa Al Barghouthy, Andrew Marrington, and Ibrahim Baggili
Symmetrically-private database search in cloud computing, Samira Barouti, Dima Alhadidi, and Mourad Debbabi
An Introduction to Business Problem-Solving and Decision-Making, John C. Beachboard and Kregg Aytes
An architecture for QoS-enabled video telephony in a 3GPP 4G evolved packet core environment, Fatna Belqasmi, Hanieh Alipour, Malek El Ferjani, and Roch Glitho
The design and implementation of a wireless healthcare application for WSN-enabled IMS environments, May El Barachi and Omar Alfandi
A multi-service multi-role integrated information model for dynamic resource discovery in virtual networks, May El Barachi, Sleiman Rabah, Nadjia Kara, Rachida Dssouli, and Joey Paquet
The study of the interrelation between law programs and digital forensics in UAE Academia, Asif Iqbal, Hanan Al Obaidli, Huwida Said, and Mario Guimaraes
WCAG 1.0 versus WCAG 2.0 Web Accessibility Compliance: A Case Study, Faouzi Kamoun, Basel M. Al Mourad, and Emad Bataineh
Enhancing protection techniques of e-banking security services using open source cryptographic algorithms, Adel Khelifi, Maher Aburrous, Manar Abu Talib, and P. V.S. Shastry
A reliable mobile application for safety on roads, Adel Khelifi, Lama Mahmoud Daoud, and Manar Abu Talib
A social network-based architecture for on-line RoSCAs in the developing world, Gilles Kounou, Christian Akpona, Herve Ahouantchede, Rose Gohoue, Fatna Belqasmi, and Roch Glitho
Students' perception on the use of visual tilings to support their learning of programming concepts, Hai Ning Liang, Charles Fleming, Jim Morey, Kamran Sedig, and Ka Lok Man
Towards an efficient sales pitch with the Web of Things, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
An E-health Infrastructure Design to Support Management of Lifestyle Disease, Shah Jahan Miah, John G. Gammack, and Md. Jahidul Hasan
Innovative RFID solution for tracking and control, Sami Miniaoui and Faouzi Kamoun
Mobile phone sensing as a service: Business model and use cases, Rabeb Mizouni and May El Barachi
Paying back borrowed meanings: The implications of the metaphor-driven history of IS research for its future, Diarmuid J. Pigott, Callan F. Ledsham, Valerie J. Hobbs, and John G. Gammack
Submissions from 2012
Towards reliable web applications: ISO 19761, Manar Abu Talib, Emilia Mendes, and Adel Khelifi
Forensic analysis of social networking applications on mobile devices, Noora Al Mutawa, Ibrahim Baggili, and Andrew Marrington
A Systematic review of web resource estimation, Damir Azhar, Emilia Mendes, and Patricia Riddle
A business model for a sensors-enabled IMS environment, May El Barachi
Open virtual playground: Initial architecture and results, May El Barachi, Nadjia Kara, and Rachida Dssouli
Web effort estimation: The value of cross-company data set compared to single-company data set, Filomena Ferrucci, Federica Sarro, and Emilia Mendes
A novel method of iDevice (iPhone, iPad, iPod) forensics without jailbreaking, Babar Iqbal, Asif Iqbal, and Hanan Al Obaidli
Mining criminal networks from chat log, Farkhund Iqbal, Benjamin C.M. Fung, and Mourad Debbabi
Using visual tiling patterns to support the teaching of programming concepts, Hai Ning Liang, Jim Morey, and Kamran Sedig
Cost estimation of web applications through knowledge elicitation, Emilia Mendes
Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies, Emilia Mendes
Applying knowledge elicitation to improve web effort estimation: A case study, Emilia Mendes, Manar Abutalib, and Steve Counsell
The role of systematic reviews in identifying the state of the art in web resource estimation, Emilia Mendes and Damir Azhar
Using ISO 27001 in teaching information security, Manar Abu Talib, Adel Khelifi, and Tahsin Ugurlu
Submissions from 2011
Exploratory study on innovative use of ISO standards for IT security in the UAE, Talib Manar Abu, Adel Khelifi, and May El Barachi
Using video games to teach security, Mario Guimaraes, Huwida Said, and Richard Austin
Towards a method for engineering social web services, Zakaria Maamar, Noura Faci, Leandro Krug Wives, Hamdi Yahyaoui, and Hakim Hacid
Revitalizing the introductory programming course, Qusay Mahmoud, Manar Abu Talib, Zakaria Maamar, Emad Bataineh, and Leon Jololian
Web of things: Description, discovery and integration, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
Knowledge representation using Bayesian networks: A case study in web effort estimation, Emilia Mendes
Forensic analysis of private browsing artifacts, Huwida Said, Noora Al Mutawa, Ibtesam Al Awadhi, and Mario Guimaraes
IPhone forensics techniques and crime investigation, Huwida Said, Alya Yousif, and Hessa Humaid
Submissions from 2010
Why customers reluctant to buy from your website?, Fahim Akhter and Adam Marks
The construction of a new Lexicon design for Arabic language, Bilal Bataineh and Emad Bataineh
Is Facebook really "open" to all?, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter
Towards a service-oriented network virtualization architecture, May El Barachi, Nadjia Kara, and Rachida Dssouli
Database forensics, Mario A.M. Guimaraes, Richard Austin, and Huwida Said
Track 4 - digital ecosystem research and development, Zakaria Mammar and Yoosuf Cader
Techniques for quantitative analysis of software quality throughout the SDLC: The SWEBOK guide coverage, Manar Abu Talib, Adel Khelifi, Alain Abran, and Olga Ormandjieva
A Gulf Perspective to Using a Blended Learning Approach to Motivate Students in an Outcome-Based University, Abdallah Tubaishat and Azzedine Lansari
Submissions from 2009
Conceptual framework: How to engineer online trust for disabled users, Fahim Akhter, Maria Claudia Buzzi, Marina Buzzi, and Barbara Leporini
Usability and accessibility of eBay by screen reader, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter
User trust in ecommerce services: perception via screen reader, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter
Database and database application security, Huwida E. Said, Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian
Internet usage among Arab adolescents: Preliminary findings, Kathy Ning Shen and Maha Shakir