Farkhund Iqbal holds the position of Associate Professor and Co-Director of Advanced Cyber Forensics Research Laboratory in the College of Technological Innovation, Zayed University, United Arab Emirates. He is leading Cybersecurity and Digital Forensics (CAD) research group and smart cities research center, Zayed University. He holds a Master (2005) and a Ph.D. degree (2011) from Concordia University, Canada. He is using Artificial Intelligence, Machine Learning and Data Analytics for problem-solving in health care, cybersecurity, and cybercrime investigation in smart and safe city domain.
He has published more than 100 papers in high ranked journals and conferences. He is an Affiliate Professor in the School of Information Studies, McGill University, Canada, and an Adjunct Professor in the Faculty of Business and IT, University of Ontario Institute of Technology, Canada.
He has served as a chair and TPC member of several IEEE/ACM conferences and is the reviewer for several high-rank journals. He is a member of several professional organization including ACM and IEEE Digital society.
Research interests: | |||||
|
|
|
|||
- Cybersecurity | - Digital forensics | - Machine learning & Data science | |||
- Privacy | - Identify tracing & Authorship Analysis | - Smart city and smart home security & forensics | |||
- Blockchain | - Artificial Intelligence | ||||
|
2020 (3) |
A Deep Learning Framework for Malware Classification
|
Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0
|
The Internet of Things: Challenges and considerations for cybercrime investigations and digital forensics
|
2019 (17) |
On Data-driven Curation, Learning, and Analysis for Inferring Evolving Internet-of-Things (IoT) Botnets in the Wild
|
A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys
|
Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm
|
Data-driven curation, learning and analysis for inferring evolving iot botnets in the wild
|
ER-AE: Differentially-private Text Generation for Authorship Anonymization
|
A Predictive Model for Predicting Students Academic Performance
|
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP watches
|
Memory Forensics: Recovering Chat Messages and Encryption Master Key
|
ZigBee Security Vulnerabilities: Exploration and Evaluating
|
Robot Computing for Music Visualization
|
A secure fog based platform for SCADA based IoT critical infrastructure
|
A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction
|
Wordnet-based criminal networks mining for cybercrime investigation
|
Modeling privacy preservation in smart connected toys by petri-nets
|
Unmanned aerial vehicles enabled IoT platform for disaster management
|
Drone forensics: examination and analysis
|
Smart Toys.
|
2018 (15) |
Towards a Music Visualization on Robot (MVR) Prototype
|
Arabic authorship attribution: an extensive study on Twitter posts
|
SafePath: Differentially-private publishing of passenger trajectories in transportation systems
|
Smart TV Face Monitoring for Children Privacy
|
Differentially private multidimensional data publishing
|
Intelligent multi-agent collaboration model for smart home IoT security
|
Smart home systems security
|
Security and privacy challenges in smart cities
|
Opportunistic mining of top-n high utility patterns
|
Fuzzy searching and routing in unstructured mobile peer-to-peer networks
|
Remote Data Acquisition Using Raspberry Pi3
|
Drone forensics: challenges and new insights
|
Malware classification with deep convolutional neural networks
|
A glance at research-driven university's technology transfer office in the UAE
|
A security study for smart metering systems
|
2017 (9) |
Revealing determinant factors for early breast cancer recurrence by decision tree
|
Charging infrastructure placement for electric vehicles: An optimization prospective
|
Learning stylometric representations for authorship analysis
|
Sonar: Automatic detection of cyber security events over the twitter stream
|
A Study of Detecting Child Pornography on Smart Phone
|
Privacy preservation framework for smart connected toys
|
A security threat analysis of smart home network with vulnerable dynamic agents
|
A Preliminary Study of Research-Driven University Spin-off Companies in UAE
|
Towards a privacy rule conceptual model for smart toys
|
2016 (14) |
Privacy Requirements for mobile e-Service in the Health Authority-Abu Dhabi (HAAD)
|
Forensic analysis of xbox one and playstation 4 gaming consoles
|
Magec: an image searching tool for detecting forged images in forensic investigation
|
White-hat hacking framework for promoting security awareness
|
A study of children facial recognition for privacy in smart tv
|
Children's Privacy Protection Engine for Smart Anthropomorphic Toys
|
Multimedia file signature analysis for smartphone forensics
|
A glance of child’s play privacy in smart toys
|
Privacy-preserving data mashup model for trading person-specific information
|
Towards a self adaptive system for social wellness
|
Bounded message delay with threshold time constraint in delay tolerant networks (DTNs)
|
Fuzzy query routing in unstructured mobile peer-to-peer networks
|
Forensic investigation of SIM card
|
SIM Card Forensics: Digital Evidence
|
2015 (5) |
Fusion: privacy-preserving distributed protocol for high-dimensional data mashup
|
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks
|
E-mail authorship attribution using customized associative classification
|
Identification and analysis of free games' permissions in google play
|
Graph-Theoretic Characterization of Cyber-threat Infrastructures
|
2014 (4) |
Testing the forensic soundness of forensic examination environments on bootable media
|
A forensic analysis framework for recovering encryption keys and BB10 backup decryption
|
Privacy-Preserving Medical Reports Publishing for Cluster Analysis
|
An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools
|
2013 (4) |
CAT record (computer activity timeline record): a unified agent based approach for real time computer forensic evidence collection
|
Computer Profiling for Preliminary Forensic Examination
|
Towards a unified agent-based approach for real time computer forensic evidence collection
|
A unified data mining solution for authorship analysis in anonymous textual communications
|
2012 (2) |
Mining criminal networks from chat log
|
Investigating the dark cyberspace: Profiling, threat-based analysis and correlation
|
2011 (1) |
Messaging forensic framework for cybercrime investigation
|
Speaker verification from partially encrypted compressed speech for forensic investigation
|
2010 (3) |
Mining writeprints from anonymous e-mails for forensic investigation
|
E-mail authorship verification for forensic investigation
|
2009 (1) |
Towards an integrated e-mail forensic analysis framework
|
2008 (1) |
A novel approach of mining write-prints for authorship attribution in e-mail forensics
|
Efficient scheduling of video camera sensor networks for IoT systems in smart cities
|
Best Approaches For Reducing Anti-Forensics Effectiveness When Dealing With Industrial Control Systems (ICS)
|
A Secure Fog-based Platform for SCADA-based IoT Critical Infrastructure
|
Drones Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models
|
Forensics of” Hello Barbie” Smart Toy
|
Session 4: Information security
|
Algorithms and Distributed System Applications
|
SECURITY TRACK CHAIRS Welcome Message
|
Graduate |
|
Undergrad |
|
Course (New) - Creation/Delivery |
|
Committees Membership |
I have served on multiple committees at the college and university level such as Graduate Council, Standing Committee for Graduate Programs, Quality Assurance Committee, College Council, faculty and staff search committee, College Advisory Board, and Research Committee. |
Professional membership |
|
Chair: Conference / Track / Program |
|
Guest Editor |
|
Reviewer |
|
|
2011 - Authorship Analysis |
This is my collaborative project between
CIISE and
NCFTA Canada. The work was published in Digital Investigation and Information Sciences. The study has received international coverage in
New York Times, UPI, Wired (UK),
Toronto Star, International
Business Times, PC World, Secure Computing Magazine (Australia), Computer World (New Zealand),
Thinq (UK),
MetroCanada,
TechWorld,
CIO Magazine,
R&D Magazine,
Giz Mag, the
Economic Times, Inventors
Spot, The
Inquirer, Ahmedabad
Mirror (India), IDG
News (Sweden), NetWorld (Poland),
PC Pro (UK), BBC
(in Spanish), Today Commercial News (in
Chinese),
the Chronicle of Higher Order,
the Epoch Times,
Sina.com,
TechRepublic,
Imagine,
Bit City (Italy),
The Register (UK),
La Stampa (Italy), and Slashdot.
Prof.
Mourad Debbabi was also interviewed on Radio-Canada radio's Je l'ai
vu à la radio,
Désautels,
and CBC Radio One Edmonton regarding
the study. The original story was published in the
Concordia Journal and
ENCS Faculty Magazine.
|
4th IFIP NTMS International Workshop on Cybercrime Investigation and Digital forensics (CID2020)
in conjunction with the 11th IFIP International Conference on New Technologies, Mobility and Security July 6-8, 2020 PARIS, FRANCE Technically co-sponsored by IEEE and IFIP TPC6 |
DFRWS USA 2020
July 19-22, 2020 Memphis, TN, USA |
EAI ICDF2C 2020 - 11th EAI International Conference on Digital Forensics & Cyber Crime
October 14-16, 2020 Boston, United States |
DFRWS APAC 2020
September 21-25, 2020 International Convention Centre Sydney, Australia |
NTMS2020
JULY 6-8, 2020 30- 32 Avenue de la République, 94800 Villejuif, France |
Digital investigation journal |
HESSA 53 Hawaii |
URC 2020 |