Irfan Ahmed
Cited by
Cited by
SCADA systems: Challenges for forensic investigators
I Ahmed, S Obermeier, M Naedele, GG Richard III
IEEE Computer 45 (12), 44-51, 2012
A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review
U Tariq, I Ahmed, AK Bashir, K Shaukat
Sensors 23 (8), 4117, 2023
Programmable logic controller forensics
I Ahmed, S Obermeier, S Sudhakaran, V Roussev
IEEE Security & Privacy 15 (6), 18-24, 2017
CLIK on PLCs! Attacking Control Logic with Decompilation and Virtual PLC
S Kalle, N Ameen, H Yoo, I Ahmed
Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019
Control Logic Injection Attacks on Industrial Control Systems
H Yoo, I Ahmed
34th IFIP International Conference on Information Security and Privacy …, 2019
SCADA network forensics of the PCCC protocol
S Senthivel, I Ahmed, V Roussev
Digital Investigation 22, S57-S65, 2017
Cloud forensics–Tool development studies & future outlook
V Roussev, I Ahmed, A Barreto, S McCulley, V Shanmughan
Digital Investigation, 2016
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy
I Ahmed, V Roussev, W Johnson, S Senthivel, S Sudhakaran
2nd Annual Industrial Control System Security Workshop, 1-9, 2016
Denial of Engineering Operations Attacks in Industrial Control Systems
S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev
8th ACM Conference on Data and Application Security and Privacy (CODASPY’18), 2018
Fast Content-Based File Type Identification
I Ahmed, KS Lhee, HJ Shin, MP Hong
7th Annual IFIP WG 11.9 International Conference on Digital Forensics, 65-75, 2011
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions
S Bhatia, S Behal, I Ahmed
Versatile Cybersecurity 72, 46, 2018
AspectDroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Empirical Study of PLC Authentication Protocols in Industrial Control Systems
A Ayub, H Yoo, I Ahmed
15th IEEE Workshop on Offensive Technologies (WOOT), co-located with IEEE S …, 2021
Evaluation of peer instruction for cybersecurity education
P Deshpande, CB Lee, I Ahmed
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
User-representative feature selection for keystroke dynamics
EA Solami, C Boyd, A Clark, I Ahmed
5th International Conference on Network and System Security (NSS'11), 229-233, 2011
Classification of packet contents for malware detection
I Ahmed, K Lhee
Journal in Computer Virology, Springer 7 (4), 279-295, 2011
Overshadow PLC to Detect Remote Control-Logic Injection Attacks
H Yoo, S Kalle, J Smith, I Ahmed
16th SIG SIDAR Conference on Detection of Intrusions and Malware …, 2019
Security, privacy, and digital forensics in the cloud
L Chen, H Takabi, NA Le-Khac
John Wiley & Sons, 2019
Content-based File-type Identification Using Cosine Similarity and a Divide-and-Conquer Approach
I Ahmed, K Lhee, H Shin, M Hong
IETE Technical Review 27 (6), 465-477, 2010
On Improving the Accuracy and Performance of Content-Based File Type Identification
I Ahmed, K Lhee, H Shin, MP Hong
14th Australasian Conference on Information Security and Privacy (ACISP), 44-59, 2009
The system can't perform the operation now. Try again later.
Articles 1–20