Mohammed I. Al-Saleh
Mohammed I. Al-Saleh
Associate Professor of Computer Science, Jordan University of Science and Technology
Verified email at just.edu.jo - Homepage
Title
Cited by
Cited by
Year
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software.
MI Al-Saleh, JR Crandall
LEET, 2011
212011
Utilizing data lifetime of tcp buffers in digital forensics: Empirical study
MI Al-Saleh, ZA Al-Sharif
Digital Investigation 9 (2), 119-124, 2012
202012
Antivirus performance characterisation: system-wide view
MI Al-Saleh, AM Espinoza, JR Crandall
IET Information Security 7 (2), 126-133, 2013
182013
Skype forensics in android devices
MI Al-Saleh, YA Forihat
International Journal of Computer Applications 78 (7), 2013
182013
A security framework for cloud-based video surveillance system
MA Alsmirat, I Obaidat, Y Jararweh, M Al-Saleh
Multimedia Tools and Applications 76 (21), 22787-22802, 2017
132017
Investigating the detection capabilities of antiviruses under concurrent attacks
MI Al-Saleh, FM AbuHjeela, ZA Al-Sharif
International Journal of Information Security 14 (4), 387-396, 2015
132015
Ram forensics against cyber crimes involving files
M Al-Saleh, Z Al-Sharif
The Second International Conference on Cyber Security, Cyber Peacefare and …, 2013
122013
Towards carving pdf files in the main memory
ZA Al-Sharif, DN Odeh, MI Al-Saleh
The International Technology Management Conference (ITMC2015), 24-31, 2015
112015
The impact of the antivirus on the digital evidence
MI Al-Saleh
International Journal of Electronic Security and Digital Forensics 5 (3-4 …, 2013
112013
On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible?
MI Al-Saleh, JR Crandall
Proceedings of the 2010 New Security Paradigms Workshop, 17-32, 2010
112010
Live forensics of software attacks on cyber–physical systems
ZA Al-Sharif, MI Al-Saleh, LM Alawneh, YI Jararweh, B Gupta
Future Generation Computer Systems 108, 1217-1229, 2020
92020
On the memory artifacts of the tor browser bundle
A Al-Khaleel, D Bani-Salameh, MI Al-Saleh
The International Conference on Computing Technology and Information …, 2014
82014
A compression-based technique to classify metamorphic malware
D Ekhtoom, M Al-Ayyoub, M Al-Saleh, M Alsmirat, I Hmeidi
2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016
72016
Using gpus to speed-up levenshtein edit distance computation
K Balhaf, MA Shehab, T Wala'a, M Al-Ayyoub, M Al-Saleh, Y Jararweh
2016 7th International Conference on Information and Communication Systems …, 2016
72016
Towards the memory forensics of oop execution behavior
ZA Al-Sharif, MI Al-Saleh, L Alawneh
2017 8th International Conference on Information, Intelligence, Systems …, 2017
52017
Forensic artefacts associated with intentionally deleted user accounts
MI Al-Saleh, MJ Al-Shamaileh
International Journal of Electronic Security and Digital Forensics 9 (2 …, 2017
52017
Enhancing malware detection: clients deserve more protection
MI Al-Saleh, B Shebaro
International Journal of Electronic Security and Digital Forensics 8 (1), 1-16, 2016
52016
Fine-grained reasoning about the security and usability trade-off in modern security tools
MI Al-Saleh
52011
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.
ZA Al-Sharif, MI Al-Saleh, Y Jararweh, L Alawneh, AS Shatnawi
J. UCS 25 (9), 1174-1198, 2019
42019
Network Reconnaissance Investigation: A Memory Forensics Approach
MI Al-Saleh, ZA Al-Sharif, L Alawneh
2019 10th International Conference on Information and Communication Systems …, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20