default search action
Ibrahim M. Baggili
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Christopher J. Bowen, Andrew Case, Ibrahim M. Baggili, Golden G. Richard III:
A step in a new direction: NVIDIA GPU kernel driver memory forensics. Forensic Sci. Int. Digit. Investig. 49: 301760 (2024) - [c39]Ruba Alsmadi, Taha Gharaibeh, Andrew M. Webb, Ibrahim M. Baggili:
Give Me Steam: A Systematic Approach for Handling Stripped Symbols in Memory Forensics of the Steam Deck. ARES 2024: 193:1-193:10 - [c38]Clinton Walker, Taha Gharaibeh, Ruba Alsmadi, Cory Lloyd Hall, Ibrahim M. Baggili:
Forensic Analysis of Artifacts from Microsoft's Multi-Agent LLM Platform AutoGen. ARES 2024: 198:1-198:9 - [c37]Taha Gharaibeh, Steven Seiden, Mohamed Abouelsaoud, Elias Bou-Harb, Ibrahim M. Baggili:
Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint). ARES 2024: 200:1-200:11 - 2023
- [j46]Martin Vondrácek, Ibrahim M. Baggili, Peter Casey, Mehdi Mekni:
Rise of the Metaverse's Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses. Comput. Secur. 127: 102923 (2023) - [j45]Tyler Balon, Ibrahim M. Baggili:
Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education. Educ. Inf. Technol. 28(9): 11759-11791 (2023) - [c36]Abdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim M. Baggili, Golden G. Richard III:
Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller. ARES 2023: 152:1-152:8 - [c35]John Jankura, Hannah Catallo-Stooks, Ibrahim M. Baggili, Golden G. Richard III:
Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases. ICDF2C (1) 2023: 19-32 - [c34]Steven Seiden, Ibrahim M. Baggili, Aisha I. Ali-Gombe:
I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics. ICDF2C (2) 2023: 315-332 - [c33]Nathalia Soares, Steven Seiden, Ibrahim M. Baggili, Andrew Webb:
On the Application of Synthetic Media to Penetration Testing. WDC@AsiaCCS 2023: 1-10 - 2022
- [j44]Tyler Thomas, Tiffanie Edwards, Ibrahim M. Baggili:
BlockQuery: Toward forensically sound cryptocurrency investigation. Digit. Investig. 40(Supplement): 301340 (2022) - [j43]Enoch Wang, Samuel Zurowski, Orion Duffy, Tyler Thomas, Ibrahim M. Baggili:
Juicing V8: A primary account for the memory forensics of the V8 JavaScript engine. Digit. Investig. 42(Supplement): 301400 (2022) - [j42]Hailey Johnson, Karl Volk, Robert Serafin, Cinthya Grajeda, Ibrahim M. Baggili:
Alt-tech social forensics: Forensic analysis of alternative social networking applications. Digit. Investig. 42(Supplement): 301406 (2022) - [c32]Samuel Zurowski, George Lord, Ibrahim M. Baggili:
A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools. ARES 2022: 42:1-42:11 - [i2]Charles R. Barone IV, Robert Serafin, Ilya Shavrov, Ibrahim M. Baggili, Aisha I. Ali-Gombe, Golden G. Richard III, Andrew Case:
A Reverse Engineering Education Needs Analysis Survey. CoRR abs/2212.07531 (2022) - 2021
- [j41]Andrew Mahr, Meghan Cichon, Sophia Mateo, Cinthya Grajeda, Ibrahim M. Baggili:
Zooming into the pandemic! A forensic analysis of the Zoom Application. Digit. Investig. 36(Supplement): 301107 (2021) - [j40]Syria McCullough, Stella Abudu, Ebere Onwubuariri, Ibrahim M. Baggili:
Another brick in the wall: An exploratory analysis of digital forensics programs in the United States. Digit. Investig. 37 Supplement: 301187 (2021) - [j39]Tyler Thomas, Mathew Piscitelli, Bhavik Ashok Nahar, Ibrahim M. Baggili:
Duck Hunt: Memory forensics of USB attack platforms. Digit. Investig. 37 Supplement: 301190 (2021) - [j38]Peter Casey, Ibrahim M. Baggili, Ananya Yarramreddy:
Immersive Virtual Reality Attacks and the Human Joystick. IEEE Trans. Dependable Secur. Comput. 18(2): 550-562 (2021) - [c31]Tyler Balon, Krikor Herlopian, Ibrahim M. Baggili, Cinthya Grajeda-Mendez:
Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts. ARES 2021: 43:1-43:10 - [c30]Alex Sitterer, Nicholas Dubois, Ibrahim M. Baggili:
Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV. ARES 2021: 50:1-50:12 - [c29]Tiffanie Edwards, Syria McCullough, Mohamed Nassar, Ibrahim M. Baggili:
On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics. ICDF2C 2021: 35-51 - [c28]Andrew Mahr, Robert Serafin, Cinthya Grajeda, Ibrahim M. Baggili:
Auto-Parser: Android Auto and Apple CarPlay Forensics. ICDF2C 2021: 52-71 - 2020
- [j37]Tyler Thomas, Mathew Piscitelli, Ilya Shavrov, Ibrahim M. Baggili:
Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets - A Tool and Visualization Framework. Digit. Investig. 33 Supplement: 301002 (2020) - [j36]Courtney Hassenfeldt, Jillian Jacques, Ibrahim M. Baggili:
Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality. Digit. Investig. 33 Supplement: 301011 (2020) - [c27]Vahid Behzadan, Ibrahim M. Baggili:
Founding The Domain of AI Forensics. SafeAI@AAAI 2020: 31-35
2010 – 2019
- 2019
- [j35]Xiaolu Zhang, Justin Grannis, Ibrahim M. Baggili, Nicole Lang Beebe:
Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed storage system. Digit. Investig. 29: 28-42 (2019) - [j34]Laura Sánchez, Cinthya Grajeda, Ibrahim M. Baggili, Cory Lloyd Hall:
A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material (CSAM). Digit. Investig. 29 Supplement: S124-S142 (2019) - [j33]Peter Casey, Rebecca Lindsay-Decusati, Ibrahim M. Baggili, Frank Breitinger:
Inception: Virtual Space in Memory Space in Real Space - Memory Forensics of Immersive Virtual Reality with the HTC Vive. Digit. Investig. 29 Supplement: S13-S21 (2019) - [j32]Joseph Ricci, Frank Breitinger, Ibrahim M. Baggili:
Survey results on adults and cybersecurity education. Educ. Inf. Technol. 24(1): 231-249 (2019) - [j31]Joseph Ricci, Ibrahim M. Baggili, Frank Breitinger:
Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? IEEE Secur. Priv. 17(1): 34-42 (2019) - [c26]Courtney Hassenfeldt, Shabana Baig, Ibrahim M. Baggili, Xiaolu Zhang:
Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications. ARES 2019: 42:1-42:12 - [c25]Tina Wu, Frank Breitinger, Ibrahim M. Baggili:
IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions. ARES 2019: 46:1-46:15 - [e3]Frank Breitinger, Ibrahim M. Baggili:
Digital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 259, Springer 2019, ISBN 978-3-030-05486-1 [contents] - [i1]Ibrahim M. Baggili, Vahid Behzadan:
Founding The Domain of AI Forensics. CoRR abs/1912.06497 (2019) - 2018
- [j30]Cinthya Grajeda, Laura Sánchez, Ibrahim M. Baggili, Devon Clark, Frank Breitinger:
Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. Digit. Investig. 26 Supplement: S47-S58 (2018) - [c24]Laoise Luciano, Ibrahim M. Baggili, Mateusz Topor, Peter Casey, Frank Breitinger:
Digital Forensics in the Next Five Years. ARES 2018: 46:1-46:14 - [c23]Gokila Dorai, Shiva Houshmand, Ibrahim M. Baggili:
I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. ARES 2018: 49:1-49:10 - [c22]Trevor Haigh, Frank Breitinger, Ibrahim M. Baggili:
If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. ICDF2C 2018: 45-65 - [c21]Robert Schmicker, Frank Breitinger, Ibrahim M. Baggili:
AndroParse - An Android Feature Extraction Framework and Dataset. ICDF2C 2018: 66-88 - [c20]Ananya Yarramreddy, Peter Gromkowski, Ibrahim M. Baggili:
Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account. IEEE Symposium on Security and Privacy Workshops 2018: 186-196 - 2017
- [j29]Xiaolu Zhang, Ibrahim M. Baggili, Frank Breitinger:
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications. Comput. Secur. 70: 516-531 (2017) - [j28]Shahzad Saleem, Oliver Popov, Ibrahim M. Baggili:
Comments on "A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis" [Digit Investig 16S, S55-S64]. Digit. Investig. 21: 88 (2017) - [j27]George Denton, Filip Karpísek, Frank Breitinger, Ibrahim M. Baggili:
Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digit. Investig. 22 Supplement: S26-S38 (2017) - [j26]Devon Clark, Christopher Meffert, Ibrahim M. Baggili, Frank Breitinger:
DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III. Digit. Investig. 22 Supplement: S3-S14 (2017) - [j25]Cinthya Grajeda, Frank Breitinger, Ibrahim M. Baggili:
Availability of datasets for digital forensics - And what is missing. Digit. Investig. 22 Supplement: S94-S105 (2017) - [j24]Jason Moore, Ibrahim M. Baggili, Frank Breitinger:
Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. J. Digit. Forensics Secur. Law 12(1): 15-30 (2017) - [c19]Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger:
Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. ARES 2017: 56:1-56:11 - [c18]Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim M. Baggili:
An Overview of the Usage of Default Passwords. ICDF2C 2017: 195-203 - 2016
- [j23]Vikram S. Harichandran, Frank Breitinger, Ibrahim M. Baggili, Andrew Marrington:
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. Comput. Secur. 57: 1-13 (2016) - [j22]Shahzad Saleem, Oliver Popov, Ibrahim M. Baggili:
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis. Digit. Investig. 16 Supplement: S55-S64 (2016) - [j21]Xiaolu Zhang, Frank Breitinger, Ibrahim M. Baggili:
Rapid Android Parser for Investigating DEX files (RAPID). Digit. Investig. 17: 28-39 (2016) - [j20]Vikram S. Harichandran, Daniel Walnycky, Ibrahim M. Baggili, Frank Breitinger:
CuFA: A more formal definition for digital forensic artifacts. Digit. Investig. 18 Supplement: S125-S137 (2016) - [j19]Kevin J. Conlan, Ibrahim M. Baggili, Frank Breitinger:
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digit. Investig. 18 Supplement: S66-S75 (2016) - [j18]Christopher Meffert, Ibrahim M. Baggili, Frank Breitinger:
Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Digit. Investig. 18 Supplement: S87-S96 (2016) - [j17]Samer Al-khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim M. Baggili, Frank Breitinger:
Exploring Deviant Hacker Networks (DHN) On Social Media Platforms. J. Digit. Forensics Secur. Law 11(2): 7-20 (2016) - [j16]Vikram S. Harichandran, Frank Breitinger, Ibrahim M. Baggili:
Bytewise Approximate Matching: The Good, The Bad, and The Unknown. J. Digit. Forensics Secur. Law 11(2): 59-78 (2016) - 2015
- [j15]Daniel Walnycky, Ibrahim M. Baggili, Andrew Marrington, Jason Moore, Frank Breitinger:
Network and device forensic analysis of Android social-messaging applications. Digit. Investig. 14 Supplement 1: S77-S84 (2015) - [j14]Filip Karpísek, Ibrahim M. Baggili, Frank Breitinger:
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Digit. Investig. 15: 110-118 (2015) - [j13]Ibrahim M. Baggili:
From the Editor-in-Chief. J. Digit. Forensics Secur. Law 10(1): 5-6 (2015) - [j12]Ibrahim M. Baggili:
From the Editor-in-Chief. J. Digit. Forensics Secur. Law 10(2): 5-6 (2015) - [c17]Ibrahim M. Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, Glenn McGee:
Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. ARES 2015: 303-311 - [c16]Ibrahim M. Baggili, Frank Breitinger:
Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. AAAI Spring Symposia 2015 - 2014
- [j11]Ahmed Fathy Abdul Latif Mohamed, Andrew Marrington, Farkhund Iqbal, Ibrahim M. Baggili:
Testing the forensic soundness of forensic examination environments on bootable media. Digit. Investig. 11(Supplement 2): S22-S29 (2014) - [j10]Jason Moore, Ibrahim M. Baggili, Andrew Marrington, Armindo Rodrigues:
Preliminary forensic analysis of the Xbox One. Digit. Investig. 11(Supplement 2): S57-S65 (2014) - [j9]Ibrahim M. Baggili:
From the Editor-in-Chief. J. Digit. Forensics Secur. Law 9(2): 7-8 (2014) - [j8]Frank Breitinger, Ibrahim M. Baggili:
File Detection On Network Traffic Using Approximate Matching. J. Digit. Forensics Secur. Law 9(2): 23-36 (2014) - [j7]Ibrahim M. Baggili:
From the Editor-in-Chief. J. Digit. Forensics Secur. Law 9(3): 5 (2014) - [j6]Shahzad Saleem, Ibrahim M. Baggili, Oliver Popov:
Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices. J. Digit. Forensics Secur. Law 9(3): 19-50 (2014) - [j5]Ibrahim M. Baggili:
From the Editor-in-Chief. J. Digit. Forensics Secur. Law 9(4): 5-6 (2014) - [c15]Ibrahim M. Baggili, Andrew Marrington, Yasser Jafar:
Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool. IFIP Int. Conf. Digital Forensics 2014: 279-295 - [e2]Pavel Gladyshev, Andrew Marrington, Ibrahim M. Baggili:
Digital Forensics and Cyber Crime - Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 132, Springer 2014, ISBN 978-3-319-14288-3 [contents] - 2013
- [j4]Keyun Ruan, Joe Carthy, M. Tahar Kechadi, Ibrahim M. Baggili:
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digit. Investig. 10(1): 34-43 (2013) - [c14]Shadi Al Awawdeh, Ibrahim M. Baggili, Andrew Marrington, Farkhund Iqbal:
Towards a unified agent-based approach for real time computer forensic evidence collection. ASONAM 2013: 1492-1493 - [c13]Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, Ibrahim M. Baggili:
Amazon Kindle Fire HD Forensics. ICDF2C 2013: 39-50 - [c12]Andrew Marrington, Farkhund Iqbal, Ibrahim M. Baggili:
Computer Profiling for Preliminary Forensic Examination. ICDF2C 2013: 207-220 - [c11]Asif Iqbal, Andrew Marrington, Ibrahim M. Baggili:
Forensic artifacts of the ChatON Instant Messaging application. SADFE 2013: 1-6 - [c10]Shadi Al Awawdeh, Ibrahim M. Baggili, Andrew Marrington, Farkhund Iqbal:
CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection. SADFE 2013: 1-8 - 2012
- [j3]Noora Al Mutawa, Ibrahim M. Baggili, Andrew Marrington:
Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9(Supplement): S24-S33 (2012) - [c9]Ibrahim M. Baggili, Moza Al Shamlan, Bedoor Al Jabri, Ayesha Al Zaabi:
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. ICDF2C 2012: 91-108 - [c8]Ibrahim M. Baggili, Afrah BaAbdallah, Deena Al-Safi, Andrew Marrington:
Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research. ICDF2C 2012: 144-157 - [c7]Mohamed Al Marzougy, Ibrahim M. Baggili, Andrew Marrington:
BlackBerry PlayBook Backup Forensic Analysis. ICDF2C 2012: 239-252 - 2011
- [j2]Andrew Marrington, Ibrahim M. Baggili, George M. Mohay, Andrew J. Clark:
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines. Digit. Investig. 8(Supplement): S52-S61 (2011) - [c6]Noora Al Mutawa, Ibtesam Al Awadhi, Ibrahim M. Baggili, Andrew Marrington:
Forensic artifacts of Facebook's instant messaging service. ICITST 2011: 771-776 - [e1]Ibrahim M. Baggili:
Digital Forensics and Cyber Crime - Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 53, Springer 2011, ISBN 978-3-642-19512-9 [contents] - 2010
- [c5]Mohammad Iftekhar Husain, Ibrahim M. Baggili, Ramalingam Sridhar:
A Simple Cost-Effective Framework for iPhone Forensic Analysis. ICDF2C 2010: 27-37 - [c4]Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim M. Baggili, Saad Ali Amin:
Towards More Secure Biometric Readers for Effective Digital Forensic Investigation. ICDF2C 2010: 65-77 - [c3]Hamda Bariki, Mariam Hashmi, Ibrahim M. Baggili:
Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools. ICDF2C 2010: 78-95
2000 – 2009
- 2009
- [c2]Ibrahim M. Baggili, Ashwin Mohan, Marcus K. Rogers:
SMIRK: SMS Management and Information Retrieval Kit. ICDF2C 2009: 33-42 - 2007
- [j1]Ibrahim M. Baggili, Richard Mislan, Marcus K. Rogers:
Mobile Phone Forensics Tool Testing: A Database Driven Approach. Int. J. Digit. EVid. 6(2) (2007) - 2006
- [c1]Kyle D. Lutes, Ibrahim M. Baggili:
Diabetic e-Management System (DEMS). ITNG 2006: 619-624
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint