A. Ali-Gombe
Towson University
H-index: 10
North America-United States
Top articles of A. Ali-Gombe
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
I’ve Got You, Under My Skin: Biohacking Augmentation Implant Forensics | Steven Seiden Ibrahim Baggili Aisha Ali-Gombe | 2023/11/30 | |
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals | Ramyapandian Vijayakanthan Karley M Waguespack Irfan Ahmed Aisha Ali-Gombe | 2023/10/18 | |
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices | Computers & Security | Ramyapandian Vijayakanthan Irfan Ahmed Aisha Ali-Gombe | 2023/9/1 |
cRGB_Mem: At the intersection of memory forensics and machine learning | Forensic Science International: Digital Investigation | Aisha Ali-Gombe Sneha Sudhakaran Ramyapandian Vijayakanthan Golden G Richard III | 2023/7/1 |
Arabic web accessibility analysis: findings from a usability study of Arabian web developers | Human-Intelligent Systems Integration | Mona M Alnahari Joyram Chakraborty Mona Mohamed Aisha Ali-Gombe | 2022/12 |
Evaluating the Reliability of Android Userland Memory Forensics | International Conference on Cyber Warfare and Security | Sneha Sudhakaran Aisha Ali-Gombe Andrew Case Golden G Richard III | 2022/3/2 |
Sterilized Persistence Vectors (SPVs): Defense Through Deception on Windows Systems | Nicholas Phillips Aisha Ali-Gombe | 2022/11/13 | |
Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps | ICISSP 2022 | R Rahman Md Elizabeth Miller Moinul Hossain Aisha Ali-Gombe | 2022/1 |
Memory analysis of. net and. net core applications | Forensic Science International: Digital Investigation | Modhuparna Manna Andrew Case Aisha Ali-Gombe Golden G Richard III | 2022/7/1 |
User Awareness and Privacy Regarding Instant Games on Facebook | Stacy Nicholson Robert J Hammell Joyram Chakraborty Aisha Ali-Gombe | 2022/6/26 | |
I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies | Elizabeth Miller Md Rashedur Rahman Moinul Hossain Aisha Ali-Gombe | 2022/4/14 | |
A Reverse Engineering Education Needs Analysis Survey | arXiv preprint arXiv:2212.07531 | Charles R Barone IV Robert Serafin Ilya Shavrov Ibrahim Baggili Aisha Ali-Gombe | 2022/12/14 |
Transforming memory image to sound wave signals for an effective iot fingerprinting | Ramyapandian Vijayakanthan Irfan Ahmed Aisha Ali-Gombe | 2022/4/14 | |
IIoT-ARAS: IIoT/ICS Automated risk assessment system for prediction and prevention | Bassam Zahran Adamu Hussaini Aisha Ali-Gombe | 2021/4/26 | |
Object allocation pattern as an indicator for maliciousness-an exploratory analysis | Adamu Hussaini Bassam Zahran Aisha Ali-Gombe | 2021/4/26 | |
Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook | Proceedings of the Conference on Information Systems Applied Research ISSN | Stacy Nicholson Joyram Chakraborty Aisha Ali-Gombe Robert J Hammell II | 2021 |
Digital Investigation and the Trojan Defense, Revisited | Golden G Richard Andrew Case Modhuparna Manna Elsa AM Hahne Aisha Ali-Gombe | 2021/9/14 | |
Seance: Divination of Tool-Breaking Changes in Forensically Important Binaries | Forensic Science International: Digital Investigation | Ryan D Maggio Andrew Case Aisha Ali-Gombe Golden G Richard III | 2021/7/1 |
Modern macOS userland runtime analysis | Forensic Science International: Digital Investigation | Modhuparna Manna Andrew Case Aisha Ali-Gombe Golden G Richard III | 2021/9/1 |
Security of IT/OT Convergence: Design and Implementation Challenges | arXiv preprint arXiv:2302.09426 | Bassam Zahran Adamu Hussaini Aisha Ali-Gombe | 2023/2/18 |