Follow
Andrew Marrington
Andrew Marrington
Dean of Academic Affairs, Zayed University
Verified email at zu.ac.ae
Title
Cited by
Cited by
Year
Forensic analysis of social networking applications on mobile devices
N Al Mutawa, I Baggili, A Marrington
Digital investigation 9, S24-S33, 2012
2902012
Good practice for enhancing the engagement and success of commencing students
KJ Nelson, C Quinn, A Marrington, JA Clarke
Higher Education 63, 83-96, 2012
2072012
Network and device forensic analysis of android social-messaging applications
D Walnycky, I Baggili, A Marrington, J Moore, F Breitinger
Digital Investigation 14, S77-S84, 2015
1812015
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later
VS Harichandran, F Breitinger, I Baggili, A Marrington
Computers & Security 57, 1-13, 2016
1082016
Forensic artifacts of Facebook’s instant messaging service
N Al Mutawa, I Al Awadhi, I Baggili, A Marrington
2011 International Conference for Internet Technology and Secured …, 2011
752011
Drone forensics: challenges and new insights
H Bouafif, F Kamoun, F Iqbal, A Marrington
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
682018
Behavioural digital forensics model: Embedding behavioural evidence analysis into the investigation of digital crimes
N Al Mutawa, J Bryce, VNL Franqueira, A Marrington, JC Read
Digital Investigation 28, 70-82, 2019
592019
Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers
A Marrington, I Baggili, T Al Ismail, A Al Kaf
Computer Systems and Industrial Informatics (ICCSII), 2012 International …, 2012
502012
Wordnet-based criminal networks mining for cybercrime investigation
F Iqbal, BCM Fung, M Debbabi, R Batool, A Marrington
Ieee Access 7, 22740-22755, 2019
492019
Forensic investigation of cyberstalking cases using behavioural evidence analysis
N Al Mutawa, J Bryce, VNL Franqueira, A Marrington
Digital investigation 16, S96-S103, 2016
452016
Behavioural evidence analysis applied to digital forensics: an empirical analysis of child pornography cases using P2P networks
N Al Mutawa, J Bryce, VNL Franqueira, A Marrington
2015 10th International Conference on Availability, Reliability and Security …, 2015
362015
Preliminary forensic analysis of the Xbox One
J Moore, I Baggili, A Marrington, A Rodrigues
Digital Investigation 11, S57-S65, 2014
332014
Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches
VNL Franqueira, J Bryce, N Al Mutawa, A Marrington
Digital Investigation 24, 95-105, 2018
312018
The forensic investigation of android private browsing sessions using orweb
N Al Barghouthy, A Marrington, I Baggili
2013 5th International Conference on Computer Science and Information …, 2013
282013
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines
A Marrington, I Baggili, G Mohay, A Clark
digital investigation 8, S52-S61, 2011
282011
Event-based computer profiling for the forensic reconstruction of computer activity
AD Marrington, GM Mohay, AJ Clark, HL Morarji
Proceedings AusCERT Asia Pacific Information Technology Security Conference …, 2007
242007
Forensic artifacts of the ChatON Instant Messaging application
A Iqbal, A Marrington, I Baggili
2013 8th International Workshop on Systematic Approaches to Digital …, 2013
212013
Research trends in digital forensic science: An empirical analysis of published research
I Baggili, A BaAbdallah, D Al-Safi, A Marrington
Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013
202013
An economic case for systematic student monitoring and intervention in the first year in higher education
A Marrington, K Nelson, J Clarke
Proceedings of 13th Pacific Rim First Year in Higher Education Conference, 1-4, 2010
202010
A comparison of forensic acquisition techniques for android devices: a case study investigation of orweb browsing sessions
N Al Barghouthy, A Marrington
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
192014
The system can't perform the operation now. Try again later.
Articles 1–20