Irfan Ahmed
Orcid: 0000-0001-5648-388XAffiliations:
- University of New Orleans, New Orleans, LA, USA
- Virginia Commonwealth University, Richmond, VA, USA
According to our database1,
Irfan Ahmed
authored at least 61 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
6
3
3
2
2
2
2
1
2
1
2
3
3
3
5
2
2
6
2
2
1
2
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024
Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by Chance.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
2023
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices.
Comput. Secur., September, 2023
FRoMEPP: Digital forensic readiness framework for material extrusion based 3D printing process.
Forensic Sci. Int. Digit. Investig., March, 2023
Forensic Sci. Int. Digit. Investig., March, 2023
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.
Sensors, 2023
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers.
IEEE Secur. Priv., 2023
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals.
Proceedings of the IEEE Secure Development Conference, 2023
Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCs.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023
SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Digit. Investig., 2022
Memory forensic analysis of a programmable logic controller in industrial control systems.
Digit. Investig., 2022
Forensic investigation of instant messaging services on linux OS: Discord and Slack as case studies.
Digit. Investig., 2022
Low-Magnitude Infill Structure Manipulation Attacks on Fused Filament Fabrication 3D Printers.
Proceedings of the Critical Infrastructure Protection XVI, 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Digit. Investig., 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the Critical Infrastructure Protection XV, 2021
Proceedings of the ICCPS '21: ACM/IEEE 12th International Conference on Cyber-Physical Systems, 2021
2020
Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems.
Digit. Investig., 2020
2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics.
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
2018
IEEE Secur. Priv., 2018
Digit. Investig., 2018
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017
2016
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
Proceedings of the Advances in Digital Forensics XII, 2016
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015
2014
2013
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection.
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
2012
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012
2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007