Parameters for image-map-2:{}
University of New Haven logo
Baggili, Abe
Ibrahim (Abe)
Baggili
Ph.D.
Assistant Professor
Tagliatela College of Engineering
Electrical, Computer Engineering and Computer Science
203-932-7198
BCKM252
Buckman Hall
Biography

    Dr. Ibrahim (Abe) Baggili is an Assistant Professor of Computer Science at the Tagliatela College of Engineering, University of New Haven. He specializes in cyber forensics and security. Prior to coming to UNH, he was the director of the Advanced Cyber Forensics Research Laboratory (ACFRL) in the College of Technological Innovation at Zayed University, Abu Dhabi, UAE. He received his BS, MS and PhD degrees in Computer Information Technology from Purdue University, USA. His PhD research focused on information security and cyber forensics. While at Purdue, Dr. Baggili was a researcher at both the Center for Education and Research in Information Assurance and Security (CERIAS), and the Cyber Forensics Laboratory. He also was a Graduate Lecturer and taught classes.

    Dr. Baggili’s research interests include cyber forensics from technical, social, and psychological perspectives, and finding ways to improve the scientific validity of the field. He has worked closely with law enforcement, published work on real challenges facing cybercriminal investigators, and has presented his work at a number of conferences worldwide. He has led several research projects, including the effect of anonymity and integrity on cyber engagement, authorship attribution of SMS messages, iPhone forensics, volatile memory forensics, e-mail forensics, computer event reconstruction, standardization of digital evidence, and the forensics of social networking applications on mobile devices.

    Dr. Baggilli currently serves on the advisory board for a UK-based company that develops cyber security and digital forensics products, and is a co-founder of Tawilati.com, an online cloud-based, real-time restaurant reservation engine for the Middle East.

    To learn more about Dr. Baggili and his work please visit http://baggili.weebly.com.

Academic Credentials

    Education

    Ph.D. in Computer Information Technology (Emphasis on Cyber Security and Cyber Forensics), Purdue University
    M.S. in Computer Information Technology (Emphasis on Programming for Mobile Devices), Purdue University
    B.S. in Computer and Information Technology - Network Engineering Technology (With Distinction), Purdue University

    Certifications

    Access Data Windows Forensics, Registry and Applied Decryption, 2008
    Access Data Boot Camp Certification (Passed the Practical Skills Assessment), 2007

    Honors & Awards

    • Exemplary Faculty Award, Zayed University, United Arab Emirates, 2012
    • Adviser of Best Undergraduate Capstone Award for Jena2i (e-learning system for judges and lawyers in the U.A.E.), presented by Minister of Higher Education H.E. Sheikh Nahyan Bin Zayed University, United Arab Emirates, 2011
    • ICST Best Paper Award at the 2nd International Conference on Digital Forensics and Cyber Crime for: “Defining a standard for reporting digital evidence items in computer forensic tools,” 2010
    • Bilsland Dissertation Fellowship, Purdue University, 2008

    Selected Publications

    Ravai, G., and Baggili, I.M. (2013).   Step into Programming with Visual Basic .NET. 4th Edition,Kendall Hunt Publishing. 

    Al Mutawa, N., Baggili, I., and Marrington, A. (2012). “Forensic analysis of social networking applications on mobile devices.” Digital Investigation9, S24-S33.

    Marrington, A., Baggili, I., Ismail, T. A., and Kaf, A. A. (2012). “Portable web browser forensics: a forensic examination of the privacy benefits of portable web browsers.” Proceedings of the International Conference on Computer Systems and Industrial Informatics (ICCSII), IEEE, pp. 1-6.

    Ruan, K., Baggili, I., Carthy, J., and Kechadi, T. (2011). “Survey on cloud forensics and critical criteria for cloud forensic capability: a preliminary analysis.” Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law.

    Baggili, I. (Ed.). (2011). Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Revised Selected Papers, Vol. 53, Springer.

    Bariki, H., Hashmi, M., and Baggili, I. (2011). “Defining a standard for reporting digital evidence items in computer forensic tools. In Digital Forensics and Cyber Crime, Springer Berlin Heidelberg, pp. 78-95,

    Marrington, A., Baggili, I., Mohay, G., and Clark, A. (2011). “CAT Detect (Computer Activity Timeline Detection): a tool for detecting inconsistency in computer activity timelines.” Digital Investigation8, S52-S61.

    Yousef, A. F., Baggili, I. M., Bartlett, G., Kane, M. D., and Mymryk, J. S. (2011). “LINA: a laboratory inventory system for oligonucleotides, microbial strains, and cell lines. Journal of the Association for Laboratory Automation16(1), 82-89. 

    Bader, M., and Baggili, I. (2010). “iPhone 3GS forensics: logical analysis using Apple iTunes backup utility.” Small Scale Digital Device Forensics4(1).

    Baggili, I., and Rogers, M. (2009). “Self-reported cyber crime: an analysis on the effects of anonymity and pre-employment integrity. International Journal of Cyber Criminology3(2).

    Baggili, I. M., Mislan, R., and Rogers, M. (2007). “Mobile phone forensics tool testing: a database driven approach.” International Journal of Digital Evidence,6(2), 168-178.

    (Click here for a complete list of publications.)

    Recent Grants

    Iqbal, F., Baggili, I., and Marrington, A., Social media forensics for cybercrime investigation and detection, Zayed University Research Office, 2013. 

    Marrington, A., Baggili, I., and Iqbal, F., Complex hypothesis testing in digital forensic event reconstruction, Zayed University Research Office, 2013. 

    Baggili, I., Marrington, A., and Iqbal, F., CAT-Recorder (Computer Activity Timeline Recorder): an agent based approach for real time computer forensic evidence collection, Zayed University Research Office, 2013.

    Baggili, I. M., Second-hand cellular phones: do they pose a threat to our privacy? Zayed University Research Office, 2010.