An intrusion and defense testbed in a cyber-power system environment J Hong, SS Wu, A Stefanov, A Fshosha, CC Liu, P Gladyshev, ... Power and Energy Society General Meeting, 1- 5, 2011 | 90* | 2011 |
BREDOLAB: Shopping in the Cybercrime Underworld D Graaf, AF Shosha, P Gladyshev 4th International Conference on Digital Forensics & Cyber Crime, 2012 | 30 | 2012 |
Detecting cyber intrusions in SCADA networks using multi-agent collaboration AF Shosha, P Gladyshev, SS Wu, CC Liu 2011 16th International conference on intelligent system applications to …, 2011 | 30 | 2011 |
Evasion-Resistant Malware Signature Based on Profiling Kernel Data Structure Objects AF Shosha, CC Liu, P Gladyshev, M Matten 7th International Conference on Risks and Security of Internet Systems …, 2012 | 24 | 2012 |
Large scale detection of IDN domain name masquerading Y Elsayed, A Shosha 2018 APWG Symposium on Electronic Crime Research (eCrime), 1-11, 2018 | 22 | 2018 |
Jsdes: An automated de-obfuscation system for malicious javascript M AbdelKhalek, A Shosha proceedings of the 12th International Conference on Availability …, 2017 | 21 | 2017 |
Digital Forensic Investigation and Cloud Computing JI James, AF Shosha, P Gladyshev, D Belfield Cybercrime and Cloud Forensics: Applications for Investigation Processes, 1-41, 2013 | 17 | 2013 |
Reverse engineering a CCTV system, a case study L Tobin, A Shosha, P Gladyshev Digital Investigation 11 (3), 179-186, 2014 | 16 | 2014 |
Digital forensic reconstruction of a program action AF Shosha, L Tobin, P Gladyshev 2013 IEEE Security and Privacy Workshops, 119-122, 2013 | 12 | 2013 |
Cyber Security and information protection in a smart grid environment SS Wu, CC Liu, AF Shosha, P Gladyshev IFAC Proceedings Volumes 44 (1), 13696-13704, 2011 | 11 | 2011 |
Malicious vbscript detection algorithm based on data-mining techniques D Wael, A Shosha, SG Sayed 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 …, 2017 | 10 | 2017 |
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes AF Shosha, JI James, A Hannaway, CC Liu, P Gladyshev 4th International Conference on Digital Forensics and Cyber Crime, ICDF2C …, 2012 | 8 | 2012 |
Towards Automated Forensic Event Reconstruction of Malicious Code AF Shosha, JI James, CC Liu, P Gladyshev 15th International Symposium on Research in Attacks, Intrusions and …, 2012 | 8 | 2012 |
Memory forensics methodology for investigating cryptocurrency protocols SS Ali, A ElAshmawy, AF Shosha Proceedings of the International Conference on Security and Management (SAM …, 2018 | 6 | 2018 |
Quantitave dynamic taint analysis of privacy leakage in android arabic apps A Youssef, AF Shosha Proceedings of the 12th International Conference on Availability …, 2017 | 6 | 2017 |
Digital forensic analysis of web-browser based attacks SM Mohamed, N Abdelbaki, AF Shosha Proceedings of the international conference on security and management (SAM …, 2016 | 4 | 2016 |
A Novel Methodology for Malware Intrusion Attack Path Reconstruction AF Shosha, JI James, P Gladyshev 3rd International Conference on Digital Forensics and Cyber Crime, ICDF2C, 2011 | 3 | 2011 |
A postmortem forensic analysis for a JavaScript based attack S Mosaad, N Abdelbaki, AF Shosha Computer and Network Security Essentials, 79-94, 2018 | 2 | 2018 |
Digital Forensic Analysis of SIM Cards MT Abdelazim, N AbdelBaki, AF Shosha Proceedings of the International Conference on Security and Management (SAM …, 2016 | 2 | 2016 |
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE JI James, AF Shosha, P Gladyhsev Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C …, 2014 | 2 | 2014 |