default search action
Irfan Ahmed 0001
Person information
- affiliation: University of New Orleans, New Orleans, LA, USA
- affiliation: Virginia Commonwealth University, Richmond, VA, USA
Other persons with the same name
- Irfan Ahmed — disambiguation page
- Irfan Ahmed 0002 — Higher Colleges of Technology, Ruwais, UAE
- Irfan Ahmed 0003 — NED University of Engineering and Technology, Karachi, Pakistan
- Irfan Ahmed 0004 — University of Engineering and Technology, Peshawar, Pakistan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Adeen Ayub, Wooyeon Jo, Irfan Ahmed:
Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by Chance. HOST 2024: 182-193 - [c36]Muhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed:
SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication. WOOT @ USENIX Security Symposium 2024: 263-282 - 2023
- [j22]Ramyapandian Vijayakanthan, Irfan Ahmed, Aisha I. Ali-Gombe:
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices. Comput. Secur. 132: 103298 (2023) - [j21]Muhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed:
FRoMEPP: Digital forensic readiness framework for material extrusion based 3D printing process. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301510 (2023) - [j20]Rima Asmar Awad, Muhammad Haris Rais, Michael Rogers, Irfan Ahmed, Vincent C. Paquit:
Towards generic memory forensic framework for programmable logic controllers. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301513 (2023) - [j19]Adeen Ayub, Wooyeon Jo, Syed Ali Qasim, Irfan Ahmed:
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers. IEEE Secur. Priv. 21(4): 10-19 (2023) - [j18]Usman Tariq, Irfan Ahmed, Ali Kashif Bashir, Kamran Shaukat:
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors 23(8): 4117 (2023) - [c35]Muhammad Ahsan, Muhammad Haris Rais, Irfan Ahmed:
SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities. EuroS&P 2023: 1160-1178 - [c34]Adeen Ayub, Nauman Zubair, Hyunguk Yoo, Wooyeon Jo, Irfan Ahmed:
Gadgets of Gadgets in Industrial Control Systems: Return Oriented Programming Attacks on PLCs. HOST 2023: 215-226 - [c33]Ramyapandian Vijayakanthan, Karley M. Waguespack, Irfan Ahmed, Aisha I. Ali-Gombe:
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals. SecDev 2023: 106-117 - [i2]Geoffrey C. Fox, Mary P. Thomas, Sajal Bhatia, Marisa Brazil, Nicole M. Gasparini, Venkatesh Mohan Merwade, Henry J. Neeman, Jeff Carver, Henri Casanova, Vipin Chaudhary, Dirk Colbry, Lonnie D. Crosby, Prasun Dewan, Jessica Eisma, Irfan Ahmed, Kate Kaehey, Qianqian Liu, Zhen Ni, Sushil K. Prasad, Apan Qasem, Erik Saule, Prabha Sundaravadivel, Karen Tomko:
Report on 2023 CyberTraining PI Meeting, 26-27 September 2023. CoRR abs/2312.14199 (2023) - 2022
- [j17]Nauman Zubair, Adeen Ayub, Hyunguk Yoo, Irfan Ahmed:
PEM: Remote forensic acquisition of PLC memory in industrial control systems. Digit. Investig. 40(Supplement): 301336 (2022) - [j16]Muhammad Haris Rais, Rima Asmar Awad, Juan Lopez Jr., Irfan Ahmed:
Memory forensic analysis of a programmable logic controller in industrial control systems. Digit. Investig. 40(Supplement): 301339 (2022) - [j15]Megan Davis, Bridget T. McInnes, Irfan Ahmed:
Forensic investigation of instant messaging services on linux OS: Discord and Slack as case studies. Digit. Investig. 42(Supplement): 301401 (2022) - [c32]Ramyapandian Vijayakanthan, Irfan Ahmed, Aisha I. Ali-Gombe:
Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting. CODASPY 2022: 352-354 - [c31]Nauman Zubair, Adeen Ayub, Hyunguk Yoo, Irfan Ahmed:
Control Logic Obfuscation Attack in Industrial Control Systems. CSR 2022: 227-232 - [c30]Muhammad Haris Rais, Muhammad Ahsan, Vaibhav Sharma, Radhika Barua, Rob Prins, Irfan Ahmed:
Low-Magnitude Infill Structure Manipulation Attacks on Fused Filament Fabrication 3D Printers. Critical Infrastructure Protection 2022: 205-232 - 2021
- [j14]Masrik A. Dahir, Syed Ali Qasim, Irfan Ahmed:
Cronus: An Automated Feedback Tool for Concept Maps. IEEE Access 9: 119564-119577 (2021) - [j13]Shresht Bhatia, Sajal Bhatia, Irfan Ahmed:
Automated Waterloo Rubric for Concept Map Grading. IEEE Access 9: 148590-148598 (2021) - [j12]Muhammad Haris Rais, Rima Asmar Awad, Juan Lopez Jr., Irfan Ahmed:
JTAG-based PLC memory acquisition framework for industrial control systems. Digit. Investig. 37 Supplement: 301196 (2021) - [c29]Muhammad Haris Rais, Ye Li, Irfan Ahmed:
Spatiotemporal G-code modeling for secure FDM-based 3D printing. ICCPS 2021: 177-186 - [c28]Syed Ali Qasim, Adeen Ayub, Jordan Johnson, Irfan Ahmed:
Attacking the IEC 61131 Logic Engine in Programmable Logic Controllers. Critical Infrastructure Protection 2021: 73-95 - [c27]Adeen Ayub, Hyunguk Yoo, Irfan Ahmed:
Empirical Study of PLC Authentication Protocols in Industrial Control Systems. SP (Workshops) 2021: 383-397 - 2020
- [j11]Syed Ali Qasim, Jared M. Smith, Irfan Ahmed:
Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems. Digit. Investig. 33 Supplement: 301013 (2020) - [j10]Manish Bhatt, Avdesh Mishra, Md Wasi Ul Kabir, S. E. Blake-Gatto, Rishav Rajendra, Md. Tamjidul Hoque, Irfan Ahmed:
Hierarchy-Based File Fragment Classification. Mach. Learn. Knowl. Extr. 2(3): 216-232 (2020)
2010 – 2019
- 2019
- [c26]Hyunguk Yoo, Sushma Kalle, Jared Smith, Irfan Ahmed:
Overshadow PLC to Detect Remote Control-Logic Injection Attacks. DIMVA 2019: 109-132 - [c25]Syed Ali Qasim, Juan Lopez Jr., Irfan Ahmed:
Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics. ISC 2019: 402-422 - [c24]Hyunguk Yoo, Irfan Ahmed:
Control Logic Injection Attacks on Industrial Control Systems. SEC 2019: 33-48 - [c23]Pranita Deshpande, Cynthia Bailey Lee, Irfan Ahmed:
Evaluation of Peer Instruction for Cybersecurity Education. SIGCSE 2019: 720-725 - [c22]Pranita Deshpande, Irfan Ahmed:
Topological Scoring of Concept Maps for Cybersecurity Education. SIGCSE 2019: 731-737 - 2018
- [j9]Manish Bhatt, Irfan Ahmed:
Leveraging relocations in ELF-binaries for Linux kernel version identification. Digit. Investig. 26 Supplement: S12-S20 (2018) - [j8]Irfan Ahmed, Vassil Roussev:
Peer Instruction Teaching Methodology for Cybersecurity Education. IEEE Secur. Priv. 16(4): 88-91 (2018) - [c21]Saranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed, Vassil Roussev:
Denial of Engineering Operations Attacks in Industrial Control Systems. CODASPY 2018: 319-329 - [c20]Manish Bhatt, Irfan Ahmed, Zhiqiang Lin:
Using Virtual Machine Introspection for Operating Systems Security Education. SIGCSE 2018: 396-401 - 2017
- [j7]Saranyan Senthivel, Irfan Ahmed, Vassil Roussev:
SCADA network forensics of the PCCC protocol. Digit. Investig. 22 Supplement: S57-S65 (2017) - [j6]Irfan Ahmed, Sebastian Obermeier, Sneha Sudhakaran, Vassil Roussev:
Programmable Logic Controller Forensics. IEEE Secur. Priv. 15(6): 18-24 (2017) - [c19]William E. Johnson, Irfan Ahmed, Vassil Roussev, Cynthia Bailey Lee:
Peer Instruction for Digital Forensics. ASE @ USENIX Security Symposium 2017 - [c18]Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt, Manpyo Hong:
Automatic Mitigation of Kernel Rootkits in Cloud Environments. WISA 2017: 137-149 - 2016
- [j5]Vassil Roussev, Irfan Ahmed, Andres Barreto, Shane McCulley, Vivek Shanmughan:
Cloud forensics-Tool development studies & future outlook. Digit. Investig. 18: 79-95 (2016) - [c17]Anjila Tamrakar, Justin D. Russell, Irfan Ahmed, Golden G. Richard III, Carl F. Weems:
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits. CODASPY 2016: 124-126 - [c16]Aisha I. Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev:
AspectDroid: Android App Analysis System. CODASPY 2016: 145-147 - [c15]Irfan Ahmed, Vassil Roussev, William E. Johnson, Saranyan Senthivel, Sneha Sudhakaran:
A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy. ICSS 2016: 1-9 - [c14]Vassil Roussev, Andres Barreto, Irfan Ahmed:
API-Based Forensic Acquisition of Cloud Drives. IFIP Int. Conf. Digital Forensics 2016: 213-235 - [c13]William E. Johnson, Allison Luzader, Irfan Ahmed, Vassil Roussev, Golden G. Richard III, Cynthia Bailey Lee:
Development of Peer Instruction Questions for Cybersecurity Education. ASE @ USENIX Security Symposium 2016 - [c12]Aisha I. Ali-Gombe, Golden G. Richard III, Irfan Ahmed, Vassil Roussev:
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers. WISEC 2016: 79-90 - [i1]Vassil Roussev, Andres Barreto, Irfan Ahmed:
Forensic Acquisition of Cloud Drives. CoRR abs/1603.06542 (2016) - 2015
- [c11]Aisha I. Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev:
OpSeq: Android Malware Fingerprinting. PPREW@ACSAC 2015: 7:1-7:12 - [c10]Irfan Ahmed, Vassil Roussev, Aisha I. Ali-Gombe:
Robust Fingerprinting for Relocatable Code. CODASPY 2015: 219-229 - 2014
- [j4]Vassil Roussev, Irfan Ahmed, Thomas Sires:
Image-based kernel fingerprinting. Digit. Investig. 11(Supplement 2): S13-S21 (2014) - 2013
- [c9]Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III, Vassil Roussev:
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments. IFIP Int. Conf. Digital Forensics 2013: 305-328 - [c8]Irfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev:
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection. ISC 2013: 3-19 - 2012
- [j3]Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III:
SCADA Systems: Challenges for Forensic Investigators. Computer 45(12): 44-51 (2012) - [j2]Irfan Ahmed, Martin Naedele, Bradley L. Schatz, Ryôichi Sasaki, Andrew West:
Message from the guest editors. Int. J. Inf. Sec. 11(4): 213 (2012) - [c7]Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III:
ModChecker: Kernel Module Integrity Checking in the Cloud Environment. ICPP Workshops 2012: 306-313 - 2011
- [j1]Irfan Ahmed, Kyung-suk Lhee:
Classification of packet contents for malware detection. J. Comput. Virol. 7(4): 279-295 (2011) - [c6]Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
Fast Content-Based File Type Identification. IFIP Int. Conf. Digital Forensics 2011: 65-75 - [c5]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed:
User-representative feature selection for keystroke dynamics. NSS 2011: 229-233 - 2010
- [c4]Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
Fast file-type identification. SAC 2010: 1601-1602
2000 – 2009
- 2009
- [c3]Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
On Improving the Accuracy and Performance of Content-Based File Type Identification. ACISP 2009: 44-59 - 2008
- [c2]Irfan Ahmed, Kyung-suk Lhee:
Detection of Malcodes by Packet Classification. ARES 2008: 1028-1035 - 2007
- [c1]Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S. W. Yoo, Piao Yanji, Manpyo Hong:
Binding Update Authentication Scheme for Mobile IPv6. IAS 2007: 109-114
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint