关注
Xiaolu Zhang
标题
引用次数
引用次数
年份
Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers
X Zhang, O Upton, NL Beebe, KKR Choo
Forensic Science International: Digital Investigation 32, 300926, 2020
942020
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications
X Zhang, I Baggili, F Breitinger
Computers & Security 70, 516-531, 2017
632017
Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations
X Zhang, F Breitinger, E Luechinger, S O'Shaughnessy
Forensic Science International: Digital Investigation 39, 301285, 2021
462021
How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform
X Zhang, KKR Choo, NL Beebe
IEEE Internet of Things Journal 6 (4), 6850-6861, 2019
452019
NLP-based digital forensic investigation platform for online communications
D Sun, X Zhang, KKR Choo, L Hu, F Wang
computers & security 104, 102210, 2021
362021
Frameup: an incriminatory attack on Storj: a peer to peer blockchain enabled distributed storage system
X Zhang, J Grannis, I Baggili, NL Beebe
Digital Investigation 29, 28-42, 2019
362019
Rapid Android parser for investigating DEX files (RAPID)
X Zhang, F Breitinger, I Baggili
Digital Investigation 17, 28-39, 2016
222016
Map my murder: a digital forensic study of mobile health and fitness applications
C Hassenfeldt, S Baig, I Baggili, X Zhang
Proceedings of the 14th International Conference on Availability …, 2019
212019
An Overview of the Usage of Default Passwords
B Knierem, X Zhang, P Levine, F Breitinger, I Baggili
International Conference on Digital Forensics & Cyber Crime (ICDF2C) 2017, 2017
182017
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions
X Chen, X Zhang, M Elliot, X Wang, F Wang
Computers & Security 120, 102812, 2022
152022
Digital forensic education
X Zhang, KKR Choo
An Experiential Learning Approach. Switzerland: Springer, 2020
152020
The design and implementation of composite collaborative filtering algorithm for personalized recommendation
L Hu, W Wang, F Wang, X Zhang, K Zhao
Journal of software, 2012
132012
A design science approach to developing an integrated mobile app forensic framework
X Zhang, CZ Liu, KKR Choo, JA Alvarado
Computers & Security 105, 102226, 2021
112021
Nonnegative matrix factorization based heterogeneous graph embedding method for trigger-action programming in IoT
Y Xing, L Hu, X Zhang, G Wu, F Wang
IEEE Transactions on Industrial Informatics 18 (2), 1231-1239, 2021
102021
An efficient AC algorithm with GPU
L Hu, Z Wei, F Wang, X Zhang, K Zhao
Procedia Engineering 29, 4249-4253, 2012
82012
A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage
F Breitinger, X Zhang, D Quick
DFRWS 2022 APAC, 2022
62022
Experiential Learning in Digital Forensics
X Zhang, TT Yuen, KKR Choo
Digital Forensic Education An Experiential Learning Approach, 2019
62019
Windows volatile memory forensics based on correlation analysis
X Zhang, L Hu, S Song, Z Xie, X Meng, K Zhao
Journal of Networks 9 (3), 645, 2014
52014
Analyzing Malware Based on Volatile Memory.
L Hu, S Song, X Zhang, Z Xie, X Meng, K Zhao
J. Networks 8 (11), 2512-2519, 2013
52013
Research on the Architecture Model of Volatile Data Forensics
L Hu, XL Zhang, F Wang, WB Wang, K Zhao
Procedia Engineering 29, 4254-4258, 2012
32012
系统目前无法执行此操作,请稍后再试。
文章 1–20