Analysis of firewall log-based detection scenarios for evidence in digital forensics
Mukhtar, Rubiu, Al-Nemrat, Ameer, Alazab, Mamoun, Venkatraman, Sitalakshmi, Jahankhani, Hamid
Identifying cyber predators through forensic authorship analysis of chat logs
Amuchi, Faith, Al-Nemrat, Ameer, Alazab, Mamoun, Layton, Robert
Malicious code detection using penalized splines on OPcode frequency
Alazab, Mamoun, Al Kadiri, Mohammad, Venkatraman, Sitalakshmi, Al-Nemrat, Ameer
Are you sure you would like to clear your session, including search history and login status?