Reem Bin-Hezam, Amal Bin-Essa, Nirase Fathima Abubacker
{"title":"Is the Agile Development Method the Way to Go for Small to Medium Enterprises (SMEs) In Saudi Arabia?","authors":"Reem Bin-Hezam, Amal Bin-Essa, Nirase Fathima Abubacker","doi":"10.1109/NCG.2018.8592990","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592990","url":null,"abstract":"Agile software development is based on iterative and incremental delivery of software to customers. It is mainly designed to serve dynamic and small team sizes, who are usually collocated in one place. These features make agile methodologies suitable to be applied in managing small and medium-sized enterprises (SMEs), where the number of their members is limited, and the nature of their projects is usually dynamic and flexible. This research tries to study the current state of SMEs' project management in Saudi Arabia and to what extent they are applying agile methodologies. A survey of twenty-six enterprises with different sizes reveals that most of the SMEs are following the core concepts of agile methodology, despite that more than half of them are not aware of the agile concept and its best practices. This result leads that agile methodologies are suitable to be applied to SMEs in Saudi Arabia. However, there is a need to spread awareness and deliver solutions to these enterprises that help them in adapting the best available agile practices and tools. Moreover, following these well-known practices would help to raise productivity and efficiency of their work.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"71 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133786052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aasma Khan, N. Javaid, Ghazanfar Latif, Landing Jatta, Aisha Fatima, Wahab Khan
{"title":"Cluster based and Adaptive Power Controlled Routing Protocol for Underwater Wireless Sensor Networks","authors":"Aasma Khan, N. Javaid, Ghazanfar Latif, Landing Jatta, Aisha Fatima, Wahab Khan","doi":"10.1109/NCG.2018.8592955","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592955","url":null,"abstract":"Underwater Wireless Sensor Networks (UWSNs) have been considered as an emerging and promising method for exploring and monitoring deep ocean. The UWSNs face many challenges such as noise, high transmission delays, high deployment cost, movement of nodes, energy constraints, etc. In UWSNs nodes are sparsely and unevenly deployed, that may results in void hole occurrence. Secondly low propagation speed in UWSNs causes high end-to-end delay and energy consumption. In this paper, we propose two schemes: Adaptive Transmission Range in WDFAD-DBR (ATR-WDFAD-DBR) and Cluster Based WDFAD-DBR (CBWDFAD-DBR). In aforesaid scheme to reduce the probability of void hole this scheme adjusts its transmission range when it finds a void node and then continues to forward data towards the sink. In later, to minimize end-to-end delay and energy consumption network is divided into clusters. Simulation results show that our schemes outperform compared with baseline solution in terms of average Packet Delivery Ration (PDR), average energy tax, end-to-end delay and Accumulated Propagation Distance (APD).","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116186660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Incremental Clustered Gradient Method for Wireless Sensor Networks","authors":"Anil Mahmud, Md. Akhtaruzzaman Adnan, Md Shopon","doi":"10.1109/NCG.2018.8593074","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593074","url":null,"abstract":"In wireless sensor networks, clustering is a very crucial problem. Basically clustering means grouping some specific objects based on their behavior and functionality. Clustering can be formulated for different optimization problems, such as nonsmooth, nonconvex problems. This paper is based on the review of the optimization algorithm that was proposed in the paper A Convergent Incremental Gradient Method With Constant Step Size by Blatt et al called Incremental Aggregate Gradient method. A novel algorithm called Incremental Clustered Aggregate Gradient Method was proposed in this paper to counter the shortcomings of the previous one. It has many similarities with the earlier method but it is more efficient for wireless sensor networks. The main aim of Incremental Gradient Method was to minimize the sum of continuously differentiable functions and also it required a single gradient evaluation per iteration and used a constant step size. For quadratic functions, a global linear rate of convergence was proved. It was claimed that it is more suitable for sensor networks. Although the experiments performed in this work confirm the convergence properties of it, it was found that it is not suitable for sensor networks. The proposed method addresses the flaws of the previous method as regards to sensor networks. When both algorithms operate with their respective optimal step sizes, they require approximately the same number of gradient evaluations for convergence.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124906100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The “Stuxnet” Virus of 2010 As an Example of A “APT” and Its “Recent” Variances","authors":"Sumayah Al-Rabiaah","doi":"10.1109/NCG.2018.8593143","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593143","url":null,"abstract":"Due the evolution of technology, a new class of sophisticated threats, called Advanced persistent threats (APTs), has arisen and became a pressing problem specially for the industrial security sector. APTs ignited a fire of information warfare where they form cyber-attacks with a high-risk for very critical and secured infrastructures. They targeted a specific companies and governments. The most significant feature of APTs is their ability for bypass high-profile of security systems and steal or tamper information for doing negative impacts on physical objects. Stuxnet virus is an example of APTs that has a specific target and has an ability to destroy its physical infrastructures. It did not need Internet for spreading. It revealed in 2010 and targeted Iran’s nuclear program by exploiting four zero-day vulnerabilities in Windows Operating System. In the recent years, a number of different APTs have emerged which increased researchers’ attention to analyze them in order to find solutions to protect against existing and future APTs. In this paper, we examine the majority of existing reports and research papers of Stuxnet and APTs to give an overview of characteristics, features, and operations of each of them. We cover Duqu, Flame, Shamoon and Triton as recent variances of Stuxnet. In addition, we highlight the differences and similarities between Stuxnet and these APTs to help in predicting future attacks and encourage the researchers to find solutions to protect against them.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISMSs In outsourcing Context","authors":"Moneef Almutairi, S. Riddle","doi":"10.1109/NCG.2018.8593122","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593122","url":null,"abstract":"While information systems play a vital role in modern organizations for enhancing their business operations and achieving competitive services, they are vulnerable to insider and outsider security threats such as data loss, viruses and attackers. Many organizations have realized the importance of ISMSs and adopted them to achieve their security goals. Despite the enormous benefit of ISMSs to the achievement of security goals, they are still exposed to different security and compliance challenges and needs in the outsourcing context. In this paper, we review five ISMSs (COBIT, OCTAVE, SSE-CMM, GMITS, and the ISO/IEC 2700x series) in the outsourcing context based on specific criteria. The results of this review, in addition to the strengths and weaknesses of ISMSs, are provided in this paper.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115439110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Tuza, Shatha Alarabi, Sara Alamri, Dr. Nisreen Innab
{"title":"Advanced Approach on XSSDS Technique","authors":"S. Tuza, Shatha Alarabi, Sara Alamri, Dr. Nisreen Innab","doi":"10.1109/NCG.2018.8593178","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593178","url":null,"abstract":"In order to develop web applications, the developers will need to use different technologies. The most common of these technologies are the HTML, XHTML and JavaScript. The vulnerabilities in these technologies arise many security attacks on the web applications. The most important and common one is Cross-site scripting (XSS) attack, which can be defined as code injection attack, this attack allows the attacker to execute malicious script in another user’s browser. Once the attacker gains control, he will be able to perform actions such as session-hijacking, malware-spreading, cookie-stealing and malicious redirection by embedding scripts in a web page that will get executed whenever the page is loaded. In this paper, we explore the different types of XSS attack and its impact on both server and client-side. After that, we select three server-side detection techniques, addressing how each technique work and the main weaknesses of each one, then we selected one of those techniques which is XSSDS and provide an advanced approach of it that could cover its weaknesses.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ghadeer M. Al-Sahwan, Ghena T. Al-Ghussein, Maram I. Al Qasim, Nouf M. Alshehri, Reem Z. Alhawaj, A. Almuhaideb, Naya Nagy, N. Saqib, N. A. Almubairik
{"title":"A Strong and Practical Authentication Mechanism Using PassText and OTP","authors":"Ghadeer M. Al-Sahwan, Ghena T. Al-Ghussein, Maram I. Al Qasim, Nouf M. Alshehri, Reem Z. Alhawaj, A. Almuhaideb, Naya Nagy, N. Saqib, N. A. Almubairik","doi":"10.1109/NCG.2018.8592977","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592977","url":null,"abstract":"Nowadays, especially with technology’s fast development and the constant increase of the computational power, password authentication mechanism is not enough anymore to provide complete protection which makes securing data a harder task every day. This paper aims to implement a strong authentication mechanism with a practical reauthentication technique that answers the research question “how to increase the security of the authentication mechanism without sacrificing convenience?”. The proposed solution is a combination of a text file that the user has to modify, “PassText”, and a one-time password “OTP”. This paper is based on achieving four main solution requirements: convenience, security, cost, and speed. Our proposed solution breaks the rules of security-convenience tradeoff by providing an intelligent authentication combination that provides security and convenience at the same time.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Proximity-Aware, Accessible and Personalized Public Digital Terminal An Initial Study","authors":"Mohammed Misbhauddin, Majed A. Alshamari","doi":"10.1109/NCG.2018.8593129","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593129","url":null,"abstract":"Public Digital Terminals (PDT) play a vital role in providing essential services ubiquitously to users belonging to different target groups. There is a wide array of PDTs that a common person uses frequently including Automated Teller Machines (ATM), interactive kiosks, self-service kiosks and so on to accomplish numerous day-to-day tasks. Improving the usability of PDTs has been targeted from various aspects by Human Computer Interaction researchers. Research in this area has spanned from using multimodal approaches, revised guidelines for kiosk construction, navigation restructuring, to alternative methods of user authentication to provide an improved and enhanced user-experience. The main issue with the solutions provided to this day is that they all target improving the device. Providing a personalized solution remains unanswered. The widespread use of smartphones and tablets has given rise to the next generation of e-commerce commonly known as m-commerce. Although m-commerce have made huge strides in the areas of mobile payments, the area of making use of mobile technology with public access terminals is still limited. As technology edges towards cardless and contactless transactions, we propose to provide an accessible and scalable solution to the use of PDTs using proximity-aware technology. The main objective of the work presented in this paper is to identify and discuss the feasibility of using proximity-aware solutions to address the security, privacy and accessibility concerns when using PDTs.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124995576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deema Almarri, Munaira Alhazza, Moudhi M. Aljamea, M. Mahmud
{"title":"Analysis of the Attacks on Saudi Web Companies","authors":"Deema Almarri, Munaira Alhazza, Moudhi M. Aljamea, M. Mahmud","doi":"10.1109/NCG.2018.8593131","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593131","url":null,"abstract":"Critical business relationships could be compromised due to using unprotected website and may affect the business reputation itself. The business’s website is its brand storefront, and often it’s the first contact with customers. Malicious hackers target organizations, governments, or businesses for their electronic crime. Among different hacking methods which they have, they preferred to begin with web application. It allows them to deal the most damage for the least effort. This paper present the analysis of methods of hacking web application, which hackers used in attacking most of the systems. Hackers usually performs these attacks by looking into the web overall, its architectures, and the related security risks. In addition, it discusses recent scenarios happening with perspective of the Kingdom of Saudi Arabia. As we know, hacking on Equifax website exposes data for 143 million US consumers. While focusing on Saudi market, there are 40% of companies that have been affected by internal information security incidents. At the end, a few defending methods are proposed which recommended as best practices for information security practitioners to use against hacking methods.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133526899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rahim Ullah, Ayesha Amjid, N. Javaid, M. Bilal, Aziz Ur Rehman, Mahnoor Khan
{"title":"Collaborative Buildings-to-Cloud Communication and Comparison of Service Broker Policies in Smart Grid","authors":"Rahim Ullah, Ayesha Amjid, N. Javaid, M. Bilal, Aziz Ur Rehman, Mahnoor Khan","doi":"10.1109/NCG.2018.8592987","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592987","url":null,"abstract":"To fulfill the fluctuating demands of energy, there is dire need of energy management alongside the production of electrical energy. A number of management tools such as home energy management, demand side management and demand response are in practice in many electric power systems. Energy consumption is a real time activity therefore there is need of real time decisions. For real time decisions, the big data generated from energy management tools need to be processed in real time. Big data cannot be handled through traditional systems therefore there is dire need of efficient, reliable, scalable and cost effective system. Cloud computing provides the said required resources on demand. In this paper we simulated the use of cloud computing environment in smart grid. Two service broker policies are compared in term of processing time, response time, requests per hour and cost. To control congestion on network, a collaborative model for home to building communication is also proposed.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127315679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}