A. Ali-Gombe

A. Ali-Gombe

Towson University

H-index: 10

North America-United States

About A. Ali-Gombe

A. Ali-Gombe, With an exceptional h-index of 10 and a recent h-index of 9 (since 2020), a distinguished researcher at Towson University, specializes in the field of Cybersecurity, Digital Forensics, Malware Analysis and Detection, Android Security and Privacy.

His recent articles reflect a diverse array of research interests and contributions to the field:

I’ve Got You, Under My Skin: Biohacking Augmentation Implant Forensics

Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals

SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices

cRGB_Mem: At the intersection of memory forensics and machine learning

Arabic web accessibility analysis: findings from a usability study of Arabian web developers

Evaluating the Reliability of Android Userland Memory Forensics

Sterilized Persistence Vectors (SPVs): Defense Through Deception on Windows Systems

Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps

A. Ali-Gombe Information

University

Position

Assistant Professor

Citations(all)

303

Citations(since 2020)

253

Cited By

131

hIndex(all)

10

hIndex(since 2020)

9

i10Index(all)

10

i10Index(since 2020)

9

Email

University Profile Page

Towson University

Google Scholar

View Google Scholar Profile

A. Ali-Gombe Skills & Research Interests

Cybersecurity

Digital Forensics

Malware Analysis and Detection

Android Security and Privacy

Top articles of A. Ali-Gombe

Title

Journal

Author(s)

Publication Date

I’ve Got You, Under My Skin: Biohacking Augmentation Implant Forensics

Steven Seiden

Ibrahim Baggili

Aisha Ali-Gombe

2023/11/30

Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals

Ramyapandian Vijayakanthan

Karley M Waguespack

Irfan Ahmed

Aisha Ali-Gombe

2023/10/18

SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices

Computers & Security

Ramyapandian Vijayakanthan

Irfan Ahmed

Aisha Ali-Gombe

2023/9/1

cRGB_Mem: At the intersection of memory forensics and machine learning

Forensic Science International: Digital Investigation

Aisha Ali-Gombe

Sneha Sudhakaran

Ramyapandian Vijayakanthan

Golden G Richard III

2023/7/1

Arabic web accessibility analysis: findings from a usability study of Arabian web developers

Human-Intelligent Systems Integration

Mona M Alnahari

Joyram Chakraborty

Mona Mohamed

Aisha Ali-Gombe

2022/12

Evaluating the Reliability of Android Userland Memory Forensics

International Conference on Cyber Warfare and Security

Sneha Sudhakaran

Aisha Ali-Gombe

Andrew Case

Golden G Richard III

2022/3/2

Sterilized Persistence Vectors (SPVs): Defense Through Deception on Windows Systems

Nicholas Phillips

Aisha Ali-Gombe

2022/11/13

Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps

ICISSP 2022

R Rahman Md

Elizabeth Miller

Moinul Hossain

Aisha Ali-Gombe

2022/1

Memory analysis of. net and. net core applications

Forensic Science International: Digital Investigation

Modhuparna Manna

Andrew Case

Aisha Ali-Gombe

Golden G Richard III

2022/7/1

User Awareness and Privacy Regarding Instant Games on Facebook

Stacy Nicholson

Robert J Hammell

Joyram Chakraborty

Aisha Ali-Gombe

2022/6/26

I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies

Elizabeth Miller

Md Rashedur Rahman

Moinul Hossain

Aisha Ali-Gombe

2022/4/14

A Reverse Engineering Education Needs Analysis Survey

arXiv preprint arXiv:2212.07531

Charles R Barone IV

Robert Serafin

Ilya Shavrov

Ibrahim Baggili

Aisha Ali-Gombe

...

2022/12/14

Transforming memory image to sound wave signals for an effective iot fingerprinting

Ramyapandian Vijayakanthan

Irfan Ahmed

Aisha Ali-Gombe

2022/4/14

IIoT-ARAS: IIoT/ICS Automated risk assessment system for prediction and prevention

Bassam Zahran

Adamu Hussaini

Aisha Ali-Gombe

2021/4/26

Object allocation pattern as an indicator for maliciousness-an exploratory analysis

Adamu Hussaini

Bassam Zahran

Aisha Ali-Gombe

2021/4/26

Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook

Proceedings of the Conference on Information Systems Applied Research ISSN

Stacy Nicholson

Joyram Chakraborty

Aisha Ali-Gombe

Robert J Hammell II

2021

Digital Investigation and the Trojan Defense, Revisited

Golden G Richard

Andrew Case

Modhuparna Manna

Elsa AM Hahne

Aisha Ali-Gombe

2021/9/14

Seance: Divination of Tool-Breaking Changes in Forensically Important Binaries

Forensic Science International: Digital Investigation

Ryan D Maggio

Andrew Case

Aisha Ali-Gombe

Golden G Richard III

2021/7/1

Modern macOS userland runtime analysis

Forensic Science International: Digital Investigation

Modhuparna Manna

Andrew Case

Aisha Ali-Gombe

Golden G Richard III

2021/9/1

Security of IT/OT Convergence: Design and Implementation Challenges

arXiv preprint arXiv:2302.09426

Bassam Zahran

Adamu Hussaini

Aisha Ali-Gombe

2023/2/18

See List of Professors in A. Ali-Gombe University(Towson University)

Co-Authors

H-index: 65
Dongyan Xu

Dongyan Xu

Purdue University

H-index: 64
Xiangyu Zhang

Xiangyu Zhang

Purdue University

H-index: 33
Vassil Roussev

Vassil Roussev

University of New Orleans

H-index: 29
Golden G. Richard III

Golden G. Richard III

Louisiana State University

H-index: 28
Irfan Ahmed

Irfan Ahmed

Virginia Commonwealth University

H-index: 20
Brendan D. Saltaformaggio

Brendan D. Saltaformaggio

Georgia Institute of Technology

academic-engine