Publications

Last names tagged with * are mentored students, last names tagged with + are colleagues, $ are industry collaborators, and last names tagged with u are from underrepresented groups in computing.
P = Proceedings, J = Journal, W = White Paper, Q1 = Q1 SJR Ranked, B= B CORE Ranked, A = A CORE, A* = A* CORE  Ranked

  1. [J, Q1] Salmon*u, L., & Baggili, I. (2025). Out of Control: Igniting SCADA investigations with an HMI forensics framework and the ignition forensics artifact carving tool (IFACT). Forensic Science International: Digital Investigation, 53, 301933.
  2. [J, A*] Onik*, A. R., Brown*, J., Walker*, C., & Baggili, I. (2025). A Systematic Literature Review of Secure Instant Messaging Applications from a Digital Forensics Perspective. ACM Computing Surveys, 57(9), 1-36. 2024 Impact Factor: 28.0 (ranked 1/147 in Computer Science Theory & Methods.
  3. [J, Q1] Seiden*, S., Webb+, A. M., & Baggili, I. (2025). Tapping. IPAs: An automated analysis of iPhone applications using apple silicon macs. Forensic Science International: Digital Investigation, 52, 301871.
  4. [P, A*] Teymourian*, A. Webb+, T. Gharaibeh*, A. Ghildiyalu, I. Baggili (To Appear 2025). SoK: Come Together – Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework. USENIX Security 2025. 
  5. [J, Q1] Sharma*, B., Ghawaly+, J., McCleary*, K., Webb+, A. M., & Baggili, I. (2025). ForensicLLM: A local large language model for digital forensics. Forensic Science International: Digital Investigation, 52, 301872.
  6. [J, Q1] Onik*, A. R., Spinosa*, T. T., Asad*, A. M., & Baggili, I. (2024). Hit and run: Forensic vehicle event reconstruction through driver-based cloud data from Progressive's snapshot application. Forensic Science International: Digital Investigation, 49, 301762.
  7. [J, Q1] Gharaibeh*, T., Baggili, I., & Mahmoud+, A. (2024). On enhancing memory forensics with FAME: Framework for advanced monitoring and execution. Forensic Science International: Digital Investigation, 49, 301757. BEST PAPER AWARD.
  8. [J, Q1] Bowen*, C. J., Case+, A., Baggili, I., & Richard III+, G. G. (2024). A step in a new direction: NVIDIA GPU kernel driver memory forensics. Forensic Science International: Digital Investigation, 49, 301760.
  9. [P, B] Walker*, C., Gharaibeh*, T., Alsmadi*, R., Hall+, C., & Baggili, I. (2024, July). Forensic Analysis of Artifacts from Microsoft's Multi-Agent LLM Platform AutoGen. In Proceedings of the 19th International Conference on Availability, Reliability and Security (pp. 1-9).
  10. [P, B] Gharaibeh*, T., Seiden*, S., Abouelsaoud$, M., Bou-Harb+, E., & Baggili, I. (2024, July). Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint). In Proceedings of the 19th International Conference on Availability, Reliability and Security (pp. 1-11). BEST PAPER AWARD.
  11. [P, B] Alsmadi*u, R., Gharaibeh*, T., Webb+, A., & Baggili, I. (2024, July). Give Me Steam: A Systematic Approach for Handling Stripped Symbols in Memory Forensics of the Steam Deck. In Proceedings of the 19th International Conference on Availability, Reliability and Security (pp. 1-10).
  12. [P, B] Brown*$, J., Onik*, A. R., & Baggili, I. (2024, July). Blue Skies from (X? s) Pain: A Digital Forensic Analysis of Threads and Bluesky. In Proceedings of the 19th International Conference on Availability, Reliability and Security (pp. 1-12).
  13. [J, Q1] Onik*, A. R., Alsmadi*u, R., Baggili, I., & Webb+, A. M. (2024). So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum. Forensic Science International: Digital Investigation, 48, 301686.
  14. [J, Q1] Pace*u, L. R., Salmon*u, L. A., Bowen*, C. J., Baggili, I., & Richard III+, G. G. (2023). Every step you take, I'll be tracking you: forensic analysis of the tile tracker application. Forensic science international: digital investigation, 45, 301559.
  15. [P] Seiden*, S., Baggili, I., & Ali-Gombe+, A. (2023, November). I’ve Got You, Under My Skin: Biohacking Augmentation Implant Forensics. In International Conference on Digital Forensics and Cyber Crime (pp. 315-332). Cham: Springer Nature Switzerland. BEST PAPER AWARD.
  16. Jankura*, J., Catallo-Stooks*u, H., Baggili, I., & Richard, G.+ (2023, November). Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases. In International Conference on Digital Forensics and Cyber Crime (pp. 19-32). Cham: Springer Nature Switzerland.
  17. [P] Brown*, J., & Baggili, I. (2023, November). Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social. In International Conference on Digital Forensics and Cyber Crime (pp. 96-113). Cham: Springer Nature Switzerland.
  18. [P] Walker*, C., Baggili, I., & Wang+, H. (2023, November). Decoding HDF5: Machine Learning File Forensics and Data Injection. In International Conference on Digital Forensics and Cyber Crime (pp. 193-211). Cham: Springer Nature Switzerland.
  19. [C] Alshaya*, A., Kardorff*, A., Facundus*, C., Baggili, I., & Richard III+, G. (2023, August). Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller. In Proceedings of the 18th International Conference on Availability, Reliability and Security (pp. 1-8).
  20. [C] Soares*u, N., Seiden*, S., Baggili, I., & Webb+, W. (2023). On the Application of Synthetic Media to Penetration Testing. In Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes (WDC '23). Association for Computing Machinery, New York, NY, USA, 1–10. https://doi.org/10.1145/3595353.3595886
  21. [J] Grajedau, C., Berrios*u, J., Benzo*u, S., Ogunwobi*u, E., & Baggili, I. (2023). Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project. Forensic Science International: Digital Investigation, 45, 301566. TOP 3 PROFESSIONAL PAPER @ DFRWS 2023. 
  22. [J] Berrios*u, J., Mosher*, E., Benzo*, S., Grajedau, C., & Baggili, I. (2023). Factorizing 2FA: Forensic analysis of two-factor authentication applications. Forensic Science International: Digital Investigation, 45, 301569. TOP 3 STUDENT PAPER @ DFRWS 2023. 
  23. [J]  Dudani*, S., Baggili, I., Raymond, D., & Marchany, R. (2023). The current state of cryptocurrency forensics. Forensic Science International: Digital Investigation, 46, 301576.
  24. [J] Vondráček*, M., Baggili, I., Casey*, P., & Mekni+, M. (2023). Rise of the metaverse’s immersive virtual reality malware and the man-in-the-room attack & defenses. Computers & Security, 127, 102923.
  25. [J] Balon*, T., & Baggili, I. (2023). Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education. Education and Information Technologies, 1-33.
  26. [C] Mahr*, A., Serafin*, R., Grajeda+, C., & Baggili, I. (2022). Auto-Parser: Android Auto and Apple CarPlay Forensics. In International Conference on Digital Forensics and Cyber Crime (pp. 52-71). Springer, Cham.
  27. [J] Thomas*, T., Edwards*, T., & Baggili, I. (2022). BlockQuery: Toward forensically sound cryptocurrency investigation. Forensic Science International: Digital Investigation, 40, 301340.
  28. [C] Yasuhara+, K., Walnycky*, D., Baggili, I., & Alhishwan*, A. (2022). The Amorphous Nature of Hackers: An Exploratory Study. Annual ADFSL Conference on Digital Forensics, Security and Law.
  29. [J] Vondracek*, M., Baggili, I., Casey*, P., & Mekni+, M. (2022). Rise of the Metaverse’s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses. Computers & Security, 102923.
  30. [C] Zurowski*, S., Lord*, G., & Baggili, I. (2022, August). A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools. In Proceedings of the 17th International Conference on Availability, Reliability and Security (pp. 1-11).
  31. [J] Johnson*u, H., Volk*, K., Serafin*, R., Grajedau, C., & Baggili, I. (2022). Alt-tech social forensics: Forensic analysis of alternative social networking applications. Forensic Science International: Digital Investigation, 42, 301406.
  32. [C] Edwards*u, T., McCullough*u, S., Nassar+, M., & Baggili, I. (2022). On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics. In International Conference on Digital Forensics and Cyber Crime (pp. 35-51). Springer, Cham.
  33. [J] Wang*, E., Zurowski*, S., Duffy*, O., Thomas*, T., & Baggili, I. (2022). Juicing V8: A primary account for the memory forensics of the V8 JavaScript engine. Forensic Science International: Digital Investigation, 42, 301400.
  34. [J] Thomas*, T., Piscitelli*, M., Nahar*, B. A., & Baggili, I. (2021). Duck Hunt: Memory forensics of USB attack platforms. Forensic Science International: Digital Investigation, 37, 301190
  35. [J] McCullough*u, S., Abudu*u, S., Onwubuariri*u, E., & Baggili, I. (2021). Another brick in the wall: An exploratory analysis of digital forensics programs in the United States. Forensic Science International: Digital Investigation, 37, 301187
  36. [C] Sitterer*, A., Dubois*, N., & Baggili, I. (2021, August). Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV. In The 16th International Conference on Availability, Reliability and Security (pp. 1-12)
  37. [C] Balon*, T., Herlopian*, K., Baggili, I., & Grajeda-Mendez+u, C. (2021, August). Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts. In The 16th International Conference on Availability, Reliability and Security (pp. 1-10). BEST PAPER AWARD
  38. [J] Mahr, A., Cichonu, M., Mateou, S., Grajedau, C., & Baggili, I. (2021). Zooming into the pandemic! A forensic analysis of the Zoom application. Forensic Science International: Digital Investigation, 36, 301107[J] Hassenfeldt*u, C., Jacques*u, J., & Baggili, I. (2020). Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality. Forensic Science International: Digital Investigation, 33, 301011
  39. [J] Thomas*, T., Piscitelli*, M., Shavrov*, I., & Baggili, I. (2020). Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets–A Tool and Visualization Framework. Forensic Science International: Digital Investigation, 33, 301002
  40. [C] Baggili, I., Behzadan+, V. Founding The Domain of AI Forensics. Proceedings of the Workshop on Artificial Intelligence Safety (SafeAI 2020) (pp. 31-35)
  41. [C] Hassenfeldt*u, C., Baig*u, S., Baggili, I., & Zhang*, X. (2019, August). Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications. In Proceedings of the 14th International Conference on Availability, Reliability and Security (p. 42). ACM
  42. [J] Sanchez*u, L., Grajeda*u, C., Baggili, I., & Hall+, C. (2019). A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material (CSAM). Digital Investigation, 29, S124-S142
  43. [C] Wu+u, T., Breitinger+, F., & Baggili, I. (2019, August). IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions. In Proceedings of the 14th International Conference on Availability, Reliability and Security (p. 46). ACM
  44. [J] Casey, P*., Lindsay-Decusati*u, R., Baggili, I., & Breitinger+, F. (2019). Inception: Virtual Space in Memory Space in Real Space–Memory Forensics of Immersive Virtual Reality with the HTC Vive. Digital Investigation, 29, S13-S21
  45. [J] Ricci*, J., Baggili, I., & Breitinger+, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?. IEEE Security & Privacy, 17(1), 34-42
  46. [J] Zhang*, X., Grannis*, J., Baggili, I., & Beebe+u, N. L. (2019). Frameup: An incriminatory attack on storj: A peer to peer blockchain enabled distributed storage system. Digital Investigation
  47. [J] Casey*, P., Baggili, I., & Yarramreddy*, A. (2019). Immersive Virtual Reality Attacks and the Human Joystick. IEEE Transactions on Dependable and Secure Computing
  48. [C] Schmicker*, R., Breitinger+, F., & Baggili, I. (2018, September). AndroParse-An Android Feature Extraction Framework and Dataset. In International Conference on Digital Forensics and Cyber Crime (pp. 66-88). Springer, Cham
  49. [C] Haigh*, T., Breitinger+, F., & Baggili, I. (2018, September). If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. In International Conference on Digital Forensics and Cyber Crime (pp. 45-65). Springer, Cham. BEST PAPER AWARD
  50. [C] Dorai*u, G., Houshmand+u, S., & Baggili, I. (2018, August). I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. In Proceedings of the 13th International Conference on Availability, Reliability and Security (p. 49). ACM
  51. [C] Luciano*u, L., Baggili, I., Topor*, M., Casey*, P., & Breitinger+, F. (2018, August). Digital Forensics in the Next Five Years. In Proceedings of the 13th International Conference on Availability, Reliability and Security (p. 46). ACM
  52. [C] Yarramreddy*u, A., Gromkowski*, P., & Baggili, I. (2018, May). Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 186-196). IEEE
  53. [J] Grajeda*u, C., Sanchez*u, L., Baggili, I., Clark*, D., & Breitinger+, F. (2018). Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. Digital Investigation, 26, S47-S58.
  54. [J] Ricci*, J., Breitinger+, F., & Baggili, I. (2018). Survey results on adults and cybersecurity education. Education and Information Technologies, 1-19
  55. [B] Ricci*, J., Baggili, I., & Breitinger+, F. (2018). Watch What You Wear: Smartwatches and Sluggish Security. In Wearable Technologies: Concepts, Methodologies, Tools, and Applications (pp. 1458-1478). IGI Global
  56. [C] Knieriem*, B., Zhang*, X., Levine*, P., Breitinger+, F., & Baggili, I. (2017, October). An Overview of the Usage of Default Passwords. In International Conference on Digital Forensics and Cyber Crime (pp. 195-203). Springer
  57. [L] Saleem*, S., Popov+, O., & Baggili, I. (2017). Comments on “A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis”[Digit Investig 16S, S55–S64]. Digital Investigation, 21, 88
  58. [C] Meffert*, C., Clark*, D., Baggili, I., & Breitinger+, F. (2017, August). Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. In Proceedings of the 12th International Conference on Availability, Reliability and Security (p. 56). ACM
  59. [J] Zhang*, X., Baggili, I., & Breitinger+, F.. Breaking into the vault: privacy, security and forensic analysis of android vault applications. Computers & Security (2017), pp. –. issn: 0167-4048
  60. [J] Moore*u, J., Baggili, I., & Breitinger+, F. (2017). Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. Journal of Digital Forensics, Security and Law, 12(1), 7
  61. [J] Grajeda*u, C., Breitinger+, F., & Baggili, I. Availability of datasets for digital forensics – And what is missing. Digital Investigation 22, Supplement (2017), S94 –S105. issn: 1742- 2876
  62. [J] Denton*u, G., Karpisek*, F., Breitinger+, F., & Baggili, I. Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digital Investigation 22, Supplement (2017), S26 – S38. issn: 1742-2876
  63. [J] Clark*, D., Meffert*, C., Baggili, I., & Breitinger+, F. DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III. Digital Investigation 22, Supplement (2017), S3 –S14. issn: 1742-2876
  64. [J] Al-khateeb*, S., Conlan*, K. J., Agarwal+, N., Baggili, I., & Breitinger+, F. (2016). Exploring DeviantHacker Networks (DHN) On Social Media Platforms. Journal of Digital Forensics, Security and Law, 11(2), 7-20
  65. [J] Harichandran*, V. S., Breitinger+, F., & Baggili, I. (2016). Bytewise Approximate Matching: The Good, The Bad, and The Unknown. Journal of Digital Forensics, Security and Law, 11(2), 59-78
  66. [B] Ricci*, J., Baggili, I., & Breitinger+, F. (2017). Watch What You Wear: Smartwatches and Sluggish Security. In A. Marrington, D. Kerr, & J. Gammack (Eds.) Managing Security Issues and the Hidden Dangers of Wearable Technologies (pp. 47-73). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-1016-1.ch003
  67. [J] Meffert*, C. S., Baggili, I., & Breitinger+, F. (2016). Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Digital Investigation, 18, S87-S96
  68. [J] Harichandran*, V. S., Walnycky*, D., Baggili, I., & Breitinger+, F. (2016). CuFA: A more formal definition for digital forensic artifacts. Digital Investigation, 18, S125-S137
  69. [J] Conlan*, K., Baggili, I., & Breitinger+, F. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digital Investigation, 18, S66-S75
  70. [J] Harichandran*, V. S., Breitinger+, F., Baggili, I., & Marrington+, A. (2016). A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. Computers & Security, 57, 1-13
  71. [J] Zhang*, X., Breitinger+, F., & Baggili, I. (2016). Rapid Android Parser for Investigating DEX files (RAPID). Digital Investigation, 17, 28-39
  72. [J] Saleem*, S., Popov, O+., & Baggili, I. (2016). A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis. Digital Investigation, 16, S55-S64
  73. [J] Karpisek*, F., Baggili, I., & Breitinger+, F. (2015). WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Digital Investigation
  74. [C] Baggili, I., Oduro*u, J., Anthony*, K., Breitinger+, F., & McGee+, G. (2015, August). Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In Availability, Reliability and Security (ARES), 2015 10th International Conference on (pp. 303-311). IEEE
  75. [J] Walnycky*, D., Baggili, I., Marrington+, A., Moore*u, J., & Breitinger+, F. (2015). Network and device forensic analysis of Android social-messaging applications. Digital Investigation, 14, S77-S84
  76. [C] Gurjar*, S., Baggili, I., Breitinger+, F., & Fischer+u, A. (2015, May). An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 57-68)
  77. [C] Baggili, I., & Breitinger+, F. (2015, December). Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. In 2015 AAAI Spring Symposium Series, Stanford University, CA
  78. [C/BC] Marrington+, A., Iqbal+, F., & Baggili, I. (2014). Computer Profiling for Preliminary Forensic Examination. In Digital Forensics and Cyber Crime (pp. 207-220). Springer International Publishing
  79. [C/BC] Iqbal*, A., Alobaidli+, H., Marrington+, A., & Baggili, I. (2014). Amazon Kindle Fire HD Forensics. In Digital Forensics and Cyber Crime (pp. 39-50). Springer International Publishing
  80. [J] Saleem*, S., Baggili, I., & Popov+, O. (2014). Quantifying relevance of mobile digital evidence as they relate to case types: A survey and a guide for best practices. Journal of Digital Forensics, Security and Law, 9(3), 19-50.
  81. [J] Moore*u, J., Baggili, I., Marrington+, A., & Rodrigues*, A. (2014). Preliminary forensic analysis of the Xbox One. Digital Investigation, 11, S57-S65[J] Breitinger+, F., & Baggili, I. (2014). File Detection On Network Traffic Using Approximate Matching. Journal of Digital Forensics, Security and Law, 9(2), 23-36
  82. [J] Mohamed+, A. F. A. L., Marrington+, A., Iqbal+, F., & Baggili, I. (2014). Testing the forensic soundness of forensic examination environments on bootable media.Digital Investigation, 11, S22-S29
  83. [J] Saleem*, S., Popov,+ O., & Bagilli, I. (2014). Extended Abstract Digital Forensics Model with Preservationand Protection as Umbrella Principles. Procedia Computer Science, 35, 812-821
  84. [C] Baggili, I., Al Awawdeh*, S., & Moore*, J. (2014, May). LiFE (Logical iOS Forensics Examiner): An Open Source iOS backup forensics examination tool. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 41-52)
  85. [C] Al Awawdeh*, S., Baggili, I., Marrington+, A., & Iqbal+, F. (2013, November). CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2013 Eighth International Workshop on(pp. 1-8). IEEE
  86. [C] Iqbal+, A., Marrington+, A., and Ibrahim Baggili. Forensic artifacts of the ChatON Instant Messaging application, 2013. SADFE 2013. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2013 Eighth International Workshop on. IEEE
  87. [C/BC] Baggili, I., Marrington+, A., & Jafar*, Y. (2014). Performance of a Logical, Five-Phase, Multithreaded, Bootable Triage Tool. In Advances in Digital Forensics X(pp. 279-295). Springer Berlin Heidelberg
  88. [J] Ruan*u, K., Carthy+, J., Kechadi+, T., & Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation, 10(1), 34-43
  89. [C] Awawdeh*, S. A., Baggili, I., Marrington+, A., & Iqbal+, F. (2013, August). Towards a unified agent-based approach for real time computer forensic evidence collection. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 1492-1493). ACM
  90. [C] Barghouthy+u, N. A., Marrington+, A., & Baggili, I. (2013, March). The forensic investigation of android private browsing sessions using orweb. In Computer Science and Information Technology (CSIT), 2013 5th International Conference on (pp. 33-37). IEEE
  91. [C/BC] Al Marzougy*, M., Baggili, I., & Marrington+, A. (2013). BlackBerry PlayBook Backup Forensic Analysis. In Digital Forensics and Cyber Crime (pp. 239-252). Springer Berlin Heidelberg
  92. [C/BC] Baggili, I., BaAbdallah*u, A., Al-Safi*u, D., & Marrington+, A. (2013). Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research. In Digital Forensics and Cyber Crime (pp. 144-157). Springer Berlin Heidelberg
  93. [C/BC] Baggili, I., Al Shamlan*u, M., Al Jabri*u, B., & Al Zaabi*u, A. (2013). Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. In Digital Forensics and Cyber Crime (pp. 91-108). Springer Berlin Heidelberg
  94. [J] Al Mutawa*u, N., Baggili, I., & Marrington+, A. (2012). Forensic analysis of social networking applications on mobile devices. Digital Investigation, 9, S24-S33
  95. [C] Ali, S., AlHosani*u, S., AlZarooni*u, F., & Baggili, I. (2012). iPad2 Logical Acquisition: Automated or manual examination?. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 113-128)
  96. [C] Marrington+, A., Baggili, I., Ismail*, T. A., & Kaf*, A. A. (2012, December). Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers. In Computer Systems and Industrial Informatics (ICCSII), 2012 International Conference on (pp. 1-6). IEEE
  97. [C/BC] Bariki*u, H., Hashmi*u, M., & Baggili, I. (2011). Defining a standard for reporting digital evidence items in computer forensic tools. In Digital Forensics and Cyber Crime (pp. 78-95). Springer Berlin Heidelberg. BEST PAPER AWARD
  98. [C] Al Mutawa*u, N., Al Awadhi*u, I., Baggili, I., & Marrington+, A. (2011, December). Forensic artifacts of Facebook's instant messaging service. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 771-776). IEEE
  99. [C/BC] Trabelsi+, Z., Al-Hemairy+, M., Baggili, I., & Amin, S. (2011). Towards More Secure Biometric Readers for Effective Digital Forensic Investigation. In Digital Forensics and Cyber Crime (pp. 65-77). Springer Berlin Heidelberg[J] Marrington+, A., Baggili, I., Mohay+, G., & Clark+, A. (2011). CAT Detect (computer activity timeline detection): a Tool for Detecting Inconsistency in Computer Activity Timelines. digital investigation, 8, S52-S6
  100. [C/BC] Husain*, M. I., Baggili, I., & Sridhar+, R. (2011). A simple cost-effective framework for iPhone forensic analysis. In Digital Forensics and Cyber Crime(pp. 27-37). Springer Berlin Heidelberg
  101. [C] Ruan*u, K., Baggili, I., Carthy+, J., & Kechadi+, T. (2011, May). Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In 6th annual conference of the ADFSL Conference on Digital Forensics, Security and Law, Richmond, Virginia, USA
  102. [J] Yousef+, A. F., Baggili, I. M., Bartlett+, G., Kane+, M. D., & Mymryk, J. S. (2011). Lina: A laboratory inventory system for oligonucleotides, microbial strains, and cell lines. Journal of the Association for Laboratory Automation, 16(1), 82-89
  103. [C] Baggili, I. (2010). Generating system requirements for a mobile digital evidence collection system: a preliminary step towards enhancing the forensic collection of digital devices. European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS2010)
  104. [J] Bader*u, M., & Baggili, I. (2010). iPhone 3GS forensics: logical analysis using apple itunes backup utility. Small scale digital device forensics journal, 4(1), 1-15[C/B] Baggili, I., Mohan*, A., & Rogers+, M. (2010). SMIRK: SMS Management and Information Retrieval Kit. In Digital Forensics and Cyber Crime (pp. 33-42). Springer Berlin Heidelberg
  105. [W] Mohan*, A., Baggili, I. M., & Rogers+, M. K. (2010).Authorship attribution of SMS messages using an N-grams approach (Vol. 11). CERIAS Tech Report 2011
  106. [J] Baggili, I., & Rogers+, M. (2009). Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity. International Journal of Cyber Criminology, 3(2)
  107. [J] Baggili, I. M., Mislan+, R., & Rogers+, M. (2007). Mobile phone forensics tool testing: A database driven approach. International Journal of Digital Evidence,6(2), 168-178
  108. [C] Lutes+, K. D., Chang+u, K., & Baggili, I. M. (2006, April). Diabetic e-management system (DEMS)In Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on (pp. 619-624). IEEE