


default search action
Aisha I. Ali-Gombe
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i4]Brandon J. Walton, Mst. Eshita Khatun, James M. Ghawaly, Aisha I. Ali-Gombe:
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware. CoRR abs/2501.04848 (2025) - 2024
- [j10]Justin Woodring
, Katherine Perez
, Aisha I. Ali-Gombe:
Enhancing privacy policy comprehension through Privacify: A user-centric approach using advanced language models. Comput. Secur. 145: 103997 (2024) - [j9]Karley M. Waguespack, Kaitlyn J. Smith, Olame A. Muliri, Ramyapandian Vijayakanthan, Aisha I. Ali-Gombe:
MARS: The first line of defense for IoT incident response. Forensic Sci. Int. Digit. Investig. 49: 301754 (2024) - [c17]Sideeq Bello, Babangida Bappah, Nicholas R. Tanet, Arabelle S. Betzwieser, Aisha I. Ali-Gombe:
User Privacy in the Digital Playground: An In-Depth Investigation of Facebook Instant Games. SecDev 2024: 64-75 - 2023
- [j8]Ramyapandian Vijayakanthan
, Irfan Ahmed
, Aisha I. Ali-Gombe:
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices. Comput. Secur. 132: 103298 (2023) - [c16]Steven Seiden
, Ibrahim M. Baggili
, Aisha I. Ali-Gombe:
I've Got You, Under My Skin: Biohacking Augmentation Implant Forensics. ICDF2C (2) 2023: 315-332 - [c15]Ramyapandian Vijayakanthan, Karley M. Waguespack, Irfan Ahmed
, Aisha I. Ali-Gombe:
Fortifying IoT Devices: AI-Driven Intrusion Detection via Memory-Encoded Audio Signals. SecDev 2023: 106-117 - [i3]Bassam Zahran, Adamu Hussaini
, Aisha I. Ali-Gombe:
Security of IT/OT Convergence: Design and Implementation Challenges. CoRR abs/2302.09426 (2023) - 2022
- [j7]Modhuparna Manna, Andrew Case, Aisha I. Ali-Gombe, Golden G. Richard III:
Memory analysis of .NET and .Net Core applications. Digit. Investig. 42(Supplement): 301404 (2022) - [c14]Elizabeth Miller, Md. Rashedur Rahman
, Moinul Hossain, Aisha I. Ali-Gombe:
I Don't Know Why You Need My Data: A Case Study of Popular Social Media Privacy Policies. CODASPY 2022: 340-342 - [c13]Ramyapandian Vijayakanthan, Irfan Ahmed
, Aisha I. Ali-Gombe:
Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting. CODASPY 2022: 352-354 - [c12]Stacy Nicholson, Robert J. Hammell, Joyram Chakraborty, Aisha I. Ali-Gombe:
User Awareness and Privacy Regarding Instant Games on Facebook. HCI (42) 2022: 623-641 - [c11]Md. Rashedur Rahman, Elizabeth Miller, Moinul Hossain, Aisha I. Ali-Gombe:
Intent-aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps. ICISSP 2022: 154-164 - [i2]Md. Rashedur Rahman, Elizabeth Miller, Moinul Hossain, Aisha I. Ali-Gombe:
Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps. CoRR abs/2202.06995 (2022) - [i1]Charles R. Barone IV, Robert Serafin, Ilya Shavrov, Ibrahim M. Baggili
, Aisha I. Ali-Gombe, Golden G. Richard III, Andrew Case
:
A Reverse Engineering Education Needs Analysis Survey. CoRR abs/2212.07531 (2022) - 2021
- [j6]Ryan D. Maggio, Andrew Case
, Aisha I. Ali-Gombe, Golden G. Richard III
:
Seance: Divination of tool-breaking changes in forensically important binaries. Digit. Investig. 37 Supplement: 301189 (2021) - [j5]Modhuparna Manna
, Andrew Case
, Aisha I. Ali-Gombe, Golden G. Richard III
:
Modern macOS userland runtime analysis. Digit. Investig. 38: 301221 (2021) - [c10]Bassam Zahran
, Adamu Hussaini
, Aisha I. Ali-Gombe:
IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention. CODASPY 2021: 305-307 - [c9]Adamu Hussaini
, Bassam Zahran, Aisha I. Ali-Gombe:
Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis. CODASPY 2021: 313-315 - 2020
- [j4]Andrew Case
, Ryan D. Maggio, Md Firoz-Ul-Amin, Mohammad M. Jalalzai, Aisha I. Ali-Gombe
, Mingxuan Sun, Golden G. Richard III
:
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics. Comput. Secur. 96: 101872 (2020) - [c8]Aisha I. Ali-Gombe, Alexandra Tambaoan, Angela Gurfolino, Golden G. Richard III
:
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts. ACSAC 2020: 28-41 - [c7]Sneha Sudhakaran, Aisha I. Ali-Gombe, Augustine Orgah, Andrew Case
, Golden G. Richard III
:
AmpleDroid Recovering Large Object Files from Android Application Memory. WIFS 2020: 1-6
2010 – 2019
- 2019
- [j3]Andrew Case
, Mohammad M. Jalalzai, Md Firoz-Ul-Amin, Ryan D. Maggio, Aisha I. Ali-Gombe, Mingxuan Sun, Golden G. Richard III
:
HookTracer: A System for Automated and Accessible API Hooks Analysis. Digit. Investig. 29 Supplement: S104-S112 (2019) - [c6]Aisha I. Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III:
DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction. RAID 2019: 547-559 - 2018
- [j2]Aisha I. Ali-Gombe, Brendan Saltaformaggio, J. Ramanujam, Dongyan Xu, Golden G. Richard III
:
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. Comput. Secur. 73: 235-248 (2018) - [j1]Nathan Lewis, Andrew Case
, Aisha I. Ali-Gombe, Golden G. Richard III
:
Memory forensics and the Windows Subsystem for Linux. Digit. Investig. 26 Supplement: S3-S11 (2018) - [c5]Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images. NDSS 2018 - 2016
- [c4]Aisha I. Ali-Gombe, Irfan Ahmed
, Golden G. Richard III
, Vassil Roussev:
AspectDroid: Android App Analysis System. CODASPY 2016: 145-147 - [c3]Aisha I. Ali-Gombe, Golden G. Richard III
, Irfan Ahmed
, Vassil Roussev:
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers. WISEC 2016: 79-90 - 2015
- [c2]Aisha I. Ali-Gombe, Irfan Ahmed
, Golden G. Richard III
, Vassil Roussev:
OpSeq: Android Malware Fingerprinting. PPREW@ACSAC 2015: 7:1-7:12 - [c1]Irfan Ahmed
, Vassil Roussev, Aisha I. Ali-Gombe:
Robust Fingerprinting for Relocatable Code. CODASPY 2015: 219-229
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint