Page 3 - CRC2018ProgramBook_081118_final
P. 3

RSSI and Public Key Infrastructure Based Secure
          4.   K. Balan
                                      Communication in Autonomous Vehicular Networks
                                      Factors Contributing to the Success of Information Security
          5.   Mazlina Zammani
                                      Management: A Descriptive Analysis


                                                    Oral Session 5
                                             Date: 15/11/2018 (Thursday)
                                              Time: 9:45 am – 10:45 am
                                                 Venue: BM1, Block B
                                      Chairperson: Muhammad Azwan Ibrahim
                                      A Conceptual Framework of IT Security Governance and Internal
          1.   Nadianatra Musa
                                      Controls
               Muhammad Azwan  A Proposed Plan to Legalise Software for Measuring Instruments in
          2.
               Ibrahim                Malaysia
               Prof. Dr. Nazura
          3.   Abdul Manap and        The Risks of Artificial Intelligence in the Dawn of the Fourth
                                      Industrial Revolution in Malaysia
               Azrol Abdullah
               Seyedmostafa           Home of Future: Review, Healthcare Solutions,Blockchain Security
          4.
               Safavi                 and Threat Assessment



                                                    Oral Session 6
                                             Date: 15/11/2018 (Thursday)
                                              Time: 11:00 am – 12:45 pm
                                                 Venue: BM1, Block B
                                              Chairperson: Samar Kamil
               Manal Abd Al-
          1.   Jabbar Ahmad           Robotic Movement Encryption by Using Guaranteed Cellular
                                      Automata
               Mizher
                                      Optimized Data Hiding in Complemented or Non-Complemented
          2.   Samar Kamil
                                      Form in Video Steganography
                                      Acquiring and Analysing Digital Evidence - A Classroom Learning
          3.   Normaziah A. Aziz
                                      Experience
                                      A Conceptual Scheme of Ransomware Identification with
          4.   Nurfadilah Ariffin
                                      Background Knowledge from Forum
               Mohammed A. F.         A Two-stage Malware Detection Architecture Inspired by Human
          5.
               Salah                  Immune System
                                      Android Malware Detection Using Machine Learning on Image
          6.   Fauzi Mohd Darus
                                      Patterns
                                      Security and Privacy Challenges in Cloud Computing: A Road
          7.   Salasiah Abdullah
                                      Ahead
   1   2   3   4