UCD Home | About UCD | UCD News & Events | Virtual Tour | Contact UCD | Staff Directories | UCD Sitemap | UCD Connect

Publications

 



"Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool", M Faheem, NA Le-Khac, T Kechadi, Journal of Information Security Vol.5 No.3, 2014


"Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigation", Maarten van Barneveld, N-A. Le-Khac and M. Tahar Kechadi, 1st International Conference on Future Data and Security Engineering 2014 (FDSE 2014), Springer Verlag LNCS, HoChiMinh City, Vietnam, November 19th-21st, 2014 (accepted)


"Android and Wireless data-extraction using Wi-Fi", B. Busstra, M. Tahar Kechadi and N-A. Le-Khac, 4th IEEE international conference on Innovative Computing Technology (INTECH 2014), Luton, UK, August 13th-15th, 2014


“Forensics Acquisition and Analysis of instant messaging and VoIP applications”, Christos Sgaras, M. Tahar Kechadi and N-A. Le-Khac, 6th IAPR International Workshop on Computational Forensics (IWCF 2014), Springer Verlag LNCS, Stockhom, Sweeden, August 24th, 2014


“Toward a new cloud-based approach to preserve the privacy for detecting suspicious cases of money laundering”, N-A. Le-Khac and M. Tahar Kechadi, Global Premier International Conference on Cryptography and Security 2014 (ICCS 2014), Bangkok, Thaliand, July 18-20th, 2014


“Forensic Investigation of TomTom Application on Android Mobile devices”, Mark Roeloffs, M. Tahar Kechadi and N-A. Le-Khac, The 10th Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9 2014), Springer Verlag LNCS, Vienna, Austria, January 8-10th, 2014






Cloud-based Mobile: what about digital forensics? -- L. M. Aouad and T. Kechadi -- eForensics Magazine - Mobile, 1:2 September 2012.


ANTS ROAD: A New Tool for SQLite data Recovery On Android Devices -- L. M. Aouad and T. Kechadi -- 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), to appear, October 2012.


Mobile phone forensics: huge challenge of the future -- L. M. Aouad and T. Kechadi -- eForensics Magazine, 1:1 July 2012.


Android Forensics: a Physical Approach -- L. M. Aouad and T. Kechadi -- The 2012 International Conference on Security and Management. July 2012.


An Open Architecture for Digital Evidence Acquisition on Smart Phones -- L. M. Aouad, T. Kechadi, J. Trentesaux, and N-A Le Khac -- Advances in Digital 






“Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis”, Keyun R., Baggili I., Carthy, J., and Kechadi, M-T., Journal of Network Forensics (JNF), (in press), 2011.


“DIALOG: Digital Investigation Ontology”, D. Kahvedzic and M-T. Kechadi, Journal of Digital Forensics, Elsevier, (in press), 2011.


“Investigating Cybercrimes that Occur on Documented P2P Networks”, Scanlon, M., Hannaway, A., and Kechadi, M-T., International Journal of Ambient Computing and Intelligence (IJACI), 3(2), 2011.


“Cloud Forensics”, Ruan, K., Carthy, J., Kechadi, M-T., and Crosbie M., Book Chapter in Advances in Digital Forensics VII, Peterson, Gilbert, Shenoi, Sujeet (eds.), 1st Edition, 2011.


"Cloud Forensics: Definitions", the 7th Annula Workshop on Digital Foriensics (IFIP'11), Ruan, K., Carthy, J., and Kechadi, M-T., Orlando, Florida, USA, January 30 – February 02, 2011.


"Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis", Ruan, K., Baggili, I., Carthy, J., and Kechadi, M-T., Annual Conference on Digital Forensics, Security, and Law (ADFSL-11), Virginia, USA, May 25-27, 2011.






Investigating encrypted Material, N. McGrath, P. Gladyshev, J. Carthy International Journal of Digital Crime and Forensics, Volume 2, Issue 1, (2010)


“Towards a new Data Mining-based approach for Anti Money laundering in an international investment bank”,  Chapter in the “Digital Forensics and Cyber Crime”, Le-Khac N-A, Markos, S., and Kechadi, M-T., LNICST series, Goel S. Ed. vol.31, Springer Verlag, April 2010, ISBN: 978-3-642-11533-2.


Toward a Distributed Knowledge Discovery Framework on Grid/P2P Systems, in Emergent Web Intelligence – the series Studies in Computational Intelligence, Le-Khac, N.A., Aouad, L. and Kechadi, M-T. Springer Verlag (2010)


"A Data Mining Based Solution for Detecting Suspicious Money Cases in an Investment Bank", Le Khac, N.A. and Kechadi, M-T. The Second International Conference on Advances in Databases, Knowledge, and Data Applications, (DBKDA'010), Menuires, The 3 Vallées, Alpes, France, April 11-16, 2010.


"Self-Clustering for Identification of Customer Purchase Behaviours", Lefait, L., Goncalves, G., and Kechadi, M-T., 10eme Conference Internationale Francophone sur l'Extraction et la gestion des Connaissances (EGC 2010), Hammamet, Tunisia, January 26-29, 2010.


"Performance Evaluation of a Knowledge-Based Solution for Detecting Money Laundering in an Investment Bank", Le-Khac, N.A., Markos, S., and Kechadi, M-T., The International Conference on Information and Knowledge Engineering, (IKE'10), Las Vegas, Nevada, USA, July 12-15, 2010.


"Semantic Modelling of Digital Forensic Evidence", Kahvedzic, D., and Kechadi, M-T., 2nd International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C'2010), Abu Dhabi, UAE, October 4-6, 2010.


"Comparing Two Approaches of Disguising Transaction Data Applied in Detecting Suspicious Cases of Money Laundering in an investment Bank", Le-Khac, N-A., and Kechadi, M-T., The 3rd IEEE International Conference on Computer and Electrical Engineering, (ICCEE'2010), Chengdu, China, November, 16-18, 2010.


"Apply data mining and natural computing in detecting suspicious cases of money laundering in an investment bank: A case study", Le-Khac, N-A., and M-T. Kechadi, 10th IEEE International Conference on Data Mining (ICDM'10), Sydney, Australia, December 14-17 2010.






"High Tech Crime: A Growing Threat", Dave O'Reilly et al , About Banking , IBF report , Vol. 10 Nov. 2009, (2009)


2CENTRE; Cybercrime Centres of Excellence Network for Training, Research and Education, Cormac Callanan; Nigel Jones, This report has been prepared within the framework of the informal Law Enforcement – Industry working group hosted by University College Dublin., (2009)

A comparative methodology for the reconstruction of digital events using windows restore points, Y.Zhu, J. James, P. Gladyshev ,Digital Investigation, Volume 6, Issue 1, (2009)


Analysis of Evidence Using Formal Event Reconstruction, J. James, P. Gladyshev, M.-T. Abdullah, Y. Zhu , International Conference on Digital Forensics and Cyber Crime (ICDF2C), Albany, N.Y., USA, (2009) 


DIALOG: A Framework for Modeling, Analysis and Reuse of Digital Forensic Knowledge., D. Kahvedzic and T. Kechadi , Digital Investigation, Volume 6, Issue Sup.1, (2009) 


DIALOG: A Framework for Modeling, Analysis and Reuse of Digital Forensic Knowledge., D. Kahvedzic and T. Kechadi , Digital Forensics Research Workshop 2009, Montreal, Canada, (2009)


Education and Training on Internet Investigations, J. Carthy , (2009)


Fighting Cybercrime with Science, P. Gladyshev ,European Union Public Service Review, Issue 17, p.89, (2009)


Online Acquisition of Digital Forensic Evidence, M. Scanlon, M.-T. Kechadi ,International Conference on Digital Forensics and Cyber Crime (ICDF2C) 2009, Albany, N.Y., USA, (2009) 


Phishing detection using classifier ensembles, Toolan, F. Carthy, J. , eCrime Researchers Summit, 2009. eCRIME '09., Tacoma, WA,, p.1-9 , (2009)


Temporal Analysis of MRU Registry Keys, Y.Zhu, P. Gladyshev, J.James , Advances in Digital Forensics V, Boston, p.67-77, (2009)


Towards a new Data Mining-based Approach for Anti-Money Laundering in an International Investment Bank, N.-A. Le-Khac, S. Markos, M.-T. Kechadi , International Conference on Digital Forensics and Cyber Crime (ICDF2C) 2009, Albany, N.Y., USA, (2009) 


The Council of Europe Concept paper on cybercrime training for judges and prosecutors: Strasbourg, September 2009, 'Council of Europe project team on cybercrime training for judges and prosecutors' of which David O'Reilly was a member ,(2009)


Using ShellBag Information to Reconstruct user Activities, Y. Zhu, P. Gladyshev, J. James ,Digital Investigation, Volume 6, Issue Sup.1, (2009)


Using ShellBag Information to Reconstruct user Activities, Y.Zhu, P. Gladyshev, J.James ,Digital Forensics Research Workshop 2009, Montreal, Canada, (2009)


“Extraction and Categorisation of User Activity from Windows Restore Points”, D. Kahvedzic and M-T. Kechadi, Journal of Association of Digital Forensics, Security and Law, (ADFSL), 2009.


"An Analysis of the Scale and Distribution of Copyrighted Material on the Gnutella Network", A. Hannaway and M-T. Kechadi, The 2009 International Conference on Information Security and Privacy (ISP-09), Orlando, FL, USA, July 13-16, 2009.


"An investigation into Data Mining approaches for Anti Money Laundering", N.A. Le-Khac, S. Markos, M. O'Neill, A. Brabazon and M-Tahar Kechadi, IEEE International Conference on Knowledge Discovery, (ICKD'09), Manila, Philippine, June 2009.


"Correlating Orphaned Windows Registry Data Structures", D. Kahvedzic and M-T. Kechadi, the International Conference on Digital Forensics, Security and Law (ADFSL'09), Vermont, USA, May 20-22, 2009.


"Analysis of the 'Db' Windows Registry Data Structures", D. Kahvedzic and M-T. Kechadi, the International Conference on Digital Forensics, Security and Law (ADFSL'09), Vermont, USA, May 20-22, 2009.


"An efficient Search Tool for an Anti-Money Laundering Application of an Multi-national Bank's Dataset", N.A. Le-Khac, S. Markos, M. O'Neill, A. Brabazon and M-Tahar Kechadi, The International Conference on Information and Knowledge Engineering, (IKE'09), Monte Carlo Resort, Las Vegas, Nevada, USA, July 13-16, 2009.


"RAFT: Remote Acquisition of Forensic Evidence", M. Scanlon and M-T. Kechadi, Cyber Terrorism and Crime Conference (CYTER 2009), Prague, Czech Republic, June 22-24, 2009.


"On the Persistency of Deleted Windows Registry Data Structures", D. Kahvedzic and M-T. Kechadi; the 24th Annual ACM Symposium on Applied Computing, Honolulu, Hawaii, USA, March 8-12, 2009.


"Investigating Encrypted Material", McGrath, N., Gladychev, P., Kechadi, T., Carthy J., International E-forensics 2009: Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Adelaide, Australia, January 19-21, 2009.






Encryption, Dave O'Reilly; Robin P. Bryant (Editor) et al. ,Investigating Digital Crime, (2008)


Telecommunications fraud, in Investigating Digital Crime; Joe Carthy, Tahar Kechadi, Paul Gillen; Robin P. Bryant (Editor) , John Wiley & Sons, Ltd, 153-177. Digital Forensics, (2008)


Knowledge Discovery on Grid Systems, in Data Mining, From Data to Knowledge; Aouad, L., Le-Khac, N.A. and Kechadi, M-T. (2008). I-Tech Education and Publishing (http://www.i-techonline.com)






“Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method, Pavel Gladyshev;Andreas Enbacka ,International Journal of Digital Evidence, 11/2007, Volume 6, Issue 2, (2007) 


ISSA/UCD Irish Cybercrime Survey 2006, Owen OConnor; Pavel Gladyshev , 01/2007, Dublin, p.39, (2007)


Perl script for collecting information from MS Windows performance counters, Pavel Gladyshev ,(2007) 


UCD GDip/MSc in Forensic Computing and Cybercrime Investigation, Pavel Gladyshev , (2007) 






Voice over IP: Potential for Criminal Misuse, Paul Gillen; Pavel Gladyshev , E-Crime and Computer Evidence 2006, 12/09/2006, Nottingham, (2006)


An Analysis of feature Selection in TCPdump data., Sheppard , J., Dunnion, J., and Carthy, J. , (2006)


Data Mining A Reduced Feature TCPdump Dataset., Sheppard , J., Dunnion, J., and Carthy, J. , (2006)






Finite State Machine Analysis of A Blackmail Investigation, Pavel Gladyshev , International Journal of Digital Evidence, Volume 4, Issue 1, (2005)


Formalising Event Time Bounding in Digital Investigations, Pavel Gladyshev; Ahmed Patel ,International Journal of Digital Evidence, Volume 4, Issue 2, (2005)


The Use of Data Mining in the Implementation of a Network Intrusion Detection System, Sheppard , J., Dunnion, J., and Carthy, J. ,1st International conference on Web Information Systems and Technologies (WEBIST 05), Miami Florida, May 2005. , p.pp. 399-404, (2005) 






“Finite State Machine Approach to Digital Event Reconstruction, Pavel Gladyshev; Ahmed Patel , Digital Investigation Journal, 06/2004, Volume 1, Issue 2, p.130-149, (2004)