Follow

Publications from 2016

PDF

Exploring Deviant Hacker Networks (DHN) On Social Media Platforms, Samer al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, and Frank Breitinger

PDF

Anti-forensics: Furthering Digital Forensic Science Through a New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, and Frank Breitinger

PDF

Bytewise Approximate Matching: The Good, The Bad, and The Unknown, Vikram S. Harichandran, Frank Breitinger, and Ibrahim Baggili

PDF

A Cyber Forensics Needs Analysis Survey: Revisiting the Domain's Needs a Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, and Andrew Marrington

PDF

CuFA: A More Formal Definition for Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, and Frank Breitinger

PDF

Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, and Sangjin Lee

PDF

Deleting Collected Digital Evidence by Exploiting a Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, and Frank Breitinger

PDF

A Method and a Case Study for the Selection of the Best Available Tool for Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, and Ibrahim Baggili

PDF

Rapid Android Parser for Investigating DEX Files (RAPID), Xiaolu Zhang, Frank Breitinger, and Ibrahim Baggili

Publications from 2015

Fast Power-Efficient Techniques for Collision Detection in Wireless Sensor Networks, Fawaz Alassery, Walid Ahmed, and Mohsen Sarraf

Link

Data Sources for Advancing Cyber Forensics: What the Social World has to Offer, Ibrahim Baggili and Frank Breitinger

Link

Watch What You Wear: Preliminary Forensic Analysis of Smart Watches, Ibrahim Baggili, Jeff Oduru, Kyle Anthony, Frank Breitinger, and Glenn McGee

PDF

Professor Frank Breitinger's Full Bibliography, Frank Breitinger

PDF

An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, and Alice E. Fischer

Link

How Cuckoo Filter Can Improve Existing Approximate Matching Techniques, Joshua I. James and Frank Breitinger

PDF

WhatsApp Network Forensics: Decrypting and Understanding the WhatsApp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, and Frank Breitinger

Link

Towards Bloom Filter-Based Indexing of Iris Biometric Data, Christian Rathgeb, Frank Breitinger, Harald Baier, and Christer Busch

PDF

Network and Device Forensic Analysis of Android Social-messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, and Frank Breitinger

Link

Impact of DSRC Information Content and Transmission Rate for Highway Vehicle Platoons, Lijian Xu, Lei Miao, and Junhui Zhao

PDF

An MAS Based Energy Management System for a Stand-Alone Microgrid at High Altitude, Junhui Zhao, Bo Zhao, Meidong Xue, Xuesong Zhang, and Caisheng Wang

Publications from 2014

PDF

LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, and Jason Moore

Link

Performance of a Logical, Five-Phase, Multithreaded, Bootable Triage Tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar

PDF

File Detection on Network Traffic Using Approximate Matching, Frank Breitinger and Ibrahim Baggili

PDF

On the Database Lookup Problem of Approximate Matching, Frank Breitinger, Harald Baier, and Douglas White

Link

Towards a Process Model for Hash Functions in Digital Forensics, Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey Ryibalchenko, and Martin Steinebach

Link

Reducing the Time Required for Hashing Operations, Frank Breitinger and Kaloyan Petrov

PDF

An Efficient Similarity Digests Database Lookup -- a Logarithmic Divide and Conquer Approach, Frank Breitinger, Christian Rathgeb, and Harald Baier

PDF

Automated Evaluation of Approximate Matching Algorithms on Real Data, Frank Breitinger and Vassil Roussev

Link

Using Approximate Matching to Reduce the Volume of Digital Data, Frank Breitinger, Christian Winter, York Yannikos, Tobias Fink, and Michael Seefried

Link

Similarity Hashing Based on Levenshtein Distances, Frank Breitinger, Georg Ziroff, Steffen Lange, and Harald Baier

Link

Amazon Kindle Fire HD Forensics, Asif Iqbal, Hanan Alobaidli, Andrew Marrington, and Ibrahim Baggili

Link

Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Testing the Forensic Soundness of Forensic Examination Environments on Bootable Media, Ahmed F.A.L. Mohamed, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Preliminary Forensic Analysis of the Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, and Armindo Rodrigues

PDF

Quantifying Relevance of Mobile Digital Evidence as They Relate to Case Types: A Survey and a Guide for Best Practices, Shahzad Saleem, Ibrahim Baggili, and Oliver Popov

PDF

A New Transfer Impedance Based System Equivalent Model for Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, and Junhui Zhao

PDF

A Review of Active Management for Distribution Networks: Current Status and Future Development Trends, Junhui Zhao, Bo Zhao, Feng Lin, Quan Zhou, Yang Wang, and Caisheng Wang

Publications from 2013

Link

CAT Record (Computer Activity Timeline Record): A Unified Agent Based Approach for Real Time Computer Forensic Evidence Collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal

Link

The Forensic Investigation of Android Private Browsing Sessions Using Orweb, N. Al Barghouthy, Andrew Marrington, and Ibrahim Baggili

Link

Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study, Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, and Ayesha Al Zaabi

Link

Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research, Ibrahim Baggili, Afrah BaAbdallah, deena Al-Safi, and Andrew Marrington

Link

Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2, Frank Breitinger and Harald Baier

PDF

Efficient Routing for Wireless Mesh Networks Using a Backup Path, Amir Esmailpour, Nidal Nasser, and Jehad Al Dallal

Link

Forensic Artifacts of the ChatON Instant Messaging Application, Asif Iqbal, Andrew Marrington, and Ibrahim Baggili

Link

Portable Web Browser Forensics: A Forensic Examination of the Privacy Benefits of Portable Web Browsers, Andrew Marrington, Ibrahim Baggili, T. Al Ismail, and A. Al Kaf

Link

BlackBerry PlayBook Backup Forensic Analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington

Link

Alignment-Free Cancelable Iris Biometric Templates Based on Adaptive Bloom Filters, Christian Rathgeb, Frank Breitinger, and Christoph Busch

Link

Incorporating Generator Equivalent Model into Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, and Junhui Zhao

Publications from 2012

PDF

IPad2 Logical Acquisition: Automated or Manual Examination?, Somaya Ali, Sumaya AlHosani, Farah AlZarooni, and Ibrahim Baggili

PDF

Forensic Analysis of Social Networking Applications on Mobile Devices, Noora Al Mutawa, Ibrahim Baggili, and Andrew Marrington

PDF

Modeling and Control of Discrete Event Systems Using Finite State Machines with Variables and Their Applications in Power Grids, Junhui Zhao, Le Yi Wang, Zhong Chen, Feng Lin, and Hongwei Zhang

Publications from 2011

Link

Forensic Artifacts of Facebook's Instant Messaging Service, Noora Al Mutawa, Ibtesam Al Mutawa, Ibrahim Baggili, and Andrew Marrington

Link

Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools, Hamda Bariki, Mariam Hashmi, and Ibrahim Baggili

PDF

Intermediate Frequency AC Signal Analysis for Bionanosensor, Veshal Desai, Srisowmya Sanisetty, Benjamin Steber, Eva Sapi, Bouzid Aliane, Saion K. Sinha, and Prabir Patra

Link

A Simple Cost-Effective Framework for IPhone Forensic Analysis, Mohammad I. Husain, Ibrahim Baggili, and Ramalingam Sridar

PDF

CAT Detect (Computer Activity Timeline Detection): A Tool for Detecting Inconsistency in Computer Activity Timelines, Andrew Marrington, Ibrahim Baggili, George Mohay, and Andrew Clark

PDF

Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, and Tahar Kechadi

Link

Towards More Secure Biometric Readers for Effective Digital Forensic Investigation, Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim Baggili, and Saad Amin

Link

Lina: A Laboratory Inventory System for Oligonucleotides, Microbial Strains, and Cell Lines, Ahmed F. Yousef, Ibrahim Baggili, G. Bartlett, Michael D. Kane, and Joe S. Mymryk

Publications from 2010

PDF

iPhone 3GS Forensics: Logical Analysis Using Apple iTunes Backup Utility, Mona Bader and Ibrahim Baggili

PDF

Generating System Requirements for a Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing the Forensic Collection of Digital Devices, Ibrahim Baggili

Link

SMIRK: SMS Management and Information Retrieval Kit, Ibrahim Baggili, Ashwin Mohan, and Marcus Rogers

Publications from 2009

PDF

Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity, Ibrahim Baggili and Marcus Rogers

Publications from 2007

Link

Mobile Phone Forensics Tool Testing: A Database Driven Approach., Ibrahim Baggili, Rick Mislan, and Marcus Rogers

PDF

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks, Christopher Martinez and Wei-Ming Lin

Publications from 2004

PDF

Project Planning & Development for Engineering Freshmen, Bouzid Aliane, Michael Collura, Samuel Bogan Daniels, and Jean Nocito-Gobel