Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers X Zhang, O Upton, NL Beebe, KKR Choo Forensic Science International: Digital Investigation 32, 300926, 2020 | 94 | 2020 |
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications X Zhang, I Baggili, F Breitinger Computers & Security 70, 516-531, 2017 | 63 | 2017 |
Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations X Zhang, F Breitinger, E Luechinger, S O'Shaughnessy Forensic Science International: Digital Investigation 39, 301285, 2021 | 46 | 2021 |
How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform X Zhang, KKR Choo, NL Beebe IEEE Internet of Things Journal 6 (4), 6850-6861, 2019 | 45 | 2019 |
NLP-based digital forensic investigation platform for online communications D Sun, X Zhang, KKR Choo, L Hu, F Wang computers & security 104, 102210, 2021 | 36 | 2021 |
Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system X Zhang, J Grannis, I Baggili, NL Beebe Digital Investigation 29, 28-42, 2019 | 36 | 2019 |
Rapid Android parser for investigating DEX files (RAPID) X Zhang, F Breitinger, I Baggili Digital Investigation 17, 28-39, 2016 | 22 | 2016 |
Map my murder: a digital forensic study of mobile health and fitness applications C Hassenfeldt, S Baig, I Baggili, X Zhang Proceedings of the 14th International Conference on Availability …, 2019 | 21 | 2019 |
An Overview of the Usage of Default Passwords B Knierem, X Zhang, P Levine, F Breitinger, I Baggili International Conference on Digital Forensics & Cyber Crime (ICDF2C) 2017, 2017 | 18 | 2017 |
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions X Chen, X Zhang, M Elliot, X Wang, F Wang Computers & Security 120, 102812, 2022 | 15 | 2022 |
Digital forensic education X Zhang, KKR Choo An Experiential Learning Approach. Switzerland: Springer, 2020 | 15 | 2020 |
The design and implementation of composite collaborative filtering algorithm for personalized recommendation L Hu, W Wang, F Wang, X Zhang, K Zhao Journal of software, 2012 | 13 | 2012 |
A design science approach to developing an integrated mobile app forensic framework X Zhang, CZ Liu, KKR Choo, JA Alvarado Computers & Security 105, 102226, 2021 | 11 | 2021 |
Nonnegative matrix factorization based heterogeneous graph embedding method for trigger-action programming in IoT Y Xing, L Hu, X Zhang, G Wu, F Wang IEEE Transactions on Industrial Informatics 18 (2), 1231-1239, 2021 | 10 | 2021 |
An efficient AC algorithm with GPU L Hu, Z Wei, F Wang, X Zhang, K Zhao Procedia Engineering 29, 4249-4253, 2012 | 8 | 2012 |
A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage F Breitinger, X Zhang, D Quick DFRWS 2022 APAC, 2022 | 6 | 2022 |
Experiential Learning in Digital Forensics X Zhang, TT Yuen, KKR Choo Digital Forensic Education An Experiential Learning Approach, 2019 | 6 | 2019 |
Windows volatile memory forensics based on correlation analysis X Zhang, L Hu, S Song, Z Xie, X Meng, K Zhao Journal of Networks 9 (3), 645, 2014 | 5 | 2014 |
Analyzing Malware Based on Volatile Memory. L Hu, S Song, X Zhang, Z Xie, X Meng, K Zhao J. Networks 8 (11), 2512-2519, 2013 | 5 | 2013 |
Research on the Architecture Model of Volatile Data Forensics L Hu, XL Zhang, F Wang, WB Wang, K Zhao Procedia Engineering 29, 4254-4258, 2012 | 3 | 2012 |