Publications from 2013
Outbound SPIT Filter with Optimal Performance Guarantees, Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, and Guy Leduc
Portable Web Browser Forensics: A Forensic Examination of the Privacy Benefits of Portable Web Browsers, Andrew Marrington, Ibrahim Baggili, T. Al Ismail, and A. Al Kaf
BlackBerry PlayBook Backup Forensic Analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington
Secure Outsourcing of Network Flow Data Analysis, Mohamed Nassar, Bechara al Bouna, and Qutaibah Malluhi
Secure Outsourcing of Matrix Operations as a Service, Mohamed Nassar, Abdelkarim Erradi, Farida Sabri, and Qutaibah Malluhi
Alignment-Free Cancelable Iris Biometric Templates Based on Adaptive Bloom Filters, Christian Rathgeb, Frank Breitinger, and Christoph Busch
Secure and Private Outsourcing of Shape-Based Feature Extraction, Shumiao Wang, Mohamed Nassar, Mikhail Atallah, and Qutaibah Malluhi
Incorporating Generator Equivalent Model into Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, and Junhui Zhao
Publications from 2012
IPad2 Logical Acquisition: Automated or Manual Examination?, Somaya Ali, Sumaya AlHosani, Farah AlZarooni, and Ibrahim Baggili
Forensic Analysis of Social Networking Applications on Mobile Devices, Noora Al Mutawa, Ibrahim Baggili, and Andrew Marrington
RPig: A Scalable Framework for Machine Learning and Advanced Statistical Functionalities, MingXue Wang, Sidath B. Handurukande, and Mohamed Nassar
Modeling and Control of Discrete Event Systems Using Finite State Machines with Variables and Their Applications in Power Grids, Junhui Zhao, Le Yi Wang, Zhong Chen, Feng Lin, and Hongwei Zhang
Publications from 2011
Forensic Artifacts of Facebook's Instant Messaging Service, Noora Al Mutawa, Ibtesam Al Mutawa, Ibrahim Baggili, and Andrew Marrington
Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools, Hamda Bariki, Mariam Hashmi, and Ibrahim Baggili
Intermediate Frequency AC Signal Analysis for Bionanosensor, Veshal Desai, Srisowmya Sanisetty, Benjamin Steber, Eva Sapi, Bouzid Aliane, Saion K. Sinha, and Prabir Patra
Artemisa: An Open-Source Honeypot Back-End to Support Security in VoIP Domains, Rodrigo do Carmo, Mohamed Nassar, and Olivier Festor
A Simple Cost-Effective Framework for IPhone Forensic Analysis, Mohammad I. Husain, Ibrahim Baggili, and Ramalingam Sridar
CAT Detect (Computer Activity Timeline Detection): A Tool for Detecting Inconsistency in Computer Activity Timelines, Andrew Marrington, Ibrahim Baggili, George Mohay, and Andrew Clark
A Survey on Fraud and Service Misuse in Voice Over IP (VoIP) Networks, Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, and Olivier Festor
Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, and Tahar Kechadi
Towards More Secure Biometric Readers for Effective Digital Forensic Investigation, Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim Baggili, and Saad Amin
Lina: A Laboratory Inventory System for Oligonucleotides, Microbial Strains, and Cell Lines, Ahmed F. Yousef, Ibrahim Baggili, G. Bartlett, Michael D. Kane, and Joe S. Mymryk
Publications from 2010
iPhone 3GS Forensics: Logical Analysis Using Apple iTunes Backup Utility, Mona Bader and Ibrahim Baggili
SMIRK: SMS Management and Information Retrieval Kit, Ibrahim Baggili, Ashwin Mohan, and Marcus Rogers
Risk Management in VoIP Infrastructures using Support Vector Machines, Mohamed Nassar, O. Dabbebi, R. Badonnel, and O. Festor
A Framework for Monitoring SIP Enterprise Networks, Mohamed Nassar, Radu State, and Olivier Festor
Labeled VoIP Data-Set for Intrusion Detection Evaluation, Mohamed Nassar, Radu State, and Olivier Festor
Publications from 2009
Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity, Ibrahim Baggili and Marcus Rogers
VoIP Malware: Attack Tool & Attack Scenarios, Mohamed Nassar, Radu State, and Olivier Festor
Publications from 2008
Monitoring SIP Traffic Using Support Vector Machines, Mohamed Nassar, Radu State, and Olivier Festor
Publications from 2007
Mobile Phone Forensics Tool Testing: A Database Driven Approach, Ibrahim Baggili, Rick Mislan, and Marcus Rogers
An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks, Christopher Martinez and Wei-Ming Lin
Holistic VoIP Intrusion Detection and Prevention System, Mohamed Nassar, Saverio Niccolini, Radu State, and Thilo Ewald
VoIP Honeypot Architecture, Mohamed Nassar, Radu State, and Olivier Festor
Publications from 2004
Project Planning & Development for Engineering Freshmen, Bouzid Aliane, Michael Collura, Samuel Bogan Daniels, and Jean Nocito-Gobel