Access Data Boot Camp Certification (Passed the Practical Skills Assessment), 2007
Honors & Awards
University Research Scholar, University of New Haven, 2014-2017
Exemplary Faculty Award, Zayed University, United Arab Emirates, 2012
Adviser of Best Undergraduate Capstone Award for Jena2i (e-learning system for judges and lawyers in the U.A.E.), presented by Minister of Higher Education H.E. Sheikh Nahyan Bin Zayed University, United Arab Emirates, 2011
ICST Best Paper Award at the 2nd International Conference on Digital Forensics and Cyber Crime for: “Defining a standard for reporting digital evidence items in computer forensic tools,” 2010
Bilsland Dissertation Fellowship, Purdue University, 2008
Ravai, G., and Baggili, I.M. (2013). Step into Programming with Visual Basic .NET. 4th Edition,Kendall Hunt Publishing.
Al Mutawa, N., Baggili, I., and Marrington, A. (2012). “Forensic analysis of social networking applications on mobile devices.” Digital Investigation, 9, S24-S33.
Marrington, A., Baggili, I., Ismail, T. A., and Kaf, A. A. (2012). “Portable web browser forensics: a forensic examination of the privacy benefits of portable web browsers.” Proceedings of the International Conference on Computer Systems and Industrial Informatics (ICCSII), IEEE, pp. 1-6.
Ruan, K., Baggili, I., Carthy, J., and Kechadi, T. (2011). “Survey on cloud forensics and critical criteria for cloud forensic capability: a preliminary analysis.” Proceedings of the 2011 ADFSL Conference on Digital Forensics, Security and Law.
Baggili, I. (Ed.). (2011). Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010, Revised Selected Papers, Vol. 53, Springer.
Bariki, H., Hashmi, M., and Baggili, I. (2011). “Defining a standard for reporting digital evidence items in computer forensic tools. In Digital Forensics and Cyber Crime, Springer Berlin Heidelberg, pp. 78-95.
Marrington, A., Baggili, I., Mohay, G., and Clark, A. (2011). “CAT Detect (Computer Activity Timeline Detection): a tool for detecting inconsistency in computer activity timelines.” Digital Investigation, 8, S52-S61.
Yousef, A. F., Baggili, I. M., Bartlett, G., Kane, M. D., and Mymryk, J. S. (2011). “LINA: a laboratory inventory system for oligonucleotides, microbial strains, and cell lines. Journal of the Association for Laboratory Automation, 16(1), 82-89.
Bader, M., and Baggili, I. (2010). “iPhone 3GS forensics: logical analysis using Apple iTunes backup utility.” Small Scale Digital Device Forensics, 4(1).
Baggili, I., and Rogers, M. (2009). “Self-reported cyber crime: an analysis on the effects of anonymity and pre-employment integrity. International Journal of Cyber Criminology, 3(2).
Baggili, I. M., Mislan, R., and Rogers, M. (2007). “Mobile phone forensics tool testing: a database driven approach.” International Journal of Digital Evidence,6(2), 168-178.
Click herefor a complete list of publications.
Iqbal, F., Baggili, I., and Marrington, A., Social media forensics for cybercrime investigation and detection, Zayed University Research Office, 2013.
Marrington, A., Baggili, I., and Iqbal, F., Complex hypothesis testing in digital forensic event reconstruction, Zayed University Research Office, 2013.
Baggili, I., Marrington, A., and Iqbal, F., CAT-Recorder (Computer Activity Timeline Recorder): an agent based approach for real time computer forensic evidence collection, Zayed University Research Office, 2013.
Baggili, I. M., Second-hand cellular phones: do they pose a threat to our privacy? Zayed University Research Office, 2010.