Mohammed I. Al-Saleh
Mohammed I. Al-Saleh
Associate Professor of Computer Science, Jordan University of Science and Technology
Verified email at - Homepage
Cited by
Cited by
Live forensics of software attacks on cyber–physical systems
ZA Al-Sharif, MI Al-Saleh, LM Alawneh, YI Jararweh, B Gupta
Future Generation Computer Systems 108, 1217-1229, 2020
Skype forensics in android devices
MI Al-Saleh, YA Forihat
International Journal of Computer Applications 78 (7), 2013
A security framework for cloud-based video surveillance system
MA Alsmirat, I Obaidat, Y Jararweh, M Al-Saleh
Multimedia Tools and Applications 76, 22787-22802, 2017
{Application-Level} Reconnaissance: Timing Channel Attacks Against Antivirus Software
MI Al-Saleh, JR Crandall
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
Utilizing data lifetime of tcp buffers in digital forensics: Empirical study
MI Al-Saleh, ZA Al-Sharif
Digital Investigation 9 (2), 119-124, 2012
Antivirus performance characterisation: system‐wide view
MI Al‐Saleh, AM Espinoza, JR Crandall
IET Information Security 7 (2), 126-133, 2013
Investigating the detection capabilities of antiviruses under concurrent attacks
MI Al-Saleh, FM AbuHjeela, ZA Al-Sharif
International Journal of Information Security 14, 387-396, 2015
Using gpus to speed-up levenshtein edit distance computation
K Balhaf, MA Shehab, T Wala'a, M Al-Ayyoub, M Al-Saleh, Y Jararweh
2016 7th International Conference on Information and Communication Systems …, 2016
Ram forensics against cyber crimes involving files
M Al-Saleh, Z Al-Sharif
The Second International Conference on Cyber Security, Cyber Peacefare and …, 2013
Network reconnaissance investigation: A memory forensics approach
MI Al-Saleh, ZA Al-Sharif, L Alawneh
2019 10th International Conference on Information and Communication Systems …, 2019
Towards carving pdf files in the main memory
ZA Al-Sharif, DN Odeh, MI Al-Saleh
The International Technology Management Conference (ITMC2015), 24-31, 2015
On the memory artifacts of the tor browser bundle
A Al-Khaleel, D Bani-Salameh, MI Al-Saleh
The International Conference on Computing Technology and Information …, 2014
Forensic artefacts associated with intentionally deleted user accounts
MI Al-Saleh, MJ Al-Shamaileh
International Journal of Electronic Security and Digital Forensics 9 (2 …, 2017
The impact of the antivirus on the digital evidence
MI Al-Saleh
International Journal of Electronic Security and Digital Forensics 5 (3-4 …, 2013
On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible?
MI Al-Saleh, JR Crandall
Proceedings of the 2010 New Security Paradigms Workshop, 17-32, 2010
Towards a generic approach for memory forensics
E Qawasmeh, MI Al-Saleh, ZA Al-Sharif
2019 Sixth HCT Information Technology Trends (ITT), 094-098, 2019
IMO forensics in android and windows systems
A Ababneh, MA Awwad, MI Al-Saleh
2017 8th International Conference on Information, Intelligence, Systems …, 2017
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.
ZA Al-Sharif, MI Al-Saleh, Y Jararweh, L Alawneh, AS Shatnawi
J. Univers. Comput. Sci. 25 (9), 1174-1198, 2019
Carving and clustering files in ram for memory forensics
ZA Al-Sharif, AY Al-Khalee, MI Al-Saleh, M Al-Ayyoub
Far East Journal of Electronics and Communications (FJEC) 18 (5), 695-722, 2018
A compression-based technique to classify metamorphic malware
D Ekhtoom, M Al-Ayyoub, M Al-Saleh, M Alsmirat, I Hmeidi
2016 IEEE/ACS 13th International Conference of Computer Systems and …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20