Follow

Publications from 2021

PDF

Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts, Tyler Balon, Krikor Herlopian, Ibrahim Baggili, and Cinthya Grajeda-Mendez

Link

A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy, Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, and Mansour Naser Alraja

PDF

Zooming into the pandemic! A forensic analysis of the Zoom Application, Andrew Mahr, Meghan Cichon, Sophia Mateo, Cinthya Grajeda, and Ibrahim Baggili

PDF

Another Brick in the Wall: An Exploratory Analysis of Digital Forensics Programs in the United States, Syria McCullough, Stella Abudu, Ebere Onwubuariri, and Ibrahim Baggili

PDF

Forensicast: A Non-intrusive Approach & Tool for Logical Forensic Acquisition & Analysis of the Google Chromecast TV, Alex Sitterer, Nicholas Dubois, and Ibrahim Baggili

PDF

Duck Hunt: Memory Forensics of USB Attack Platforms, Tyler Thomas, Mathew Piscitelli, Bhavik Ashok Nahar, and Ibrahim Baggili

Publications from 2020

PDF

First Year Students' Experience in a Cyber World Course - An Evaluation, Frank Breitinger, Ryan Tully-Doyle, Kristen Przyborski, Lauren Beck, and Ronald S. Harichandran

PDF

Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, and Ibrahim Baggili

PDF

Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency Wallets – A Tool and Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, and Ibrahim Baggili

Publications from 2019

Link

Transfer Learning for Malware Multi-Classification, Mohamad Al Kadri, Mohamed Nassar, and Haidar Safa

PDF

Founding The Domain of AI Forensics, Ibrahim Baggili and Vahid Behzadan

PDF

Immersive Virtual Reality Attacks and the Human Joystick, Peter Casey, Ibrahim Baggili, and Ananya Yarramreddy

PDF

Inception: Virtual Space in Memory Space in Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, and Frank Breitinger

PDF

Timeline2GUI: A Log2Timeline CSV Parser and Training Scenarios, Mark Debinski, Parvathy Mohan, and Frank Breitinger

PDF

Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, and Xiaolu Zhang

PDF

On Efficiency of Artifact Lookup Strategies in Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, and Frank Breitinger

Link

Securing Aggregate Queries for DNA Databases, Mohamed Nassar, Qutaibah Malluhi, Mikhail Atallah, and Abdullatif Shikfa

Link

Throttling Malware Families in 2D, Mohamed Nassar and Haidar Safa

Link

Blockchain for Explainable and Trustworthy Artificial Intelligence, Mohamed Nassar, Khaled Salah, Muhammad Habib ur Rehman, and Davor Svetinovic

PDF

”CyberWorld” as a Theme for a University-wide First-year Common Course, Kristen Przyborski, Frank Breitinger, Lauren Beck, and Ronald S. Harichandran

Link

Benchmarking Convolutional and Recurrent Neural Networks for Malware Classification, Haidar Safa, Mohamed Nassar, and Wael Al Rahal Al Orabi

PDF

A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, and Cory Hall

Link

A Digital Transmitter Architecture with Enhanced Delay, Power and Noise Performance for Sensors and IoT Applications, Mohsen Sarraf and Fatemeh Forati

PDF

IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions, Tina Wu, Frank Breitinger, and Ibrahim Baggili

PDF

Frameup: An Incriminatory Attack on Storj: A Peer to Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, and Nicole Lang Beebe

Publications from 2018

Link

Modeling Malware as a Language, Yara Awad, Mohamed Nassar, and Haidar Safa

PDF

Survey Results on Adults and Cybersecurity Education, Frank Breitinger, Joseph Ricci, and Ibrahim Baggili

PDF

I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, and Ibrahim Baggili

PDF

Experience Constructing the Artifact Genome Project (AGP): Managing the Domain's Knowledge One Artifact at a Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, and Frank Breitinger

PDF

If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept, Trevor Haigh, Frank Breitinger, and Ibrahim Baggili

PDF

An Overview of the Usage of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, and Ibrahim Baggili

PDF

mrsh-mem: Approximate Matching on Raw Memory Dumps, Lorenz Liebler and Frank Breitinger

Link

Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees, David Lillis, Frank Breitinger, and Mark Scanlon

PDF

Digital Forensics in the Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, and Frank Breitinger

PDF

Adaptive Virtual Impedance Droop Control Based on Consensus Control of Reactive Current, Zhilin Lu, Qing Wei, Yiyi Zhang, Junhui Zhao, and Emad Manla

PDF

A Pilot Program in Internet-of-things with University and Industry Collaboration: Introduction and Lessons Learned, Mohsen Sarraf, Bijan Karimi, and Ali Golbazi

PDF

AndroParse - An Android Feature Extraction Framework & Dataset, Robert Schmicker, Frank Breitinger, and Ibrahim Baggili

PDF

Chaos Firefly Algorithm With Self-Adaptation Mutation Mechanism for Solving Large-Scale Economic Dispatch With Valve-Point Effects and Multiple Fuel Options, Yude Yang, Bori Wei, Hui Liu, Yiyi Zhang, Junhui Zhao, and Emad Manla

PDF

Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, and Ibrahim Baggili

Publications from 2017

PDF

DROP (DRone Open source Parser) Your Drone: Forensic Analysis of the DJI Phantom III, Devon R. Clark, Christopher S. Meffert, Ibrahim Baggili, and Frank Breitinger

Link

Protecting from Cloud-based SIP Flooding Attacks by Leveraging Temporal and Structural Fingerprints, Khaled Dassouki, Haidar Safa, Mohamed Nassar, and Abbas Hijazi

PDF

Leveraging the SRTP Protocol for Over-the-Network Memory Acquisition of a GE Fanuc Series 90-30, George Denton, Filip Karpisek, Frank Breitinger, and Ibrahim Baggili

PDF

Availability of Datasets for Digital Forensics–And What is Missing, Cinthya Grajeda, Frank Breitinger, and Ibrahim Baggili

PDF

Forensic State Acquisition from Internet of Things (FSAIoT): A General Framework and Practical Approach for IoT Forensics through IoT Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, and Frank Breitinger

PDF

Breaking Into the Vault: Privacy, Security and Forensic Analysis of Android Vault Applications, Xiaolu Zhang, Ibrahim Baggili, and Frank Breitinger

Publications from 2016

PDF

Exploring Deviant Hacker Networks (DHN) On Social Media Platforms, Samer al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, and Frank Breitinger

Link

On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets, Sara Barakat, Bechara al Bouna, Mohamed Nassar, and Christophe Guyeux

PDF

Anti-forensics: Furthering Digital Forensic Science Through a New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, and Frank Breitinger

PDF

Bytewise Approximate Matching: The Good, The Bad, and The Unknown, Vikram S. Harichandran, Frank Breitinger, and Ibrahim Baggili

PDF

A Cyber Forensics Needs Analysis Survey: Revisiting the Domain's Needs a Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, and Andrew Marrington

PDF

CuFA: A More Formal Definition for Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, and Frank Breitinger

PDF

Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, and Sangjin Lee

PDF

Deleting Collected Digital Evidence by Exploiting a Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, and Frank Breitinger

PDF

Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, and Frank Breitinger

Link

K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset, Mohamed Nassar, Nathalie Wehbe, and Bechara al Bouna

PDF

A Method and a Case Study for the Selection of the Best Available Tool for Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, and Ibrahim Baggili

PDF

Rapid Android Parser for Investigating DEX Files (RAPID), Xiaolu Zhang, Frank Breitinger, and Ibrahim Baggili

Publications from 2015

Link

Fast Power-Efficient Techniques for Collision Detection in Wireless Sensor Networks, Fawaz Alassery, Walid Ahmed, and Mohsen Sarraf

Link

Data Sources for Advancing Cyber Forensics: What the Social World has to Offer, Ibrahim Baggili and Frank Breitinger

Link

Watch What You Wear: Preliminary Forensic Analysis of Smart Watches, Ibrahim Baggili, Jeff Oduru, Kyle Anthony, Frank Breitinger, and Glenn McGee

PDF

Professor Frank Breitinger's Full Bibliography, Frank Breitinger

Link

How Cuckoo Filter Can Improve Existing Approximate Matching Techniques, Vikas Gupta and Frank Breitinger

PDF

An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, and Alice E. Fischer

PDF

WhatsApp Network Forensics: Decrypting and Understanding the WhatsApp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, and Frank Breitinger

Link

Paillier's Encryption: Implementation and Cloud Applications, Mohamed Nassar, Abdelkarim Erradi, and Qutaibah M. Malluhi

Link

An SQL-like Query Tool for Data Anonymization and Outsourcing, Mohamed Nassar, Adel Al-Rahal Orabi, Marwan Doha, and Bechara al Bouna

Link

Towards Bloom Filter-Based Indexing of Iris Biometric Data, Christian Rathgeb, Frank Breitinger, Harald Baier, and Christer Busch

PDF

Network and Device Forensic Analysis of Android Social-messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, and Frank Breitinger

Link

Impact of DSRC Information Content and Transmission Rate for Highway Vehicle Platoons, Lijian Xu, Lei Miao, and Junhui Zhao

PDF

An MAS Based Energy Management System for a Stand-Alone Microgrid at High Altitude, Junhui Zhao, Bo Zhao, Meidong Xue, Xuesong Zhang, and Caisheng Wang

Publications from 2014

PDF

LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, and Jason Moore

Link

Performance of a Logical, Five-Phase, Multithreaded, Bootable Triage Tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar

PDF

File Detection on Network Traffic Using Approximate Matching, Frank Breitinger and Ibrahim Baggili

PDF

On the Database Lookup Problem of Approximate Matching, Frank Breitinger, Harald Baier, and Douglas White

Link

Towards a Process Model for Hash Functions in Digital Forensics, Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey Ryibalchenko, and Martin Steinebach

Link

Reducing the Time Required for Hashing Operations, Frank Breitinger and Kaloyan Petrov

PDF

An Efficient Similarity Digests Database Lookup -- a Logarithmic Divide and Conquer Approach, Frank Breitinger, Christian Rathgeb, and Harald Baier

PDF

Automated Evaluation of Approximate Matching Algorithms on Real Data, Frank Breitinger and Vassil Roussev

Link

Using Approximate Matching to Reduce the Volume of Digital Data, Frank Breitinger, Christian Winter, York Yannikos, Tobias Fink, and Michael Seefried

Link

Similarity Hashing Based on Levenshtein Distances, Frank Breitinger, Georg Ziroff, Steffen Lange, and Harald Baier

Link

Amazon Kindle Fire HD Forensics, Asif Iqbal, Hanan Alobaidli, Andrew Marrington, and Ibrahim Baggili

Link

Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Testing the Forensic Soundness of Forensic Examination Environments on Bootable Media, Ahmed F.A.L. Mohamed, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Preliminary Forensic Analysis of the Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, and Armindo Rodrigues

PDF

Quantifying Relevance of Mobile Digital Evidence as They Relate to Case Types: A Survey and a Guide for Best Practices, Shahzad Saleem, Ibrahim Baggili, and Oliver Popov

PDF

A New Transfer Impedance Based System Equivalent Model for Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, and Junhui Zhao

PDF

A Review of Active Management for Distribution Networks: Current Status and Future Development Trends, Junhui Zhao, Bo Zhao, Feng Lin, Quan Zhou, Yang Wang, and Caisheng Wang

Publications from 2013

Link

CAT Record (Computer Activity Timeline Record): A Unified Agent Based Approach for Real Time Computer Forensic Evidence Collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal

Link

The Forensic Investigation of Android Private Browsing Sessions Using Orweb, N. Al Barghouthy, Andrew Marrington, and Ibrahim Baggili

Link

Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study, Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, and Ayesha Al Zaabi

Link

Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research, Ibrahim Baggili, Afrah BaAbdallah, deena Al-Safi, and Andrew Marrington

Link

Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2, Frank Breitinger and Harald Baier

PDF

Efficient Routing for Wireless Mesh Networks Using a Backup Path, Amir Esmailpour, Nidal Nasser, and Jehad Al Dallal

Link

Forensic Artifacts of the ChatON Instant Messaging Application, Asif Iqbal, Andrew Marrington, and Ibrahim Baggili

Link

Outbound SPIT Filter with Optimal Performance Guarantees, Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, and Guy Leduc

Link

Portable Web Browser Forensics: A Forensic Examination of the Privacy Benefits of Portable Web Browsers, Andrew Marrington, Ibrahim Baggili, T. Al Ismail, and A. Al Kaf

Link

BlackBerry PlayBook Backup Forensic Analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington

Link

Secure Outsourcing of Network Flow Data Analysis, Mohamed Nassar, Bechara al Bouna, and Qutaibah Malluhi

Link

Secure Outsourcing of Matrix Operations as a Service, Mohamed Nassar, Abdelkarim Erradi, Farida Sabri, and Qutaibah Malluhi

Link

Alignment-Free Cancelable Iris Biometric Templates Based on Adaptive Bloom Filters, Christian Rathgeb, Frank Breitinger, and Christoph Busch