Ahmed F. Shosha

According to our database1, Ahmed F. Shosha authored at least 15 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Clipboard Data Attacks and Detection via Remote Desktop Protocol.
Proceedings of the 5th Novel Intelligent and Leading Emerging Sciences Conference, 2023

Remote Clipboard Data In-Memory Attacks and Detection.
Proceedings of Research papers at APWG.EU TECH 2023 co-located with the APWG.EU Tech 2023 Summit & Researchers Sync-Up (APWG.EU Tech 2023), 2023

2018
Large scale detection of IDN domain name masquerading.
Proceedings of the 2018 APWG Symposium on Electronic Crime Research, 2018

A Postmortem Forensic Analysis for a JavaScript Based Attack.
Proceedings of the Computer and Network Security Essentials., 2018

Experimental Digital Forensics of Subscriber Identification Module (SIM) Card.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

JSDES: An Automated De-Obfuscation System for Malicious JavaScript.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2014
Reverse engineering a CCTV system, a case study.
Digit. Investig., 2014

2013
Digital Forensic Reconstruction of a Program Action.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

2012
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

BREDOLAB: Shopping in the Cybercrime Underworld.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

Evasion-resistant malware signature based on profiling kernel data structure objects.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
A Novel Methodology for Malware Intrusion Attack Path Reconstruction.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011


  Loading...