Farkhund Iqbal

Orcid: 0000-0001-9081-3598

According to our database1, Farkhund Iqbal authored at least 116 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multimodal Religiously Hateful Social Media Memes Classification Based on Textual and Image Data.
ACM Trans. Asian Low Resour. Lang. Inf. Process., August, 2024

Exploring Students' and Faculty's Knowledge, Attitudes, and Perceptions Towards ChatGPT: A Cross-Sectional Empirical Study.
J. Inf. Technol. Educ. Res., 2024

Large Language Models Spot Phishing Emails with Surprising Accuracy: A Comparative Analysis of Performance.
CoRR, 2024

Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media.
CoRR, 2024

Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Smartphone Forensics: A Comparative Study of Common Mobile Phone Models.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Evaluating the Efficacy of Large Language Models in Identifying Phishing Attempts.
Proceedings of the 16th International Conference on Human System Interaction, 2024

A Preliminary Design of Privacy Ontology for Smart Toys.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Differentially Private Release of Heterogeneous Network for Managing Healthcare Data.
ACM Trans. Knowl. Discov. Data, July, 2023

DeepClassRooms: a deep learning based digital twin framework for on-campus class rooms.
Neural Comput. Appl., April, 2023

Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications.
Ann. des Télécommunications, April, 2023

Augmenting CCAM Infrastructure for Creating Smart Roads and Enabling Autonomous Driving.
Remote. Sens., February, 2023

A Comparative Assessment of Human Factors in Cybersecurity: Implications for Cyber Governance.
IEEE Access, 2023

Of Stances, Themes, and Anomalies in COVID-19 Mask-Wearing Tweets.
IEEE Access, 2023

Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

Social Robots in Retail: Emotional Experiences a Critical Driver of Purchase Intention.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Moral Dilemmas in Social Robots: An Exploratory Study for Future Research.
Proceedings of the Human-Computer Interaction, 2023

2022
Recommendations for a smart toy parental control tool.
J. Supercomput., 2022

Exploring the human factors in moral dilemmas of autonomous vehicles.
Pers. Ubiquitous Comput., 2022

Distinguishing between fake news and satire with transformers.
Expert Syst. Appl., 2022

Using deep learning to detect social media 'trolls'.
Digit. Investig., 2022

Forensic investigation of Google Meet for memory and browser artifacts.
Digit. Investig., 2022

A GPU-based machine learning approach for detection of botnet attacks.
Comput. Secur., 2022

Deepfake Audio Detection via MFCC Features Using Machine Learning.
IEEE Access, 2022

Assisting People of Determination and the Elderly Using Social Robot: A Case Study.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Towards A Real-Time Emergency Response Model For Connected And Autonomous Vehicles.
Proceedings of the CIKM 2022 Workshops co-located with 31st ACM International Conference on Information and Knowledge Management (CIKM 2022), 2022

Deepfake Audio Detection Via Feature Engineering And Machine Learning.
Proceedings of the CIKM 2022 Workshops co-located with 31st ACM International Conference on Information and Knowledge Management (CIKM 2022), 2022

2021
Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-Specific Information.
IEEE Trans. Engineering Management, 2021

Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models.
Int. J. Digit. Crime Forensics, 2021

Systematic privacy impact assessment scheme for smart connected toys data privacy compliance.
Int. J. Big Data Intell., 2021

Automatic Fall Risk Detection Based on Imbalanced Data.
IEEE Access, 2021

Toward Tweet-Mining Framework for Extracting Terrorist Attack-Related Information and Reporting.
IEEE Access, 2021

Forensic Analysis of Fitbit Versa: Android vs iOS.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network.
Proceedings of the Science and Technologies for Smart Cities, 2021

Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Discord Server Forensics: Analysis and Extraction of Digital Evidence.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

WhatsApp Network Forensics: Discovering the IP Addresses of Suspects.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

ER-AE: Differentially Private Text Generation for Authorship Anonymization.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

An Alternate Account on the Ethical Implications of Autonomous Vehicles.
Proceedings of the 17th International Conference on Intelligent Environments, 2021

Snapshot of Research Issues in Service Robots.
Proceedings of the Service-Oriented Computing - ICSOC 2021 Workshops, 2021

Persuasive Technology in Games: A Brief Review and Reappraisal.
Proceedings of the HCI in Games: Experience Design and Game Mechanics, 2021

Forensic Analysis of the Cisco WebEx Application.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

2020
A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020

The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics.
Int. J. Digit. Crime Forensics, 2020

A Deep Learning Framework for Malware Classification.
Int. J. Digit. Crime Forensics, 2020

Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0.
Int. J. Digit. Crime Forensics, 2020

Efficient scheduling of video camera sensor networks for IoT systems in smart cities.
Trans. Emerg. Telecommun. Technol., 2020

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020

Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints.
Ad Hoc Networks, 2020

AI and machine learning: A mixed blessing for cybersecurity.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Access Permissions for Apple Watch Applications: A Study on Users' Perceptions.
Proceedings of the International Conference on Communications, 2020

Digital Forensic Acquisition and Analysis of Discord Applications.
Proceedings of the International Conference on Communications, 2020

4P based forensics investigation framework for smart connected toys.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Blockchain-based chain of custody: towards real-time tamper-proof evidence management.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Smart Toys.
Proceedings of the Encyclopedia of Computer Graphics and Games., 2019

Learning Stylometric Representations for Authorship Analysis.
IEEE Trans. Cybern., 2019

Arabic Authorship Attribution: An Extensive Study on Twitter Posts.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019

Drone forensics: examination and analysis.
Int. J. Electron. Secur. Digit. Forensics, 2019

A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction.
IEEE Access, 2019

Wordnet-Based Criminal Networks Mining for Cybercrime Investigation.
IEEE Access, 2019

Robot Computing for Music Visualization.
Proceedings of the Theory and Applications of Models of Computation, 2019

Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

A Predictive Model for Predicting Students Academic Performance.
Proceedings of the 10th International Conference on Information, 2019

Boosting IoT Efficiency and Security through Blockchain: Blockchain-based Car Insurance Process - A Case Study.
Proceedings of the 4th International Conference on System Reliability and Safety, 2019

A Systematic Review of Artificial Intelligence and Machine Learning Techniques for Cyber Security.
Proceedings of the Big Data and Security - First International Conference, 2019

Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Drone Forensics: A Case Study on a DJI Mavic Air.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and Canada.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Drone Forensics: A Case Study on DJI Phantom 4.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Differentially private multidimensional data publishing.
Knowl. Inf. Syst., 2018

Opportunistic mining of top-<i>n</i> high utility patterns.
Inf. Sci., 2018

A glance at research-driven university's technology transfer office in the UAE.
Int. J. Technol. Manag., 2018

SafePath: Differentially-private publishing of passenger trajectories in transportation systems.
Comput. Networks, 2018

Fuzzy searching and routing in unstructured mobile peer-to-peer networks.
Clust. Comput., 2018

Malware Classification with Deep Convolutional Neural Networks.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Remote Data Acquisition Using Raspberry Pi3.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Drone Forensics: Challenges and New Insights.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

Smart Home Systems Security.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Towards a Music Visualization on Robot (MVR) Prototype.
Proceedings of the 2018 IEEE International Conference on Artificial Intelligence and Virtual Reality, 2018

2017
Revealing determinant factors for early breast cancer recurrence by decision tree.
Inf. Syst. Frontiers, 2017

A Study of Detecting Child Pornography on Smart Phone.
Proceedings of the Advances in Network-Based Information Systems, 2017

Charging infrastructure placement for electric vehicles: An optimization prospective.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Towards a Privacy Rule Conceptual Model for Smart Toys.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Towards A Self Adaptive System for Social Wellness.
Sensors, 2016

Privacy-preserving data mashup model for trading person-specific information.
Electron. Commer. Res. Appl., 2016

Forensic analysis of xbox one and playstation 4 gaming consoles.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks.
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016

White-Hat Hacking Framework for Promoting Security Awareness.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD).
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A Glance of Child's Play Privacy in Smart Toys.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Multimedia File Signature Analysis for Smartphone Forensics.
Proceedings of the 9th International Conference on Developments in eSystems Engineering, 2016

A Study of Children Facial Recognition for Privacy in Smart TV.
Proceedings of the Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications, 2016

2015
Fuzzy Logic-Based Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks.
Sensors, 2015

E-mail authorship attribution using customized associative classification.
Digit. Investig., 2015

Graph-theoretic characterization of cyber-threat infrastructures.
Digit. Investig., 2015

Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
Testing the forensic soundness of forensic examination environments on bootable media.
Digit. Investig., 2014

A forensic analysis framework for recovering encryption keys and BB10 backup decryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Privacy-Preserving Medical Reports Publishing for Cluster Analysis.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

2013
A unified data mining solution for authorship analysis in anonymous textual communications.
Inf. Sci., 2013

CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

Computer Profiling for Preliminary Forensic Examination.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Towards a unified agent-based approach for real time computer forensic evidence collection.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Mining Criminal Networks from Chat Log.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2010
Speaker verification from partially encrypted compressed speech for forensic investigation.
Digit. Investig., 2010

Mining writeprints from anonymous e-mails for forensic investigation.
Digit. Investig., 2010

e-mail authorship verification for forensic investigation.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Towards an integrated e-mail forensic analysis framework.
Digit. Investig., 2009

2008
A novel approach of mining write-prints for authorship attribution in e-mail forensics.
Digit. Investig., 2008


  Loading...