Live forensics of software attacks on cyber–physical systems ZA Al-Sharif, MI Al-Saleh, LM Alawneh, YI Jararweh, B Gupta Future Generation Computer Systems 108, 1217-1229, 2020 | 64 | 2020 |
Skype forensics in android devices MI Al-Saleh, YA Forihat International Journal of Computer Applications 78 (7), 2013 | 31 | 2013 |
A security framework for cloud-based video surveillance system MA Alsmirat, I Obaidat, Y Jararweh, M Al-Saleh Multimedia Tools and Applications 76, 22787-22802, 2017 | 29 | 2017 |
{Application-Level} Reconnaissance: Timing Channel Attacks Against Antivirus Software MI Al-Saleh, JR Crandall 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011 | 26 | 2011 |
Utilizing data lifetime of tcp buffers in digital forensics: Empirical study MI Al-Saleh, ZA Al-Sharif Digital Investigation 9 (2), 119-124, 2012 | 24 | 2012 |
Antivirus performance characterisation: system‐wide view MI Al‐Saleh, AM Espinoza, JR Crandall IET Information Security 7 (2), 126-133, 2013 | 23 | 2013 |
Investigating the detection capabilities of antiviruses under concurrent attacks MI Al-Saleh, FM AbuHjeela, ZA Al-Sharif International Journal of Information Security 14, 387-396, 2015 | 21 | 2015 |
Using gpus to speed-up levenshtein edit distance computation K Balhaf, MA Shehab, T Wala'a, M Al-Ayyoub, M Al-Saleh, Y Jararweh 2016 7th International Conference on Information and Communication Systems …, 2016 | 20 | 2016 |
Network reconnaissance investigation: A memory forensics approach MI Al-Saleh, ZA Al-Sharif, L Alawneh 2019 10th International Conference on Information and Communication Systems …, 2019 | 18 | 2019 |
Ram forensics against cyber crimes involving files M Al-Saleh, Z Al-Sharif The Second International Conference on Cyber Security, Cyber Peacefare and …, 2013 | 18 | 2013 |
Towards carving pdf files in the main memory ZA Al-Sharif, DN Odeh, MI Al-Saleh The International Technology Management Conference (ITMC2015), 24-31, 2015 | 16 | 2015 |
On the memory artifacts of the tor browser bundle A Al-Khaleel, D Bani-Salameh, MI Al-Saleh The International Conference on Computing Technology and Information …, 2014 | 16 | 2014 |
Forensic artefacts associated with intentionally deleted user accounts MI Al-Saleh, MJ Al-Shamaileh International Journal of Electronic Security and Digital Forensics 9 (2 …, 2017 | 14 | 2017 |
Towards a generic approach for memory forensics E Qawasmeh, MI Al-Saleh, ZA Al-Sharif 2019 Sixth HCT Information Technology Trends (ITT), 094-098, 2019 | 13 | 2019 |
The impact of the antivirus on the digital evidence MI Al-Saleh International Journal of Electronic Security and Digital Forensics 5 (3-4 …, 2013 | 12 | 2013 |
On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible? MI Al-Saleh, JR Crandall Proceedings of the 2010 New Security Paradigms Workshop, 17-32, 2010 | 12 | 2010 |
IMO forensics in android and windows systems A Ababneh, MA Awwad, MI Al-Saleh 2017 8th International Conference on Information, Intelligence, Systems …, 2017 | 11 | 2017 |
A post-mortem forensic approach for the kik messenger on android AM Al-Rawashdeh, ZA Al-Sharif, MI Al-Saleh, AS Shatnawi 2020 11th international conference on information and communication systems …, 2020 | 10 | 2020 |
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach. ZA Al-Sharif, MI Al-Saleh, Y Jararweh, L Alawneh, AS Shatnawi J. Univers. Comput. Sci. 25 (9), 1174-1198, 2019 | 10 | 2019 |
Carving and clustering files in ram for memory forensics ZA Al-Sharif, AY Al-Khalee, MI Al-Saleh, M Al-Ayyoub Far East Journal of Electronics and Communications (FJEC) 18 (5), 695-722, 2018 | 10 | 2018 |