Follow
Irfan Ahmed
Title
Cited by
Cited by
Year
SCADA systems: Challenges for forensic investigators
I Ahmed, S Obermeier, M Naedele, GG Richard III
IEEE Computer 45 (12), 44-51, 2012
1652012
A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review
U Tariq, I Ahmed, AK Bashir, K Shaukat
Sensors 23 (8), 4117, 2023
1492023
Programmable logic controller forensics
I Ahmed, S Obermeier, S Sudhakaran, V Roussev
IEEE Security & Privacy 15 (6), 18-24, 2017
1172017
CLIK on PLCs! Attacking Control Logic with Decompilation and Virtual PLC
S Kalle, N Ameen, H Yoo, I Ahmed
Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019
862019
Control Logic Injection Attacks on Industrial Control Systems
H Yoo, I Ahmed
34th IFIP International Conference on Information Security and Privacy …, 2019
772019
SCADA network forensics of the PCCC protocol
S Senthivel, I Ahmed, V Roussev
Digital Investigation 22, S57-S65, 2017
712017
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy
I Ahmed, V Roussev, W Johnson, S Senthivel, S Sudhakaran
2nd Annual Industrial Control System Security Workshop, 1-9, 2016
682016
Cloud forensics–Tool development studies & future outlook
V Roussev, I Ahmed, A Barreto, S McCulley, V Shanmughan
Digital Investigation, 2016
682016
Denial of Engineering Operations Attacks in Industrial Control Systems
S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev
8th ACM Conference on Data and Application Security and Privacy (CODASPY’18), 2018
632018
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions
S Bhatia, S Behal, I Ahmed
Versatile Cybersecurity 72, 46, 2018
602018
Fast Content-Based File Type Identification
I Ahmed, KS Lhee, HJ Shin, MP Hong
7th Annual IFIP WG 11.9 International Conference on Digital Forensics, 65-75, 2011
582011
AspectDroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
482016
Empirical Study of PLC Authentication Protocols in Industrial Control Systems
A Ayub, H Yoo, I Ahmed
15th IEEE Workshop on Offensive Technologies (WOOT), co-located with IEEE S …, 2021
452021
Evaluation of peer instruction for cybersecurity education
P Deshpande, CB Lee, I Ahmed
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
442019
User-representative feature selection for keystroke dynamics
EA Solami, C Boyd, A Clark, I Ahmed
5th International Conference on Network and System Security (NSS'11), 229-233, 2011
412011
Classification of packet contents for malware detection
I Ahmed, K Lhee
Journal in Computer Virology, Springer 7 (4), 279-295, 2011
412011
Overshadow PLC to Detect Remote Control-Logic Injection Attacks
H Yoo, S Kalle, J Smith, I Ahmed
16th SIG SIDAR Conference on Detection of Intrusions and Malware …, 2019
402019
JTAG-based PLC Memory Acquisition Framework for Industrial Control Systems
M Rais, R Awad, J Lopez Jr., I Ahmed
21st Annual Digital Forensics Research Conference (DFRWS’21), 2021
392021
Security, privacy, and digital forensics in the cloud
L Chen, H Takabi, NA Le-Khac
John Wiley & Sons, 2019
392019
Gap analysis of intrusion detection in smart grids
N Kush, E Foo, E Ahmed, I Ahmed, A Clark
2nd International Cyber Resilience Conference, 38-46, 2011
392011
The system can't perform the operation now. Try again later.
Articles 1–20