国产自拍

Ahmad Ghafarian, Ph.D

Ahmad Ghafarian

Professor - Computer Science

Phone706-864-1498

Office locationCottrell Center, 304,

Area(s) of Expertise: Information Security, Computer Forensics

Overview

Dr. Ahmad Ghafarian serves as professor of computer science in the Mike Cottrell College of Business at the University of North Georgia and has served 国产自拍's students for more than 20 years. Dr. Ghafarian believes in fostering a positive teacher-student relationship by caring for the students’ well-being and understanding their difficulties in acquiring knowledge. A good teacher should be committed to bringing out the best in every student with their passion for teaching and love for the students.

Courses Taught

Graduate Cybersecurity Courses

Foundation of Information Security
Cryptography & Data Protection
Intrusion Detection Systems (IDS)
Risk Management
Advanced Network Security
Advanced Software Security
Cloud Computing Security
Information Security Capstone

Graduate Computer Science Courses

Operating Systems
Compiler Construction
Software Engineering
Analysis of Algorithms
Theory of Computation
Programming Languages
Numerical Analysis
Software Security

Undergrad Cybersecurity courses

Information Security Architecture
Computer Security
Cybersecurity & Cyberterrorism
Computer Forensics
Information Security
Cybersecurity Capstone
Network Security

Undergrad Computer Science Courses

Object-Oriented Programming
C++, Java & Python Programming
Data Structure
Computer Organization
Computer Ethics
Computer Science Capstone
Operating Systems

Education

  • Ph.D, Computer Science, University of Glasgow, UK, 1982
  • M.S., Computer Science, University of Glasgow, UK, 1974
  • B.S., Mathematics, Ferdowsi University of Mashhad, Iran, 1970
  • Postdoctoral Studies, Information Security, University of Maryland University College (UMUC), 2007
  • Graduate Certificate, Information Security, Purdue University, Indiana, 2003

Research/Special Interests

  • Computer Forensics
  • Malware detection and analysis
  • Cloud computing security
  • Security/privacy of online social media networking
  • SQL injection attack

Publications

  • Ghafarian, A. and Deep Patel. “Application of Memory Forensics in the Assessment of Twitter Security and Privacy.” Submitted November 12, 2021, to the International Journal of Cyber Forensics and Advanced Threat Investigation.
  • Ghafarian, A., Ash Mady and kyung Park. “An Empirical Analysis of Email Forensics Tools”. International Journal of Network Security & Its Application (IJNSA). Vol 12, No. 3, pp. 39-57, May 2020. ISSN: 0974 – 9330 [online]: 0975 – 2307 [print].https://aircconline.com/ijnsa/V12N3/12320ijnsa03.pdf
  • Ghafarian, A, Ash Mady and Charlie Wood. “An empirical Study of Skype Data Retrieval from Main Memory”. International Journal of Computer Applications (0975 –8887). Vol 178, No. 29, pp. 4-12, July 18, 2019. DOI: 10.5120/ijca2019919115
  • Ghafarian, A and Maria Dehghani, “An Empirical Study of Security of VoIP System”. International Journal of Computer Applications (0975 – 8887). Vol 181-No 10, pages 6-11, August 2018. 
  • Cannols, B and A. Ghafarian, “Hacking Experiment Using USB Rubber Ducky Scripting.” Journal of Systemics, Cybernetics and Informatics, 15(2), pp. 66-71, 2017.
  • Ghafarian A, and S. A. Hosseini Seno, “Forensics Evaluation of Privacy of Portable Web Browsers.” International Journal of Computer Applications, 132(16), pp. 27-34, 2016.
  • Ghafarian A., and S. A. Hosseini Seno, “Analysis of Privacy of Private Browsing Mode through Memory Forensics.” International Journal of Computer Application, 132(16), pp. 27-34, 2015.
  • Jahanbin A, A. Ghafarian, S.A. Hosseini Seno, and S. Nikokar, “A Computer Forensics Approach Based on Autonomous Intelligent Multi-Agent System.” International Journal of Database Theory and Applications, 6(5), pp. 1-12, 2013.
  • Ghafarian A., “Securing Voice over Interment Protocol (VoIP). International Journal of Information Assurance and Security (IAS), 2(3), pp. 200-204, September 2007.
  • Ghafarian A., “Integrating Ethical Issues Into the Undergraduate Computer Science Curriculum.” Journal of Computing Science in Colleges, 18(2), pp. 180-188, December 2002.
  • Ghafarian A., “Incorporating a Semester long Project into the CS 2 course.“ Journal of Computing Science in Colleges, 17(2), pp. 172-178, December 2001.
  • Ghafarian A., “Teaching Design Effectively in the Introductory Programming Courses.” Journal of Computing in Small Colleges, 16(2), pp. 201-208, January 2001.
  • Ghafarian A., “Lessons Learned in Teaching Object-Oriented Programming in CS1.” Journal of Computing in Small Colleges, 15(2), pp. 278-286, November 1999.
  • Ghafarian A., “Incorporating Software Testing In Programming Courses.“ Journal of Computing in Small Colleges, 14 (3), pp. 85-91, 1998.
  • Ghafarian A., “Electronic Administration and Grading of Programming Assignments, “Journal of Computing in Small Colleges, 13 (4), pp. 6 - 11, November, 1997.
  • Jameison M.J. and A. Ghafarian, “The Geometric Approximation as an Example of Aitken’s - ∂2 Transformation,” Molecular Physics, 32(6), pp. 1777-1780, 1976.
  • Jameison M.J. and A. Ghafarian, “The Geometric Approximation in Time Dependent Hartree-Fock Theory”, Molecular Physics, 30(5), pp. 1611-1614, 1975.
  • Ghafarian, A. and Deniz Keskin. “Using Memory Forensics to Investigate Security and Privacy of Facebook.” Proceedings of the 2022 Computing Conference, Springer Publication, (IEEE Explore) Vol 3, pp. 581-601. The conference was held in London, UK, July 14-15. (Attended Virtually). ISSN 2367-3370 ISSN 2367-3389 (electronic). Lecture Notes in Networks and Systems ISBN 978-3-031-10466-4 ISBN 978-3-031-10467-1 (eBook).
  • Ghafarian, A. Darius Fiallo. An Analysis of Twitter Security and Privacy using Memory Forensics. Proceedings of 2021 Computing Conference, Springer publication, (IEEE Explore) Vol 3, pp. 743-760. The conference was held in London, UK, on July 15-16, 2021. (Attended Virtually). ISSN 2367-3370 ISSN 2367-3389 (electronic). Lecture Notes in Networks and Systems. ISBN 978-3-030-80128-1 ISBN 978-3-030-80129-8 (eBook).
  • Ghafarian, A, Deniz Keskin, and Graham Helton. An Assessment of Obfuscated Ransomware Detection and Prevention Methods. Proceedings of the Future of the Information Communication Conference (FICC) 2021 Conference, pp Vancouver, Canada April 29-30, 2021. (IEEE Explore) Vol 1, pp 793-811.
  • Ghafarian, A. and Deniz Keskin. Windows 10 Hibernation File Forensics. Proceedings of the Computing Conference. 16-17 July 2020. London UK. (IEEE Explore) (IEEE Explore) Vol 3, PP. 431-445. ISSN 2194-5357, ISSN 2194-5365 (electronic), ISBN 978-3-030-52242-1, 978-3-030-52243-8 (eBook). Advances in Intelligent Systems and Computing. .
  • Ghafarian, A. and Saman Sardari. An Analysis of Connected Cars Technology and Security. Proceedings of the 15th International Conference on Cyber Warfare and Security. Old Dominion University, Norfolk, VA, March 12-13, 2020. pp 195-203.
  • Ghafarian, A. Capabilities of Email Forensics Tools. Proceedings of the Computing Conference. 16-17 July 2019. London UK. (IEEE Explore). Vol 1, PP. 514-528. ISSN 2194-5357, ISSN 2194-5365 (electronic), ISBN 978-3-030-22867-5, ISBN 978-3-030-22868-2 (eBook). Advances in Intelligent Systems and Computing. .
  • Ghafarian A. Using Kali Linux Security Tools to Create Laboratory Projects for Cybersecurity Education. Proceedings of the Future Technology Conference. Held in Vancouver, BC Canada 13-14 November 2018. Vol 2, pp. 358-367. https://link.springer.com/search?facet-conf-event-id=ftc2018&facet-content-type=Chapter&query=ahmad+Ghafarian
  • Ghafarian A and Charlie Wood. “Forensics Data Recovery of Skype Communication from Physical Memory”. Proceedings of the Computing Conference. 10-12 July 2018. London UK. Pages 1095-1102. ISBN (IEEE XPLORE): 978-1-5386-1350-4. https://link.springer.com/search?facet-conf-event-id=sai2018&facet-content-type=Chapter&query=ahmad+ghafarian
  • Ghafarian A and Ethan Hills, “Forensics Analysis of Windows 10 Volume Shadow Copy Service”. Proceedings of the 9th International Multi-Conference on Complexity, Informatics and Cybernetics, (IMCIC 2018). pp. 47-52. Held in Orlando, FL on March 13-16, 2018.
  • Ghafarian A., “A Hybrid Method for Detection and Prevention of SQL Injection Attacks”. Proceedings of the Computing Conference. London, UK. July 18-20, 2017. Pp.833-846. ISBN (IEEE XPLORE): 978-1-5090-5443-5.
  • Ghafarian A., S. A. Hosseini Seno, and Maria Dehghani, “An Empirical Study of Security of VoIP System.” Proceedings of the SAI Computing Conference. July 13-15, 2016, London, UK. pp. 1031-1036. IEEE Catalog Number: CFP16SAA-USB.
  • Ghafarian, A. “Forensics Analysis of Privacy of Portable Web browser.” Proceedings of the 11th Annual ADFSL conference on Digital Forensics, Security and Law. , May 24-26, 2016, Daytona Beach, FL, USA. pp. 183-192.
  • Ghafarian A. Forensics Analysis of Cloud Storage Services. Proceedings of the Science and Information (SAI) Conference, July 28-30, 2015, London, UK, pp. 1335-1339. IEEE Catalog Number: CFP 15SAA-USB.
  • Ghafarian A, Investigating Forensics Values of Windows Jump List Data. Proceedings of the10th Annual ADFSL Conference, on Digital Forensics, Security and Law. May 19-21, 2015, Daytona Beach, Florida, USA, pp. 69-76.
  • Ghafarian A. and S.A. Hosseini Seno, “Exploring Digital Forensics Tools in Backtrack 5.0 r3”. Proceedings of the 2014 International Conference on Security and Management, July 20-25, 2014, Las Vegas, NV , Vol. 1, pp. 351-357.
  • Ghafarian A, “An Empirical Study of Network Forensics Analysis Tools.” Proceedings of the 9th International Conference on Cyber Warfare and Security, March 24-25, 2014, Purdue University, West Lafayette, Indiana, USA, pp. 366-370.
  • Ghafarian A. and Travis Smith, “Information Security Risk Assessment Analysis”. Proceedings of the 2011 International Conference on Security & Management (SAM’11), July 18-21, 2011, Las Vegas, NV, Vol I, pp. 121-125.
  • Ghafarian, A. and Jonathan Strahan, “Asset Identification and Valuation” Proceedings of the 2010. International Conference on Security & Management (SAM’10), July 12-15, 2010, Las Vegas, NV, Vol II, pp. 466-470.
  • Ghafarian A. and Jason Garruto, “An Analysis of Data Protection Strategies”. Proceedings of the 2009 International Conference on Security & Management (SAM’9), July 13-16, 2009, Las Vegas, NV, Vol I, pp. 37-41.
  • Ghafarian A., “Web Spoofing”. Proceedings of the 2008 International Conference on Security & Management (SAM’8), July 14--17, 2008, Las Vegas, NV, Vol I, pp. 313-317.
  • Dark, Melissa, A. Ghafarian and Jesse Yu, “Incorporating Ethical Issues into the Computer Science Curriculum using Case-Based Instruction and Rubric.” Proceedings of the 35th Symposium in Computer Science Education (SGCSE), Norfolk, March 3- 7, 2004, VA, USA.
  • Ghafarian A. and S. Ahmed, “Data mining and Privacy Issues.” proceedings of the International Conference on Information Technology Coding and Computing”, ITCC 2003 April 28-30, 2003.
  • Ghafarian A. and Willie Yip, “Application of PBL and APL Strategies in Teaching of Information Systems Courses in Two countries.” Proceedings of the 17th Annual International Academy for Information Management, (IAIM) conference, Dec. 13-15, 2002, Barcelona, Spain, pp. 268-276.
  • Dark Melissa and A. Ghafarian, “Information Ethics and Social Issues in the Undergraduate Computer Science Curriculum: A Curriculum Development and Implementation Report.” Proceedings of 6th National Colloquium for Information Systems Security Education Conference, June 3-6, 2002Seattle Washington.
  • Ghafarian A, and Willie Yip “Students Assessment in PBL Setting for Information Systems Courses.” Proceedings of the 16th Annual International Academy for Information Management, (IAIM) conference pp.173-181, Dec. 14-16, 2001, New Orleans, Louisiana.

Work Experience

Tenured Professor of Computer Science & Cybersecurity
University of North Georgia
1996-present

Assistant Professor of Computer Science
Tuskegee University
1994 - 1996

Assistant Professor of Computer Science
Ferdowsi University of Mashhad, College of Engineering
1992 - 1994

Associate Professor of Computer Science
Marycrest International University
1990 - 1992

Visiting Scholar
University of Chicago, Aragon National Lab
1989 - 1990

Assistant Professor
Shahid Bahonar University of Kerman, Department of Math and Computer Science
1982 - 1989