Ahmed F. Shosha
Ahmed F. Shosha
E-mail megerősítve itt: ucdconnect.ie
Cím
Hivatkozott rá
Hivatkozott rá
Év
An intrusion and defense testbed in a cyber-power system environment
J Hong, SS Wu, A Stefanov, A Fshosha, CC Liu, P Gladyshev, ...
Power and Energy Society General Meeting, 1- 5, 2011
71*2011
BREDOLAB: Shopping in the Cybercrime Underworld
D Graaf, AF Shosha, P Gladyshev
4th International Conference on Digital Forensics & Cyber Crime, 2012
262012
Detecting cyber intrusions in SCADA networks using multi-agent collaboration
AF Shosha, P Gladyshev, SS Wu, CC Liu
2011 16th International conference on intelligent system applications to …, 2011
242011
Evasion-Resistant Malware Signature Based on Profiling Kernel Data Structure Objects
AF Shosha, CC Liu, P Gladyshev, M Matten
7th International Conference on Risks and Security of Internet Systems …, 2012
222012
Digital Forensic Investigation and Cloud Computing
JI James, AF Shosha, P Gladyshev, D Belfield
Cybercrime and Cloud Forensics: Applications for Investigation Processes, 1-41, 2013
132013
Large scale detection of IDN domain name masquerading
Y Elsayed, A Shosha
2018 APWG Symposium on Electronic Crime Research (eCrime), 1-11, 2018
122018
Digital forensic reconstruction of a program action
AF Shosha, L Tobin, P Gladyshev
2013 IEEE Security and Privacy Workshops, 119-122, 2013
92013
Reverse engineering a CCTV system, a case study
L Tobin, A Shosha, P Gladyshev
Digital Investigation 11 (3), 179-186, 2014
82014
Towards Automated Forensic Event Reconstruction of Malicious Code
AF Shosha, JI James, CC Liu, P Gladyshev
15th International Symposium on Research in Attacks, Intrusions and …, 2012
82012
Cyber Security and information protection in a smart grid environment
SS Wu, CC Liu, AF Shosha, P Gladyshev
IFAC Proceedings Volumes 44 (1), 13696-13704, 2011
82011
Jsdes: An automated de-obfuscation system for malicious javascript
M AbdelKhalek, A Shosha
proceedings of the 12th International Conference on Availability …, 2017
72017
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes
AF Shosha, JI James, A Hannaway, CC Liu, P Gladyshev
4th International Conference on Digital Forensics and Cyber Crime, ICDF2C …, 2012
72012
Memory forensics methodology for investigating cryptocurrency protocols
SS Ali, A ElAshmawy, AF Shosha
Proceedings of the International Conference on Security and Management (SAM …, 2018
52018
Malicious vbscript detection algorithm based on data-mining techniques
D Wael, A Shosha, SG Sayed
2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 …, 2017
52017
Digital forensic analysis of web-browser based attacks
SM Mohamed, N Abdelbaki, AF Shosha
Proceedings of the international conference on security and management (SAM …, 2016
32016
Quantitave dynamic taint analysis of privacy leakage in android arabic apps
A Youssef, AF Shosha
Proceedings of the 12th International Conference on Availability …, 2017
22017
Digital Forensic Analysis of SIM Cards
MT Abdelazim, N AbdelBaki, AF Shosha
Proceedings of the International Conference on Security and Management (SAM …, 2016
22016
A Novel Methodology for Malware Intrusion Attack Path Reconstruction
AF Shosha, JI James, P Gladyshev
3rd International Conference on Digital Forensics and Cyber Crime, ICDF2C, 2011
22011
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE
JI James, AF Shosha, P Gladyhsev
International Conference on Digital Forensics and Cyber Crime, 223-236, 2013
12013
A Postmortem Forensic Analysis for a JavaScript Based Attack
S Mosaad, N Abdelbaki, AF Shosha
Computer and Network Security Essentials, 79-94, 2018
2018
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20