Publications from 2024
A Real-Time IoT-Based Data Acquisition and Monitoring System for Photovoltaic Applications, Adam Barbosa, Hamza Mubarak, Fazel Mohammadi, Mohammad J. Sanjari, and Mehrdad Saif
An Overview of Ancillary Services Provided by Vehicle-to-Grid Systems, Fazel Mohammadi and Mahmood Mirhashemi
Safety-Centric Analysis of Grounding Systems for Substations in Distribution Grids, Fazel Mohammadi and Mahmood Mirhashemi
Feasibility Study and Application of Electric Energy Storage Systems Embedded in HVDC and STATCOM Systems, Hani Saad, Eduardo Prieto-Araujo, Florent Morel, Paul Judge, Dragan Jovcic, Konstantin Vershinin, Anton Stepanov, Vajira Pathirana, Agusti Egea, Sascha Kubera, Fazel Mohammadi, Xueguang Wu, Hakan Ergun, Nuwan Herath, Florian Errigo, Frederick Page, Viktor Rudan, Lexuan Meng, Max Goertz, and Pierre Rault
Publications from 2021
Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts, Tyler Balon, Krikor Herlopian, Ibrahim Baggili, and Cinthya Grajeda-Mendez
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy, Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, and Mansour Naser Alraja
Zooming into the pandemic! A forensic analysis of the Zoom Application, Andrew Mahr, Meghan Cichon, Sophia Mateo, Cinthya Grajeda, and Ibrahim Baggili
Another Brick in the Wall: An Exploratory Analysis of Digital Forensics Programs in the United States, Syria McCullough, Stella Abudu, Ebere Onwubuariri, and Ibrahim Baggili
Forensicast: A Non-intrusive Approach & Tool for Logical Forensic Acquisition & Analysis of the Google Chromecast TV, Alex Sitterer, Nicholas Dubois, and Ibrahim Baggili
Duck Hunt: Memory Forensics of USB Attack Platforms, Tyler Thomas, Mathew Piscitelli, Bhavik Ashok Nahar, and Ibrahim Baggili
Publications from 2020
First Year Students' Experience in a Cyber World Course - An Evaluation, Frank Breitinger, Ryan Tully-Doyle, Kristen Przyborski, Lauren Beck, and Ronald S. Harichandran
Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality, Courtney Hassenfeldt, Jillian Jacques, and Ibrahim Baggili
Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency Wallets – A Tool and Visualization Framework, Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, and Ibrahim Baggili
Publications from 2019
Transfer Learning for Malware Multi-Classification, Mohamad Al Kadri, Mohamed Nassar, and Haidar Safa
Founding The Domain of AI Forensics, Ibrahim Baggili and Vahid Behzadan
Immersive Virtual Reality Attacks and the Human Joystick, Peter Casey, Ibrahim Baggili, and Ananya Yarramreddy
Inception: Virtual Space in Memory Space in Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, and Frank Breitinger
Timeline2GUI: A Log2Timeline CSV Parser and Training Scenarios, Mark Debinski, Parvathy Mohan, and Frank Breitinger
Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, and Xiaolu Zhang
On Efficiency of Artifact Lookup Strategies in Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, and Frank Breitinger
Securing Aggregate Queries for DNA Databases, Mohamed Nassar, Qutaibah Malluhi, Mikhail Atallah, and Abdullatif Shikfa
Throttling Malware Families in 2D, Mohamed Nassar and Haidar Safa
Blockchain for Explainable and Trustworthy Artificial Intelligence, Mohamed Nassar, Khaled Salah, Muhammad Habib ur Rehman, and Davor Svetinovic
”CyberWorld” as a Theme for a University-wide First-year Common Course, Kristen Przyborski, Frank Breitinger, Lauren Beck, and Ronald S. Harichandran
Benchmarking Convolutional and Recurrent Neural Networks for Malware Classification, Haidar Safa, Mohamed Nassar, and Wael Al Rahal Al Orabi
A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, and Cory Hall
A Digital Transmitter Architecture with Enhanced Delay, Power and Noise Performance for Sensors and IoT Applications, Mohsen Sarraf and Fatemeh Forati
IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions, Tina Wu, Frank Breitinger, and Ibrahim Baggili
Frameup: An Incriminatory Attack on Storj: A Peer to Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, and Nicole Lang Beebe
Publications from 2018
Modeling Malware as a Language, Yara Awad, Mohamed Nassar, and Haidar Safa
Survey Results on Adults and Cybersecurity Education, Frank Breitinger, Joseph Ricci, and Ibrahim Baggili
I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, and Ibrahim Baggili
Experience Constructing the Artifact Genome Project (AGP): Managing the Domain's Knowledge One Artifact at a Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, and Frank Breitinger
If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept, Trevor Haigh, Frank Breitinger, and Ibrahim Baggili
An Overview of the Usage of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, and Ibrahim Baggili
mrsh-mem: Approximate Matching on Raw Memory Dumps, Lorenz Liebler and Frank Breitinger
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees, David Lillis, Frank Breitinger, and Mark Scanlon
Digital Forensics in the Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, and Frank Breitinger
Adaptive Virtual Impedance Droop Control Based on Consensus Control of Reactive Current, Zhilin Lu, Qing Wei, Yiyi Zhang, Junhui Zhao, and Emad Manla
Electric Vehicle Battery Market Analysis: Lead Acid, Fazel Mohammadi
Electric Vehicle Battery Market Analysis: Nickel Metal Hydride, Fazel Mohammadi
A Pilot Program in Internet-of-things with University and Industry Collaboration: Introduction and Lessons Learned, Mohsen Sarraf, Bijan Karimi, and Ali Golbazi
AndroParse - An Android Feature Extraction Framework & Dataset, Robert Schmicker, Frank Breitinger, and Ibrahim Baggili
Chaos Firefly Algorithm With Self-Adaptation Mutation Mechanism for Solving Large-Scale Economic Dispatch With Valve-Point Effects and Multiple Fuel Options, Yude Yang, Bori Wei, Hui Liu, Yiyi Zhang, Junhui Zhao, and Emad Manla
Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, and Ibrahim Baggili
Publications from 2017
DROP (DRone Open source Parser) Your Drone: Forensic Analysis of the DJI Phantom III, Devon R. Clark, Christopher S. Meffert, Ibrahim Baggili, and Frank Breitinger
Protecting from Cloud-based SIP Flooding Attacks by Leveraging Temporal and Structural Fingerprints, Khaled Dassouki, Haidar Safa, Mohamed Nassar, and Abbas Hijazi
Leveraging the SRTP Protocol for Over-the-Network Memory Acquisition of a GE Fanuc Series 90-30, George Denton, Filip Karpisek, Frank Breitinger, and Ibrahim Baggili
Availability of Datasets for Digital Forensics–And What is Missing, Cinthya Grajeda, Frank Breitinger, and Ibrahim Baggili
Forensic State Acquisition from Internet of Things (FSAIoT): A General Framework and Practical Approach for IoT Forensics through IoT Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, and Frank Breitinger
Breaking Into the Vault: Privacy, Security and Forensic Analysis of Android Vault Applications, Xiaolu Zhang, Ibrahim Baggili, and Frank Breitinger
Publications from 2016
Exploring Deviant Hacker Networks (DHN) On Social Media Platforms, Samer al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, and Frank Breitinger
On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets, Sara Barakat, Bechara al Bouna, Mohamed Nassar, and Christophe Guyeux
Anti-forensics: Furthering Digital Forensic Science Through a New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, and Frank Breitinger
Bytewise Approximate Matching: The Good, The Bad, and The Unknown, Vikram S. Harichandran, Frank Breitinger, and Ibrahim Baggili
A Cyber Forensics Needs Analysis Survey: Revisiting the Domain's Needs a Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, and Andrew Marrington
CuFA: A More Formal Definition for Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, and Frank Breitinger
Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, and Sangjin Lee
Deleting Collected Digital Evidence by Exploiting a Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, and Frank Breitinger
Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, and Frank Breitinger
K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset, Mohamed Nassar, Nathalie Wehbe, and Bechara al Bouna
A Method and a Case Study for the Selection of the Best Available Tool for Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, and Ibrahim Baggili
Rapid Android Parser for Investigating DEX Files (RAPID), Xiaolu Zhang, Frank Breitinger, and Ibrahim Baggili
Publications from 2015
Fast Power-Efficient Techniques for Collision Detection in Wireless Sensor Networks, Fawaz Alassery, Walid Ahmed, and Mohsen Sarraf
Data Sources for Advancing Cyber Forensics: What the Social World has to Offer, Ibrahim Baggili and Frank Breitinger
Watch What You Wear: Preliminary Forensic Analysis of Smart Watches, Ibrahim Baggili, Jeff Oduru, Kyle Anthony, Frank Breitinger, and Glenn McGee
Professor Frank Breitinger's Full Bibliography, Frank Breitinger
How Cuckoo Filter Can Improve Existing Approximate Matching Techniques, Vikas Gupta and Frank Breitinger
An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, and Alice E. Fischer
WhatsApp Network Forensics: Decrypting and Understanding the WhatsApp Call Signaling Messages, Filip Karpisek, Ibrahim Baggili, and Frank Breitinger
Paillier's Encryption: Implementation and Cloud Applications, Mohamed Nassar, Abdelkarim Erradi, and Qutaibah M. Malluhi
An SQL-like Query Tool for Data Anonymization and Outsourcing, Mohamed Nassar, Adel Al-Rahal Orabi, Marwan Doha, and Bechara al Bouna
Towards Bloom Filter-Based Indexing of Iris Biometric Data, Christian Rathgeb, Frank Breitinger, Harald Baier, and Christer Busch
Network and Device Forensic Analysis of Android Social-messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, and Frank Breitinger
Impact of DSRC Information Content and Transmission Rate for Highway Vehicle Platoons, Lijian Xu, Lei Miao, and Junhui Zhao
An MAS Based Energy Management System for a Stand-Alone Microgrid at High Altitude, Junhui Zhao, Bo Zhao, Meidong Xue, Xuesong Zhang, and Caisheng Wang
Publications from 2014
LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, and Jason Moore
Performance of a Logical, Five-Phase, Multithreaded, Bootable Triage Tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar
File Detection on Network Traffic Using Approximate Matching, Frank Breitinger and Ibrahim Baggili
On the Database Lookup Problem of Approximate Matching, Frank Breitinger, Harald Baier, and Douglas White
Towards a Process Model for Hash Functions in Digital Forensics, Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey Ryibalchenko, and Martin Steinebach
Reducing the Time Required for Hashing Operations, Frank Breitinger and Kaloyan Petrov
An Efficient Similarity Digests Database Lookup -- a Logarithmic Divide and Conquer Approach, Frank Breitinger, Christian Rathgeb, and Harald Baier
Automated Evaluation of Approximate Matching Algorithms on Real Data, Frank Breitinger and Vassil Roussev
Using Approximate Matching to Reduce the Volume of Digital Data, Frank Breitinger, Christian Winter, York Yannikos, Tobias Fink, and Michael Seefried
Similarity Hashing Based on Levenshtein Distances, Frank Breitinger, Georg Ziroff, Steffen Lange, and Harald Baier
Amazon Kindle Fire HD Forensics, Asif Iqbal, Hanan Alobaidli, Andrew Marrington, and Ibrahim Baggili
Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili
Testing the Forensic Soundness of Forensic Examination Environments on Bootable Media, Ahmed F.A.L. Mohamed, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili
Preliminary Forensic Analysis of the Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, and Armindo Rodrigues
Quantifying Relevance of Mobile Digital Evidence as They Relate to Case Types: A Survey and a Guide for Best Practices, Shahzad Saleem, Ibrahim Baggili, and Oliver Popov
A New Transfer Impedance Based System Equivalent Model for Voltage Stability Analysis, Yang Wang, Caisheng Wang, Feng Lin, Wenyuan Li, Le Yi Wang, and Junhui Zhao
A Review of Active Management for Distribution Networks: Current Status and Future Development Trends, Junhui Zhao, Bo Zhao, Feng Lin, Quan Zhou, Yang Wang, and Caisheng Wang
Publications from 2013
CAT Record (Computer Activity Timeline Record): A Unified Agent Based Approach for Real Time Computer Forensic Evidence Collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal
The Forensic Investigation of Android Private Browsing Sessions Using Orweb, N. Al Barghouthy, Andrew Marrington, and Ibrahim Baggili
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study, Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, and Ayesha Al Zaabi
Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research, Ibrahim Baggili, Afrah BaAbdallah, deena Al-Safi, and Andrew Marrington
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2, Frank Breitinger and Harald Baier
Efficient Routing for Wireless Mesh Networks Using a Backup Path, Amir Esmailpour, Nidal Nasser, and Jehad Al Dallal
Forensic Artifacts of the ChatON Instant Messaging Application, Asif Iqbal, Andrew Marrington, and Ibrahim Baggili