Follow
Xiaolu Zhang
Title
Cited by
Cited by
Year
Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers
X Zhang, O Upton, NL Beebe, KKR Choo
Forensic Science International: Digital Investigation 32, 300926, 2020
782020
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications
X Zhang, I Baggili, F Breitinger
Computers & Security 70, 516-531, 2017
552017
How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform
X Zhang, KKR Choo, NL Beebe
IEEE Internet of Things Journal 6 (4), 6850-6861, 2019
422019
Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations
X Zhang, F Breitinger, E Luechinger, S O'Shaughnessy
Forensic Science International: Digital Investigation 39, 301285, 2021
322021
Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system
X Zhang, J Grannis, I Baggili, NL Beebe
Digital Investigation 29, 28-42, 2019
312019
NLP-based digital forensic investigation platform for online communications
D Sun, X Zhang, KKR Choo, L Hu, F Wang
computers & security 104, 102210, 2021
282021
Rapid Android parser for investigating DEX files (RAPID)
X Zhang, F Breitinger, I Baggili
Digital Investigation 17, 28-39, 2016
222016
Digital Forensic Education
X Zhang, KKR Choo
An Experiential Learning Approach. Switzerland: Springer, 2020
152020
Map My Murder: a digital forensic study of mobile health and fitness applications
C Hassenfeldt, S Baig, I Baggili, X Zhang
Proceedings of the 14th International Conference on Availability …, 2019
152019
An Overview of the Usage of Default Passwords
B Knierem, X Zhang, P Levine, F Breitinger, I Baggili
International Conference on Digital Forensics & Cyber Crime (ICDF2C) 2017, 2017
152017
The design and implementation of composite collaborative filtering algorithm for personalized recommendation
L Hu, W Wang, F Wang, X Zhang, K Zhao
Journal of software, 2012
132012
A design science approach to developing an integrated mobile app forensic framework
X Zhang, CZ Liu, KKR Choo, JA Alvarado
Computers & Security 105, 102226, 2021
92021
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions
X Chen, X Zhang, M Elliot, X Wang, F Wang
Computers & Security 120, 102812, 2022
82022
An efficient AC algorithm with GPU
L Hu, Z Wei, F Wang, X Zhang, K Zhao
Procedia Engineering 29, 4249-4253, 2012
82012
A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage
F Breitinger, X Zhang, D Quick
DFRWS 2022 APAC, 2022
72022
Experiential Learning in Digital Forensics
X Zhang, TT Yuen, KKR Choo
Digital Forensic Education An Experiential Learning Approach, 2019
62019
Analyzing Malware Based on Volatile Memory.
L Hu, S Song, X Zhang, Z Xie, X Meng, K Zhao
J. Networks 8 (11), 2512-2519, 2013
62013
Nonnegative matrix factorization based heterogeneous graph embedding method for trigger-action programming in IoT
Y Xing, L Hu, X Zhang, G Wu, F Wang
IEEE Transactions on Industrial Informatics 18 (2), 1231-1239, 2021
52021
Windows volatile memory forensics based on correlation analysis
X Zhang, L Hu, S Song, Z Xie, X Meng, K Zhao
Journal of Networks 9 (3), 645, 2014
42014
Badoo android and ios dating application analysis
J Long, I Cvitić, X Zhang, D Peraković, KKR Choo
Mobile Networks and Applications, 1-10, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20