Follow

Publications from 2013

Link

Outbound SPIT Filter with Optimal Performance Guarantees, Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, and Guy Leduc

Link

Portable Web Browser Forensics: A Forensic Examination of the Privacy Benefits of Portable Web Browsers, Andrew Marrington, Ibrahim Baggili, T. Al Ismail, and A. Al Kaf

Link

BlackBerry PlayBook Backup Forensic Analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington

Link

Secure Outsourcing of Network Flow Data Analysis, Mohamed Nassar, Bechara al Bouna, and Qutaibah Malluhi

Link

Secure Outsourcing of Matrix Operations as a Service, Mohamed Nassar, Abdelkarim Erradi, Farida Sabri, and Qutaibah Malluhi

Link

Alignment-Free Cancelable Iris Biometric Templates Based on Adaptive Bloom Filters, Christian Rathgeb, Frank Breitinger, and Christoph Busch

Link

Secure and Private Outsourcing of Shape-Based Feature Extraction, Shumiao Wang, Mohamed Nassar, Mikhail Atallah, and Qutaibah Malluhi

Link

Incorporating Generator Equivalent Model into Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, and Junhui Zhao

Publications from 2012

PDF

IPad2 Logical Acquisition: Automated or Manual Examination?, Somaya Ali, Sumaya AlHosani, Farah AlZarooni, and Ibrahim Baggili

PDF

Forensic Analysis of Social Networking Applications on Mobile Devices, Noora Al Mutawa, Ibrahim Baggili, and Andrew Marrington

Link

RPig: A Scalable Framework for Machine Learning and Advanced Statistical Functionalities, MingXue Wang, Sidath B. Handurukande, and Mohamed Nassar

PDF

Modeling and Control of Discrete Event Systems Using Finite State Machines with Variables and Their Applications in Power Grids, Junhui Zhao, Le Yi Wang, Zhong Chen, Feng Lin, and Hongwei Zhang

Publications from 2011

Link

Forensic Artifacts of Facebook's Instant Messaging Service, Noora Al Mutawa, Ibtesam Al Mutawa, Ibrahim Baggili, and Andrew Marrington

Link

Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools, Hamda Bariki, Mariam Hashmi, and Ibrahim Baggili

PDF

Intermediate Frequency AC Signal Analysis for Bionanosensor, Veshal Desai, Srisowmya Sanisetty, Benjamin Steber, Eva Sapi, Bouzid Aliane, Saion K. Sinha, and Prabir Patra

Link

Artemisa: An Open-Source Honeypot Back-End to Support Security in VoIP Domains, Rodrigo do Carmo, Mohamed Nassar, and Olivier Festor

Link

A Simple Cost-Effective Framework for IPhone Forensic Analysis, Mohammad I. Husain, Ibrahim Baggili, and Ramalingam Sridar

PDF

CAT Detect (Computer Activity Timeline Detection): A Tool for Detecting Inconsistency in Computer Activity Timelines, Andrew Marrington, Ibrahim Baggili, George Mohay, and Andrew Clark

Link

A Survey on Fraud and Service Misuse in Voice Over IP (VoIP) Networks, Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, and Olivier Festor

PDF

Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, and Tahar Kechadi

Link

Towards More Secure Biometric Readers for Effective Digital Forensic Investigation, Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim Baggili, and Saad Amin

Link

Lina: A Laboratory Inventory System for Oligonucleotides, Microbial Strains, and Cell Lines, Ahmed F. Yousef, Ibrahim Baggili, G. Bartlett, Michael D. Kane, and Joe S. Mymryk

Publications from 2010

PDF

iPhone 3GS Forensics: Logical Analysis Using Apple iTunes Backup Utility, Mona Bader and Ibrahim Baggili

PDF

Generating System Requirements for a Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing the Forensic Collection of Digital Devices, Ibrahim Baggili

Link

SMIRK: SMS Management and Information Retrieval Kit, Ibrahim Baggili, Ashwin Mohan, and Marcus Rogers

Link

Risk Management in VoIP Infrastructures using Support Vector Machines, Mohamed Nassar, O. Dabbebi, R. Badonnel, and O. Festor

Link

A Framework for Monitoring SIP Enterprise Networks, Mohamed Nassar, Radu State, and Olivier Festor

Link

Labeled VoIP Data-Set for Intrusion Detection Evaluation, Mohamed Nassar, Radu State, and Olivier Festor

Publications from 2009

PDF

Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity, Ibrahim Baggili and Marcus Rogers

Link

VoIP Malware: Attack Tool & Attack Scenarios, Mohamed Nassar, Radu State, and Olivier Festor

Publications from 2008

Link

Monitoring SIP Traffic Using Support Vector Machines, Mohamed Nassar, Radu State, and Olivier Festor

Publications from 2007

Link

Mobile Phone Forensics Tool Testing: A Database Driven Approach, Ibrahim Baggili, Rick Mislan, and Marcus Rogers

PDF

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks, Christopher Martinez and Wei-Ming Lin

Link

Holistic VoIP Intrusion Detection and Prevention System, Mohamed Nassar, Saverio Niccolini, Radu State, and Thilo Ewald

Link

VoIP Honeypot Architecture, Mohamed Nassar, Radu State, and Olivier Festor

Publications from 2004

PDF

Project Planning & Development for Engineering Freshmen, Bouzid Aliane, Michael Collura, Samuel Bogan Daniels, and Jean Nocito-Gobel