Citation indices
 AllSince 2009
Citations174171
h-index88
i10-index55
Citations to my articles
Citations to my articles
Show: 1-50
Title / AuthorCited by Year
Testing the forensic soundness of forensic examination environments on bootable media
AFAL Mohamed, A Marrington, F Iqbal, I Baggili
Digital Investigation 11, S22-S29
2014
Preliminary forensic analysis of the Xbox One
J Moore, I Baggili, A Marrington, A Rodrigues
Digital Investigation 11, S57-S65
2014
Quantifying the Danger of Mobile Banking Applications on the Android Platform
B Ferris, J Stahle, I Baggili
9th Annual Symposium on Information Assurance (ASIA’14), 65
2014
Towards a unified agent-based approach for real time computer forensic evidence collection
SA Awawdeh, I Baggili, A Marrington, F Iqbal
Proceedings of the 2013 IEEE/ACM International Conference on Advances in ...
2013
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
K Ruan, J Carthy, T Kechadi, I Baggili
Digital Investigation 10 (1), 34-43
 4 2013
The forensic investigation of android private browsing sessions using orweb
NA Barghouthy, A Marrington, I Baggili
Computer Science and Information Technology (CSIT), 2013 5th International ...
32013
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
K Ruan, C Joe, K Tahar, I Baggili
Digital Investigation
42013
Step into Programming with Visual Basic .NET 4th Edition
IB G Ravai
Kendall Hunt Publishing
2013
Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research
I Baggili, A BaAbdallah, D Al-Safi, A Marrington
Digital Forensics and Cyber Crime, 144-157
2013
Blackberry playbook backup forensic analysis
M Al Marzougy, I Baggili, A Marrington
Digital Forensics and Cyber Crime, 239-252
22013
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study
I Baggili, M Al Shamlan, B Al Jabri, A Al Zaabi
Digital Forensics and Cyber Crime, 91-108
2013
Adv. Cyber Forensics Res. Lab., Zayed Univ., Dubai, United Arab Emirates
A Marrington, I Baggili, T Al Ismail, A Al Kaf
Computer Systems and Industrial Informatics (ICCSII), 2012 International ...
2012
Forensic analysis of social networking applications on mobile devices
N Al Mutawa, I Baggili, A Marrington
Digital Investigation 9, S24-S33
212012
Cloud forensics definitions and critical criteria for cloud forensic capability: an analysis of survey results
K Ruan, I Baggili, J Cathy, T Kechadi
Digital Investigation
22012
Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers
A Marrington, I Baggili, T Al Ismail, A Al Kaf
Computer Systems and Industrial Informatics (ICCSII), 2012 International ...
22012
iPad2 logical acquisition: Automated or manual examination?
I Ali, S., AlHosani, S., AlZarooni, F., & Baggili
7th (2012) Conference on Digital Forensics Security and Law
2012
Forensic artifacts of Facebook's instant messaging service
N Al Mutawa, I Al Awadhi, I Baggili, A Marrington
Internet Technology and Secured Transactions (ICITST), 2011 International ...
92011
CAT Detect (computer activity timeline detection): a Tool for Detecting Inconsistency in Computer Activity Timelines
A Marrington, I Baggili, G Mohay, A Clark
digital investigation 8, S52-S61
42011
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
K Ruan, J Carthy, T Kechadi
6th annual conference of the ADFSL Conference on Digital Forensics, Security ...
222011
LINA: A Laboratory Inventory System for Oligonucleotides, Microbial Strains, and Cell Lines
AF Yousef, IM Baggili, G Bartlett, MD Kane, JS Mymryk
Journal of Laboratory Automation 16 (1), 82-89
22011
Reliable acquisition of RAM dumps from Intel-based Apple Mac computers over FireWire
P Gladyshev, A Almansoori
Digital Forensics and Cyber Crime Edited by Ibrahim Baggili, 55-64
22011
Dealing with the problem of cybercrime
A Alkaabi, G Mohay, A McCullagh, N Chantler
Digital Forensics and Cyber Crime Edited by Ibrahim Baggili, 1-18
32011
Forensic data carving
D Povar, VK Bhadran
Digital Forensics and Cyber Crime Edited by Ibrahim Baggili, 137-148
62011
Signature based detection of user events for post-mortem forensic analysis
JI James, P Gladyshev, Y Zhu
Digital Forensics and Cyber Crime Edited by Ibrahim Baggili, 96-109
82011
Protecting Digital Evidence Integrity by Using Smart Cards
S Saleem, O Popov
Digital Forensics and Cyber Crime Edited by Ibrahim Baggili, 110-119
12011
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
TK Keyun Ruan, Ibrahim Baggili, Joe Carthy
Journal of Network Forensics 3 (1)
 22 2011
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
TK Keyun Ruan, Ibrahim Baggili, Joe Carthy
Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and ...
 22 2011
A simple cost-effective framework for iPhone forensic analysis
MI Husain, I Baggili, R Sridhar
Digital Forensics and Cyber Crime, 27-37
62011
Defining a standard for reporting digital evidence items in computer forensic tools
H Bariki, M Hashmi, I Baggili
Digital Forensics and Cyber Crime, 78-95
32011
Towards More Secure Biometric Readers for Effective Digital Forensic Investigation
Z Trabelsi, M Al-Hemairy, I Baggili, S Amin
Digital Forensics and Cyber Crime, 65-77
2011
iPhone 3GS forensics: logical analysis using apple itunes backup utility
M Bader, I Baggili
Small scale digital device forensics journal 4 (1), 1-15
272010
Step into Programming with Visual Basic .NET 3rd Edition
G Ravai, I Baggili
Kendall Hunt Publishing
2010
Digital Forensics and Cyber Crime, Second International ICST Conference
I Baggili
Springer
2010
SMIRK: SMS Management and Information Retrieval Kit
I Baggili, A Mohan, M Rogers
Digital Forensics and Cyber Crime, 33-42
12010
Authorship attribution of SMS messages using an N-grams approach
A Mohan, IM Baggili, MK Rogers
CERIAS Tech Report 2011
92010
GRADUATE SCHOOL
I Baggili
Purdue University
2009
Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity
I Baggili, M Rogers
International Journal of Cyber Criminology 3 (2), 550-565
32009
Step Into Programming with Visual Basic. Net 3rd Edition
R Guity
Kendall/Hunt Publishing Co.
2009
GENERATING SYSTEM REQUIREMENTS FOR A MOBILE DIGITAL DEVICE COLLECTION SYSTEM: A PRELIMINARY STEP TOWARDS ENHANCING THE FORENSIC COLLECTION OF DIGITAL DEVICES
I Baggili
European and Mediterranean Conference on Information Systems 2010
2009
Effects of anonymity, pre-employment integrity and antisocial behavior on self-reported cyber crime engagement: an exploratory study
IM Baggili, MK Adviser-Rogers
Purdue University
22009
Step into Programming with Visual Basic .NET 2nd Edition
G Ravai, I Baggili
Kendall Hunt Publishing
2008
Step into Programming with Visual Basic .NET 1st Edition
G Ravai, I Baggili
Kendall Hunt Publishing
2007
Mobile phone forensics tool testing: A database driven approach
IM Baggili, R Mislan, M Rogers
International Journal of Digital Evidence 6 (2), 168-178
152007
Diabetic e-management system (DEMS)
KD Lutes, K Chang, IM Baggili
Information Technology: New Generations, 2006. ITNG 2006. Third ...
162006
Forensic Scene Documentation Using Mobile Technology
I Baggili
Proceedings of the 2006 ADFSL Conference on Digital Forensics, Security and ...
2006
Amazon Kindle Fire HD Forensics
A Iqbal, H Alobaidli, I Baggili, A Marrington
Forensic artifacts of the ChatON Instant Messaging application
A Iqbal, A Marrington, I Baggili
1
EDUCATION AND CERTIFICATION How do the courts and the forensic community define an “expert?” By which standards do we judge these experts? Some argue this should be determined by a set of criteria such as knowledge, skill, and ability. Others argue this must be furthered by the introduction of a formal degree program. 2 While both are valid arguments for defining experts, it is necessary to merge both criteria in order to determine who is a qualified DF expert.
IBM Kiley
Diabetic e-Management System (2006)
KD Lutes, K Chang, IM Baggili
Proceedings of the Third International Conference on Information Technology ...
Digital Forensics: A Brief Overview of Critical Issues
I Baggili
Show: 1-50
Dates and citation counts are estimated and are determined automatically by a computer program.
©2013 Google - About Google Scholar - All About Google - Provide feedback - My Citations