Forensic analysis of social networking applications on mobile devices N Al Mutawa, I Baggili, A Marrington Digital investigation 9, S24-S33, 2012 | 286 | 2012 |
Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results K Ruan, C Joe, K Tahar, I Baggili Digital Investigation, 2013 | 234 | 2013 |
Network and device forensic analysis of android social-messaging applications D Walnycky, I Baggili, A Marrington, J Moore, F Breitinger Digital Investigation 14, S77-S84, 2015 | 177 | 2015 |
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy K Conlan, I Baggili, F Breitinger Digital investigation 18, S66-S75, 2016 | 144 | 2016 |
Availability of datasets for digital forensics–and what is missing C Grajeda, F Breitinger, I Baggili Digital Investigation 22, S94-S105, 2017 | 143 | 2017 |
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages F Karpisek, I Baggili, F Breitinger Digital Investigation 15, 110-118, 2015 | 135 | 2015 |
Forensic State Acquisition from Internet of Things (FSAIoT) A general framework and practical approach for IoT forensics through IoT device state acquisition C Meffert, D Clark, I Baggili, F Breitinger Proceedings of the 12th International Conference on Availability …, 2017 | 129 | 2017 |
DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III DR Clark, C Meffert, I Baggili, F Breitinger Digital Investigation 22, S3-S14, 2017 | 119 | 2017 |
Immersive virtual reality attacks and the human joystick P Casey, I Baggili, A Yarramreddy IEEE Transactions on Dependable and Secure Computing 18 (2), 550-562, 2019 | 111 | 2019 |
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later VS Harichandran, F Breitinger, I Baggili, A Marrington Computers & Security 57, 1-13, 2016 | 105 | 2016 |
iPhone 3GS forensics: Logical analysis using apple iTunes backup utility M Bader, I Baggili | 91 | 2010 |
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis K Ruan, J Carthy, T Kechadi 6th annual conference of the ADFSL Conference on Digital Forensics, Security …, 2011 | 89 | 2011 |
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis TK Keyun Ruan, Ibrahim Baggili, Joe Carthy Journal of Network Forensics 3 (1), 2011 | 89* | 2011 |
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis TK Keyun Ruan, Ibrahim Baggili, Joe Carthy Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and …, 2011 | 89* | 2011 |
Forensic artifacts of Facebook's instant messaging service N Al Mutawa, I Al Awadhi, I Baggili, A Marrington 2011 International Conference for Internet Technology and Secured …, 2011 | 75 | 2011 |
Zooming into the pandemic! A forensic analysis of the Zoom Application A Mahr, M Cichon, S Mateo, C Grajeda, I Baggili Forensic Science International: Digital Investigation 36, 301107, 2021 | 72 | 2021 |
Watch what you wear: preliminary forensic analysis of smart watches I Baggili, J Oduro, K Anthony, F Breitinger, G McGee 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 70 | 2015 |
Survey results on adults and cybersecurity education J Ricci, F Breitinger, I Baggili Education and Information Technologies 24, 231-249, 2019 | 64 | 2019 |
A practitioner survey exploring the value of forensic tools, ai, filtering, & safer presentation for investigating child sexual abuse material (csam) L Sanchez, C Grajeda, I Baggili, C Hall Digital Investigation 29, S124-S142, 2019 | 63 | 2019 |
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications X Zhang, I Baggili, F Breitinger Computers & Security 70, 516-531, 2017 | 59 | 2017 |