SCADA systems: Challenges for forensic investigators I Ahmed, S Obermeier, M Naedele, GG Richard III IEEE Computer 45 (12), 44-51, 2012 | 161 | 2012 |
Programmable logic controller forensics I Ahmed, S Obermeier, S Sudhakaran, V Roussev IEEE Security & Privacy 15 (6), 18-24, 2017 | 114 | 2017 |
A critical cybersecurity analysis and future research directions for the Internet of Things: A comprehensive review U Tariq, I Ahmed, AK Bashir, K Shaukat Sensors 23 (8), 4117, 2023 | 111 | 2023 |
CLIK on PLCs! Attacking Control Logic with Decompilation and Virtual PLC S Kalle, N Ameen, H Yoo, I Ahmed Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019 | 78 | 2019 |
Control Logic Injection Attacks on Industrial Control Systems H Yoo, I Ahmed 34th IFIP International Conference on Information Security and Privacy …, 2019 | 71 | 2019 |
SCADA network forensics of the PCCC protocol S Senthivel, I Ahmed, V Roussev Digital Investigation 22, S57-S65, 2017 | 69 | 2017 |
Cloud forensics–Tool development studies & future outlook V Roussev, I Ahmed, A Barreto, S McCulley, V Shanmughan Digital Investigation, 2016 | 69 | 2016 |
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy I Ahmed, V Roussev, W Johnson, S Senthivel, S Sudhakaran 2nd Annual Industrial Control System Security Workshop, 1-9, 2016 | 65 | 2016 |
Denial of Engineering Operations Attacks in Industrial Control Systems S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev 8th ACM Conference on Data and Application Security and Privacy (CODASPY’18), 2018 | 60 | 2018 |
Fast Content-Based File Type Identification I Ahmed, KS Lhee, HJ Shin, MP Hong 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, 65-75, 2011 | 58 | 2011 |
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions S Bhatia, S Behal, I Ahmed Versatile Cybersecurity 72, 46, 2018 | 50 | 2018 |
Aspectdroid: Android app analysis system A Ali-Gombe, I Ahmed, GG Richard III, V Roussev Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 47 | 2016 |
Empirical Study of PLC Authentication Protocols in Industrial Control Systems A Ayub, H Yoo, I Ahmed 15th IEEE Workshop on Offensive Technologies (WOOT), co-located with IEEE S …, 2021 | 43 | 2021 |
Evaluation of peer instruction for cybersecurity education P Deshpande, CB Lee, I Ahmed Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019 | 41 | 2019 |
User-representative feature selection for keystroke dynamics EA Solami, C Boyd, A Clark, I Ahmed 5th International Conference on Network and System Security (NSS'11), 229-233, 2011 | 40 | 2011 |
Classification of packet contents for malware detection I Ahmed, K Lhee Journal in Computer Virology, Springer 7 (4), 279-295, 2011 | 39 | 2011 |
Security, privacy, and digital forensics in the cloud L Chen, H Takabi, NA Le-Khac John Wiley & Sons, 2019 | 38 | 2019 |
Content-based File-type Identification Using Cosine Similarity and a Divide-and-Conquer Approach I Ahmed, K Lhee, H Shin, M Hong IETE Technical Review 27 (6), 465-477, 2010 | 38 | 2010 |
On Improving the Accuracy and Performance of Content-Based File Type Identification I Ahmed, K Lhee, H Shin, MP Hong 14th Australasian Conference on Information Security and Privacy (ACISP), 44-59, 2009 | 38 | 2009 |
JTAG-based PLC Memory Acquisition Framework for Industrial Control Systems M Rais, R Awad, J Lopez Jr., I Ahmed 21st Annual Digital Forensics Research Conference (DFRWS’21), 2021 | 37 | 2021 |