Farkhund Iqbal

According to our database1, Farkhund Iqbal authored at least 67 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020

The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics.
Int. J. Digit. Crime Forensics, 2020

A Deep Learning Framework for Malware Classification.
Int. J. Digit. Crime Forensics, 2020

Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0.
Int. J. Digit. Crime Forensics, 2020

Efficient scheduling of video camera sensor networks for IoT systems in smart cities.
Trans. Emerg. Telecommun. Technol., 2020

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020

Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints.
Ad Hoc Networks, 2020

4P based forensics investigation framework for smart connected toys.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Blockchain-based chain of custody: towards real-time tamper-proof evidence management.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Smart Toys.
Proceedings of the Encyclopedia of Computer Graphics and Games., 2019

Learning Stylometric Representations for Authorship Analysis.
IEEE Trans. Cybern., 2019

Arabic Authorship Attribution: An Extensive Study on Twitter Posts.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019

Drone forensics: examination and analysis.
Int. J. Electron. Secur. Digit. Forensics, 2019

ER-AE: Differentially-private Text Generation for Authorship Anonymization.
CoRR, 2019

A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction.
IEEE Access, 2019

Wordnet-Based Criminal Networks Mining for Cybercrime Investigation.
IEEE Access, 2019

Robot Computing for Music Visualization.
Proceedings of the Theory and Applications of Models of Computation, 2019

Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

A Predictive Model for Predicting Students Academic Performance.
Proceedings of the 10th International Conference on Information, 2019

Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Drone Forensics: A Case Study on a DJI Mavic Air.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and Canada.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Drone Forensics: A Case Study on DJI Phantom 4.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Differentially private multidimensional data publishing.
Knowl. Inf. Syst., 2018

Opportunistic mining of top-<i>n</i> high utility patterns.
Inf. Sci., 2018

A glance at research-driven university's technology transfer office in the UAE.
Int. J. Technol. Manag., 2018

SafePath: Differentially-private publishing of passenger trajectories in transportation systems.
Comput. Networks, 2018

Fuzzy searching and routing in unstructured mobile peer-to-peer networks.
Clust. Comput., 2018

Malware Classification with Deep Convolutional Neural Networks.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Remote Data Acquisition Using Raspberry Pi3.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Drone Forensics: Challenges and New Insights.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

Smart Home Systems Security.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Towards a Music Visualization on Robot (MVR) Prototype.
Proceedings of the 2018 IEEE International Conference on Artificial Intelligence and Virtual Reality, 2018

2017
Revealing determinant factors for early breast cancer recurrence by decision tree.
Inf. Syst. Frontiers, 2017

A Study of Detecting Child Pornography on Smart Phone.
Proceedings of the Advances in Network-Based Information Systems, 2017

Charging infrastructure placement for electric vehicles: An optimization prospective.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Towards a Privacy Rule Conceptual Model for Smart Toys.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Towards A Self Adaptive System for Social Wellness.
Sensors, 2016

Privacy-preserving data mashup model for trading person-specific information.
Electron. Commer. Res. Appl., 2016

Forensic analysis of xbox one and playstation 4 gaming consoles.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks.
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016

White-Hat Hacking Framework for Promoting Security Awareness.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD).
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A Glance of Child's Play Privacy in Smart Toys.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

A Study of Children Facial Recognition for Privacy in Smart TV.
Proceedings of the Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications, 2016

2015
Fuzzy Logic-Based Guaranteed Lifetime Protocol for Real-Time Wireless Sensor Networks.
Sensors, 2015

E-mail authorship attribution using customized associative classification.
Digit. Investig., 2015

Graph-theoretic characterization of cyber-threat infrastructures.
Digit. Investig., 2015

Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
Testing the forensic soundness of forensic examination environments on bootable media.
Digit. Investig., 2014

A forensic analysis framework for recovering encryption keys and BB10 backup decryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Privacy-Preserving Medical Reports Publishing for Cluster Analysis.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

2013
A unified data mining solution for authorship analysis in anonymous textual communications.
Inf. Sci., 2013

CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

Computer Profiling for Preliminary Forensic Examination.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Towards a unified agent-based approach for real time computer forensic evidence collection.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Mining Criminal Networks from Chat Log.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Investigating the dark cyberspace: Profiling, threat-based analysis and correlation.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2010
Speaker verification from partially encrypted compressed speech for forensic investigation.
Digit. Investig., 2010

Mining writeprints from anonymous e-mails for forensic investigation.
Digit. Investig., 2010

e-mail authorship verification for forensic investigation.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Towards an integrated e-mail forensic analysis framework.
Digit. Investig., 2009


  Loading...