Segui
Irfan Ahmed
Titolo
Citata da
Citata da
Anno
SCADA systems: Challenges for forensic investigators
I Ahmed, S Obermeier, M Naedele, GG Richard III
IEEE Computer 45 (12), 44-51, 2012
1592012
Programmable logic controller forensics
I Ahmed, S Obermeier, S Sudhakaran, V Roussev
IEEE Security & Privacy 15 (6), 18-24, 2017
1122017
CLIK on PLCs! Attacking Control Logic with Decompilation and Virtual PLC
S Kalle, N Ameen, H Yoo, I Ahmed
Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019
742019
SCADA network forensics of the PCCC protocol
S Senthivel, I Ahmed, V Roussev
Digital Investigation 22, S57-S65, 2017
682017
Cloud forensics–Tool development studies & future outlook
V Roussev, I Ahmed, A Barreto, S McCulley, V Shanmughan
Digital Investigation, 2016
672016
A critical cybersecurity analysis and future research directions for the Internet of Things: A comprehensive review
U Tariq, I Ahmed, AK Bashir, K Shaukat
Sensors 23 (8), 4117, 2023
662023
Control Logic Injection Attacks on Industrial Control Systems
H Yoo, I Ahmed
34th IFIP International Conference on Information Security and Privacy …, 2019
652019
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy
I Ahmed, V Roussev, W Johnson, S Senthivel, S Sudhakaran
2nd Annual Industrial Control System Security Workshop, 1-9, 2016
652016
Fast Content-Based File Type Identification
I Ahmed, KS Lhee, HJ Shin, MP Hong
7th Annual IFIP WG 11.9 International Conference on Digital Forensics, 65-75, 2011
582011
Denial of Engineering Operations Attacks in Industrial Control Systems
S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev
8th ACM Conference on Data and Application Security and Privacy (CODASPY’18), 2018
572018
Aspectdroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
472016
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions
S Bhatia, S Behal, I Ahmed
Versatile Cybersecurity 72, 46, 2018
422018
Empirical Study of PLC Authentication Protocols in Industrial Control Systems
A Ayub, H Yoo, I Ahmed
15th IEEE Workshop on Offensive Technologies (WOOT), co-located with IEEE S …, 2021
412021
Evaluation of peer instruction for cybersecurity education
P Deshpande, CB Lee, I Ahmed
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
402019
User-representative feature selection for keystroke dynamics
EA Solami, C Boyd, A Clark, I Ahmed
5th International Conference on Network and System Security (NSS'11), 229-233, 2011
402011
Classification of packet contents for malware detection
I Ahmed, K Lhee
Journal in Computer Virology, Springer 7 (4), 279-295, 2011
392011
Content-based File-type Identification Using Cosine Similarity and a Divide-and-Conquer Approach
I Ahmed, K Lhee, H Shin, M Hong
IETE Technical Review 27 (6), 465-477, 2010
382010
On Improving the Accuracy and Performance of Content-Based File Type Identification
I Ahmed, K Lhee, H Shin, MP Hong
14th Australasian Conference on Information Security and Privacy (ACISP), 44-59, 2009
382009
Security, privacy, and digital forensics in the cloud
L Chen, H Takabi, NA Le-Khac
John Wiley & Sons, 2019
372019
Gap analysis of intrusion detection in smart grids
N Kush, E Foo, E Ahmed, I Ahmed, A Clark
2nd International Cyber Resilience Conference, 38-46, 2011
372011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20