Follow
Andrew Marrington
Andrew Marrington
Associate Professor, Zayed University
Verified email at zu.ac.ae
Title
Cited by
Cited by
Year
Forensic analysis of social networking applications on mobile devices
N Al Mutawa, I Baggili, A Marrington
Digital investigation 9, S24-S33, 2012
2542012
Good practice for enhancing the engagement and success of commencing students
KJ Nelson, C Quinn, A Marrington, JA Clarke
Higher Education 63, 83-96, 2012
1892012
Network and device forensic analysis of android social-messaging applications
D Walnycky, I Baggili, A Marrington, J Moore, F Breitinger
Digital Investigation 14, S77-S84, 2015
1572015
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later
VS Harichandran, F Breitinger, I Baggili, A Marrington
Computers & Security 57, 1-13, 2016
872016
Forensic artifacts of Facebook’s instant messaging service
N Al Mutawa, I Al Awadhi, I Baggili, A Marrington
2011 International Conference for Internet Technology and Secured …, 2011
682011
Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers
A Marrington, I Baggili, T Al Ismail, A Al Kaf
Computer Systems and Industrial Informatics (ICCSII), 2012 International …, 2012
432012
Behavioural digital forensics model: Embedding behavioural evidence analysis into the investigation of digital crimes
N Al Mutawa, J Bryce, VNL Franqueira, A Marrington, JC Read
Digital Investigation 28, 70-82, 2019
392019
Drone forensics: challenges and new insights
H Bouafif, F Kamoun, F Iqbal, A Marrington
2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018
382018
Wordnet-based criminal networks mining for cybercrime investigation
F Iqbal, BCM Fung, M Debbabi, R Batool, A Marrington
Ieee Access 7, 22740-22755, 2019
372019
Forensic investigation of cyberstalking cases using behavioural evidence analysis
N Al Mutawa, J Bryce, VNL Franqueira, A Marrington
Digital investigation 16, S96-S103, 2016
292016
Behavioural evidence analysis applied to digital forensics: an empirical analysis of child pornography cases using P2P networks
N Al Mutawa, J Bryce, VNL Franqueira, A Marrington
2015 10th International Conference on Availability, Reliability and Security …, 2015
262015
Preliminary forensic analysis of the Xbox One
J Moore, I Baggili, A Marrington, A Rodrigues
Digital Investigation 11, S57-S65, 2014
262014
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines
A Marrington, I Baggili, G Mohay, A Clark
digital investigation 8, S52-S61, 2011
242011
Event-based computer profiling for the forensic reconstruction of computer activity
AD Marrington, GM Mohay, AJ Clark, HL Morarji
Proceedings AusCERT Asia Pacific Information Technology Security Conference …, 2007
242007
The forensic investigation of android private browsing sessions using orweb
N Al Barghouthy, A Marrington, I Baggili
2013 5th International Conference on Computer Science and Information …, 2013
232013
Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches
VNL Franqueira, J Bryce, N Al Mutawa, A Marrington
Digital Investigation 24, 95-105, 2018
212018
An economic case for systematic student monitoring and intervention in the first year in higher education
A Marrington, K Nelson, J Clarke
Proceedings of 13th Pacific Rim First Year in Higher Education Conference, 1-4, 2010
192010
Forensic artifacts of the ChatON Instant Messaging application
A Iqbal, A Marrington, I Baggili
2013 8th International Workshop on Systematic Approaches to Digital …, 2013
182013
Research trends in digital forensic science: An empirical analysis of published research
I Baggili, A BaAbdallah, D Al-Safi, A Marrington
Digital Forensics and Cyber Crime: 4th International Conference, ICDF2C 2012 …, 2013
172013
A model for computer profiling
A Marrington, G Mohay, H Morarji, A Clark
2010 International Conference on Availability, Reliability and Security, 635-640, 2010
172010
The system can't perform the operation now. Try again later.
Articles 1–20