A survey about impacts of cloud computing on digital forensics F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin, ... International Journal of Cyber-Security and Digital Forensics 2 (2), 77-95, 2013 | 78* | 2013 |
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices F Daryabar, A Dehghantanha, B Eterovic-Soric, KKR Choo Australian Journal of Forensic Sciences 48 (6), 615-642, 2016 | 76 | 2016 |
Digital forensic trends and future FN Dezfoli, A Dehghantanha, R Mahmoud, NFBM Sani, F Daryabar International Journal of Cyber-Security and Digital Forensics 2 (2), 48-77, 2013 | 72 | 2013 |
Cloud storage forensics: MEGA as a case study F Daryabar, A Dehghantanha, KKR Choo Australian Journal of Forensic Sciences 49 (3), 344-357, 2017 | 67 | 2017 |
Investigation of malware defence and detection techniques F Daryabar, A Dehghantanha, HG Broujerdi International Journal of Digital Information and Wireless Communications …, 2011 | 45 | 2011 |
Investigation of bypassing malware defences and malware detections F Daryabar, A Dehghantanha, NI Udzir 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 43 | 2011 |
Towards secure model for SCADA systems F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 40 | 2012 |
Analysis of virtual honeynet and VLAN-based virtual networks F Daryabar, A Dehghantanha, F Norouzi, F Mahmoodi 2011 International Symposium on Humanities, Science and Engineering Research …, 2011 | 24 | 2011 |
A survey on malware analysis and detection techniques FN Dezfouli, A Dehghantanha, R Mahmod, NFBM Sani, SB Shamsuddin, ... International Journal of Advancements in Computing Technology 5 (14), 42, 2013 | 14 | 2013 |
A survey on privacy impacts of digital investigation F Daryabar, A Dehghantanha, NI Udzir, NFM Sani, S Shamsuddin, ... Journal of Next Generation Information Technology 4 (8), 2013 | 11 | 2013 |
Welcome to Binder: A kernel level attack model for the Binder in Android operating system M Salehi, F Daryabar, MH Tadayon 2016 8th International Symposium on Telecommunications (IST), 156-161, 2016 | 7 | 2016 |
Automated analysis method for forensic investigation of cloud applications on Android F Daryabar, MH Tadayon, A Parsi, H Sadjadi 2016 8th International Symposium on Telecommunications (IST), 145-150, 2016 | 6 | 2016 |
A Survey on Cloud Computing and Digital Forensics F Daryabar, A Dehghantanha, NI Udzir, N Fazlida, S Shamsuddin, ... J. Next Gener. Inf. Technol 4 (6), 62-74, 2013 | 5 | 2013 |
Nor Fazlida binti Mohd Sani., Solahuddin bin Shamsuddin., Farhood Norouzizadeh.,“A Survey About Impacts of Cloud Computing on Digital Forensics,” F Daryabar, A Dehghantanha, NI Udzir International Journal of Cyber-Security and Digital Forensics (IJCSDF), The …, 2013 | 3 | 2013 |
Analysis of known and unknown malware bypassing techniques F Daryabar, A Dehghantanha, NI Udzir, N Fazlida International Journal of Information Processing and Management (IJIPM) 4 (6 …, 2013 | 3 | 2013 |
Digital forensics framework for investigating client cloud storage applications on smartphones F Daryabar Thesis, University Putra Malaysia, 2015 | 1 | 2015 |
An Attack-Defense Model for the Binder on the Android Kernel Level M Salehi, MH Tadayon, F Daryabar International Journal of Information & Communication Technology Research 9 …, 2017 | | 2017 |