Skip to main content
MENU
Toggle navigation menu
Sign up
Log in
Zayed University
Digital Commons Gallery
Expert Gallery
Follow
Contact
Selected Works of
Andrew Marrington
Selected Works of
Save
Cancel
Associate Professor
Title
Save
Cancel
read more
Works
About
×
About Andrew Marrington
Positions
Present
Associate Professor,
Zayed University
‐
College of Technological Innovation
Institution
Organization
Position Type
Position Title
Time Period
to
Options
Current Position
Affiliate my profile with this Institution
Save
Cancel
Disciplines
Computer Sciences
Title
URL
Funding Agency
Grant Name
Grant Number
Amount
$
Role
Colleague(s)
Time Period
to
Enter a valid date range.
Current Grant
Save
Cancel
Position
Affiliation
Time Period
to
Enter a valid date range.
Current Position
URL
Save
Cancel
ORCID
http://orcid.org/0000-0002-3839-6675
Jump to Category
View All
Research Works
Research Works
(37)
Article
The 13th international workshop on digital forensics (WSDF 2020)
ACM International Conference Proceeding Series (2020)
Richard E. Overill, Virginia N.L. Franqueira, Andrew Marrington, Andrew Jones, et al.
Article
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the ...
Digital Investigation (2019)
Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, Andrew Marrington, et al.
© 2018 Elsevier Ltd The state-of-the-art and practice show an increased recognition, but limited adoption, of Behavioural Evidence Analysis (BEA) ...
Link
Article
Wordnet-Based Criminal Networks Mining for Cybercrime Investigation
IEEE Access (2019)
Farkhund Iqbal, Benjamin C.M. Fung, Mourad Debbabi, Rabia Batool, et al.
© 2019 IEEE. Cybercriminals exploit the opportunities provided by the information revolution and social media to communicate and conduct underground ...
Download
Article
Welcome Message from the WSDF Workshop Organizers
ACM International Conference Proceeding Series (2018)
Richard E. Overill, Virginia N.L. Franqueira, Andrew Marrington and Andrew Jones
Article
Drone Forensics: Challenges and New Insights
2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings (2018)
Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal and Andrew Marrington
© 2018 IEEE. Powerful information acquisition and processing capabilities, coupled with intelligent surveillance and reconnaissance features, have contributed to increased ...
Link
Article
Investigation of Indecent Images of Children cases: Challenges and suggestions ...
Digital Investigation (2018)
Virginia N.L. Franqueira, Joanne Bryce, Noora Al Mutawa and Andrew Marrington
© 2017 Elsevier Ltd Previous studies examining the investigative challenges and needs of Digital Forensic (DF) practitioners have typically taken ...
Link
Article
A study of detecting child pornography on smart phone
Lecture Notes on Data Engineering and Communications Technologies (2018)
Farkhund Iqbal, Andrew Marrington, Patrick C.K. Hung, Jing Jie Lin, et al.
© Springer International Publishing AG 2018. Child Pornography is an increasingly visible rising cybercrime in the world today. Over the ...
Link
Contribution to Book
The promise and perils of wearable technologies
Wearable Technologies: Concepts, Methodologies, Tools, and Applications (2018)
John Gammack and Andrew Marrington
Wearable technology collectively describes some of the most exciting emerging technologies, encompassing smart gadgets, garments, jewelry, and other devices worn ...
Link
Article
Forensic analysis of xbox one and playstation 4 gaming consoles
8th IEEE International Workshop on Information Forensics and Security, WIFS 2016 (2017)
Salam Khanji, Raja Jabir, Farkhund Iqbal and Andrew Marrington
© 2016 IEEE. This paper highlights the challenges faced due to non-Availability of trusted specialized forensic tools for conducting investigation ...
Link
Contribution to Book
The promise and perils of wearable technologies
Managing Security Issues and the Hidden Dangers of Wearable Technologies (2017)
John Gammack and Andrew Marrington
Wearable technology collectively describes some of the most exciting emerging technologies, encompassing smart gadgets, garments, jewelry, and other devices worn ...
Link
Article
Message from the WSDF 2016 workshop organizers
Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016 (2016)
Richard E. Overill, Virginia N.L. Franqueira, Andrew Marrington and Andrew Jones
Link
Book
Managing Security Issues and the Hidden Dangers of Wearable Technologies
Managing Security Issues and the Hidden Dangers of Wearable Technologies (2016)
Andrew Marrington, Don Kerr and John Gammack
© 2017 by IGI Global. All rights reserved. Advances in mobile computing have provided numerous innovations that make people's daily ...
Link
Article
A cyber forensics needs analysis survey: Revisiting the domain's ...
Computers and Security (2016)
Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili and Andrew Marrington
© 2015 Elsevier Ltd. The number of successful cyber attacks continues to increase, threatening financial and personal security worldwide. Cyber/digital ...
Download
Article
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis
Digital Investigation (2016)
Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira and Andrew Marrington
Behavioural Evidence Analysis (BEA) is, in theory, useful in developing an understanding of the offender, the victim, the crime scene, ...
Download
Article
Behavioural evidence analysis applied to digital forensics: An empirical analysis ...
Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015 (2015)
Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira and Andrew Marrington
© 2015 IEEE. The utility of Behavioural Evidence Analysis (BEA) has gained attention in the field of Digital Forensics in ...
Link
Article
Factors influencing digital forensic investigations: Empirical evaluation of 12 years ...
Journal of Digital Forensics, Security and Law (2015)
Ibtesam Alawadhi, Janet Read, Andrew Marrington and Virginia Franqueira
In Digital Forensics, the number of person-hours spent on investigation is a key factor which needs to be kept to ...
Download
Article
Network and device forensic analysis of Android social-messaging applications
Digital Investigation (2015)
Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, et al.
In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications ...
Download
Article
Forensic artifacts of the ChatON Instant Messaging application
Int. Workshop Syst. Approaches Digit. Forensics Eng., SADFE (2014)
Asif Iqbal, Andrew Marrington and Ibrahim Baggili
© 2013 IEEE. Instant Messaging (IM) is one of the most used types of applications across all digital devices, and ...
Link
Article
A comparison of forensic acquisition techniques for android devices: A ...
2014 6th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2014 Conference and Workshops (2014)
Nedaa Al Barghouthy and Andrew Marrington
The issue of whether to "root" a small scale digital device in order to be able to execute acquisition tools ...
Link
Article
Amazon Kindle Fire HD forensics
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (2014)
Asif Iqbal, Hanan Alobaidli, Andrew Marrington and Ibrahim Baggili
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014. This research presents two developed approaches for the forensic ...
Link
Article
CAT Record (computer activity timeline record): A unified agent based ...
Int. Workshop Syst. Approaches Digit. Forensics Eng., SADFE (2014)
Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington and Farkhund Iqbal
© 2013 IEEE. In this paper we present CAT Record - a real time computer forensics agent that records computer ...
Link
Article
Computer Profiling for Preliminary Forensic Examination
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (2014)
Andrew Marrington, Farkhund Iqbal and Ibrahim Baggili
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014. The quantity problem and the natural desire of law ...
Link
Article
Digital forensics and cyber crime: Fifth international conference, ICDF2C 2013 ...
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (2014)
Pavel Gladyshev, Andrew Marrington and Ibrahim Baggili
Article
Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications (2014)
Ibrahim Baggili, Andrew Marrington and Yasser Jafar
This paper describes a five-phase, multi-threaded bootable approach to digital forensic triage, which is implemented in a product called Forensics2020. ...
Link
Article
Performance of a logical, five-phase, multithreaded, bootable triage tool
IFIP Advances in Information and Communication Technology (2014)
Ibrahim Baggili, Andrew Marrington and Yasser Jafar
© IFIP International Federation for Information Processing 2014. This paper describes a five-phase, multi-threaded bootable approach to digital forensic triage, ...
More