Irfan Ahmed
Cited by
Cited by
SCADA systems: Challenges for forensic investigators
I Ahmed, S Obermeier, M Naedele, GG Richard III
IEEE Computer 45 (12), 44-51, 2012
Programmable logic controller forensics
I Ahmed, S Obermeier, S Sudhakaran, V Roussev
IEEE Security & Privacy 15 (6), 18-24, 2017
SCADA network forensics of the PCCC protocol
S Senthivel, I Ahmed, V Roussev
Digital Investigation 22, S57-S65, 2017
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy
I Ahmed, V Roussev, W Johnson, S Senthivel, S Sudhakaran
2nd Annual Industrial Control System Security Workshop, 1-9, 2016
Cloud forensics–Tool development studies & future outlook
V Roussev, I Ahmed, A Barreto, S McCulley, V Shanmughan
Digital Investigation, 2016
Control Logic Injection Attacks on Industrial Control Systems
H Yoo, I Ahmed
34th IFIP International Conference on Information Security and Privacy …, 2019
CLIK on PLCs! Attacking Control Logic with Decompilation and Virtual PLC
S Kalle, N Ameen, H Yoo, I Ahmed
Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019
Fast Content-Based File Type Identification
I Ahmed, KS Lhee, HJ Shin, MP Hong
7th Annual IFIP WG 11.9 International Conference on Digital Forensics, 65-75, 2011
Denial of Engineering Operations Attacks in Industrial Control Systems
S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev
8th ACM Conference on Data and Application Security and Privacy (CODASPY’18), 2018
AspectDroid: Android app analysis system
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Classification of packet contents for malware detection
I Ahmed, K Lhee
Journal in Computer Virology, Springer 7 (4), 279-295, 2011
On Improving the Accuracy and Performance of Content-Based File Type Identification
I Ahmed, K Lhee, H Shin, MP Hong
14th Australasian Conference on Information Security and Privacy (ACISP), 44-59, 2009
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions
S Bhatia, S Behal, I Ahmed
Versatile Cybersecurity 72, 46, 2018
User-representative feature selection for keystroke dynamics
EA Solami, C Boyd, A Clark, I Ahmed
5th International Conference on Network and System Security (NSS'11), 229-233, 2011
Evaluation of peer instruction for cybersecurity education
P Deshpande, CB Lee, I Ahmed
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
Content-based File-type Identification Using Cosine Similarity and a Divide-and-Conquer Approach
I Ahmed, K Lhee, H Shin, M Hong
IETE Technical Review 27 (6), 465-477, 2010
Fast file-type identification
I Ahmed, K Lhee, H Shin, MP Hong
25th ACM Symposium On Applied Computing (SAC), 1601-1602, 2010
OpSeq: Android Malware Fingerprinting
A Ali-Gombe, I Ahmed, GG Richard III, V Roussev
PPREW-5 Proceedings of the 5th Program Protection and Reverse Engineering …, 2015
Gap analysis of intrusion detection in smart grids
N Kush, E Foo, E Ahmed, I Ahmed, A Clark
2nd International Cyber Resilience Conference, 38-46, 2011
Empirical Study of PLC Authentication Protocols in Industrial Control Systems
A Ayub, H Yoo, I Ahmed
15th IEEE Workshop on Offensive Technologies (WOOT), co-located with IEEE S …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20