Follow
Ahmed F. Shosha
Ahmed F. Shosha
Verified email at ucdconnect.ie
Title
Cited by
Cited by
Year
An intrusion and defense testbed in a cyber-power system environment
J Hong, SS Wu, A Stefanov, A Fshosha, CC Liu, P Gladyshev, ...
Power and Energy Society General Meeting, 1- 5, 2011
90*2011
BREDOLAB: Shopping in the Cybercrime Underworld
D Graaf, AF Shosha, P Gladyshev
4th International Conference on Digital Forensics & Cyber Crime, 2012
302012
Detecting cyber intrusions in SCADA networks using multi-agent collaboration
AF Shosha, P Gladyshev, SS Wu, CC Liu
2011 16th International conference on intelligent system applications to …, 2011
302011
Evasion-Resistant Malware Signature Based on Profiling Kernel Data Structure Objects
AF Shosha, CC Liu, P Gladyshev, M Matten
7th International Conference on Risks and Security of Internet Systems …, 2012
242012
Large scale detection of IDN domain name masquerading
Y Elsayed, A Shosha
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-11, 2018
222018
Jsdes: An automated de-obfuscation system for malicious javascript
M AbdelKhalek, A Shosha
proceedings of the 12th International Conference on Availability …, 2017
212017
Digital Forensic Investigation and Cloud Computing
JI James, AF Shosha, P Gladyshev, D Belfield
Cybercrime and Cloud Forensics: Applications for Investigation Processes, 1-41, 2013
172013
Reverse engineering a CCTV system, a case study
L Tobin, A Shosha, P Gladyshev
Digital Investigation 11 (3), 179-186, 2014
162014
Digital forensic reconstruction of a program action
AF Shosha, L Tobin, P Gladyshev
2013 IEEE Security and Privacy Workshops, 119-122, 2013
122013
Cyber Security and information protection in a smart grid environment
SS Wu, CC Liu, AF Shosha, P Gladyshev
IFAC Proceedings Volumes 44 (1), 13696-13704, 2011
112011
Malicious vbscript detection algorithm based on data-mining techniques
D Wael, A Shosha, SG Sayed
2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 …, 2017
102017
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes
AF Shosha, JI James, A Hannaway, CC Liu, P Gladyshev
4th International Conference on Digital Forensics and Cyber Crime, ICDF2C …, 2012
82012
Towards Automated Forensic Event Reconstruction of Malicious Code
AF Shosha, JI James, CC Liu, P Gladyshev
15th International Symposium on Research in Attacks, Intrusions and …, 2012
82012
Memory forensics methodology for investigating cryptocurrency protocols
SS Ali, A ElAshmawy, AF Shosha
Proceedings of the International Conference on Security and Management (SAM …, 2018
62018
Quantitave dynamic taint analysis of privacy leakage in android arabic apps
A Youssef, AF Shosha
Proceedings of the 12th International Conference on Availability …, 2017
62017
Digital forensic analysis of web-browser based attacks
SM Mohamed, N Abdelbaki, AF Shosha
Proceedings of the international conference on security and management (SAM …, 2016
42016
A Novel Methodology for Malware Intrusion Attack Path Reconstruction
AF Shosha, JI James, P Gladyshev
3rd International Conference on Digital Forensics and Cyber Crime, ICDF2C, 2011
32011
A postmortem forensic analysis for a JavaScript based attack
S Mosaad, N Abdelbaki, AF Shosha
Computer and Network Security Essentials, 79-94, 2018
22018
Digital Forensic Analysis of SIM Cards
MT Abdelazim, N AbdelBaki, AF Shosha
Proceedings of the International Conference on Security and Management (SAM …, 2016
22016
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE
JI James, AF Shosha, P Gladyhsev
Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C …, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20