Irfan Ahmed
Titel
Zitiert von
Zitiert von
Jahr
SCADA systems: Challenges for forensic investigators
I Ahmed, S Obermeier, M Naedele, GG Richard III
IEEE Computer 45 (12), 44-51, 2012
942012
Fast Content-Based File Type Identification
I Ahmed, KS Lhee, HJ Shin, MP Hong
7th Annual IFIP WG 11.9 International Conference on Digital Forensics, 65-75, 2011
342011
Cloud forensics–Tool development studies & future outlook
V Roussev, I Ahmed, A Barreto, S McCulley, V Shanmughan
Digital Investigation, 2016
312016
On Improving the Accuracy and Performance of Content-Based File Type Identification
I Ahmed, K Lhee, H Shin, MP Hong
14th Australasian Conference on Information Security and Privacy (ACISP), 44-59, 2009
302009
Programmable logic controller forensics
I Ahmed, S Obermeier, S Sudhakaran, V Roussev
IEEE Security & Privacy 15 (6), 18-24, 2017
272017
Classification of packet contents for malware detection
I Ahmed, K Lhee
Journal in Computer Virology, Springer 7 (4), 279-295, 2011
272011
Fast file-type identification
I Ahmed, K Lhee, H Shin, MP Hong
25th ACM Symposium On Applied Computing (SAC), 1601-1602, 2010
272010
Aspectdroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
262016
User-representative feature selection for keystroke dynamics
EA Solami, C Boyd, A Clark, I Ahmed
5th International Conference on Network and System Security (NSS'11), 229-233, 2011
242011
Gap analysis of intrusion detection in smart grids
N Kush, E Foo, E Ahmed, I Ahmed, A Clark
2nd International Cyber Resilience Conference, 38-46, 2011
242011
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy
I Ahmed, V Roussev, W Johnson, S Senthivel, S Sudhakaran
2nd Annual Industrial Control System Security Workshop, 1-9, 2016
232016
Content-based File-type Identification Using Cosine Similarity and a Divide-and-Conquer Approach
I Ahmed, K Lhee, H Shin, M Hong
IETE Technical Review 27 (6), 465-477, 2010
212010
SCADA network forensics of the PCCC protocol
S Senthivel, I Ahmed, V Roussev
Digital Investigation 22, S57-S65, 2017
202017
OpSeq: Android Malware Fingerprinting
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
PPREW-5 Proceedings of the 5th Program Protection and Reverse Engineering …, 2015
202015
Forensic acquisition of cloud drives
V Roussev, A Barreto, I Ahmed
arXiv preprint arXiv:1603.06542, 2016
152016
ModChecker: Kernel Module Integrity Checking in the Cloud Environment
I Ahmed, A Zoranic, S Javaid, GG Richard III
41st International Conference on Parallel Processing Workshops (ICPPW), 306-313, 2012
152012
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection
I Ahmed, GG Richard III, A Zoranic, V Roussev
16th Information Security Conference (ISC'13), 2013
132013
Denial of Engineering Operations Attacks in Industrial Control Systems
S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev
8th ACM Conference on Data and Application Security and Privacy (CODASPY’18), 2018
122018
Using Virtual Machine Introspection for Operating Systems Security Education
M Bhatt, I Ahmed, Z Lin
49th ACM Technical Symposium on Computer Science Education (SIGCSE), 2018
112018
Development of Peer Instruction Questions for Cybersecurity Education
W Johnson, A Luzader, I Ahmed, V Roussev, G Richard III, C Lee
USENIX Advances in Security Education Workshop (ASE’16), 25th USENIX …, 2016
112016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20