Skip to Main Content Skip to Main Navigation Skip to Footer
UNG Logo
  • Info For...
    • Accepted Students
    • Current Students
    • Parents & Family
    • Faculty & Staff
    • Alumni
    • Business & Community
    • International Students
  • Quicklinks
    • Directories
    • myUNG
    • Academic Catalogs
    • Athletics
    • Banner
    • Bookstore
    • Calendars
    • Campuses & Maps
    • Continuing Education
    • D2L
    • Employment / HR
    • IT Service Desk
    • Libraries
    • UNG Foundation
  • Admissions
  • Corps of Cadets
  • Academics
  • Cost & Aid
  • Student Life
  • News & Events
  • Athletics
  • About Us

Find the most up-to-date information on the Presidential Search site.

Mike Cottrell College of Business
  • About
  • Academics
    Graduate
    The Cottrell MBA Master of Accountancy Cybersecurity Graduate Certificate Entrepreneurship & Innovation Graduate Certificate Technology Leadership Graduate Certificate
    Bachelor's
    Accounting (B.B.A.) Computer Science (B.S.) Cybersecurity (B.S.) Finance (B.B.A.) Information Systems (B.B.A.) Management (B.B.A.) Marketing (B.B.A.) Technology Management (B.A.S.)
    Associate
    Business Administration Pathway (A.A.) Computer Science Pathway (A.S.)
    Minors
    Business Administration Computer Science Cybersecurity Economics Entrepreneurship FinTech Information Assurance & Security Machine Learning Mobile App Development
  • Student Resources
    PROS Internships MCCB myUNG Resources Study Abroad
    Student Life at MCCB Cottrell Speaker Series Academic Advising
    Tutoring Services Supplemental Instructions Career Services
  • Centers/Institute
    TRUIST Center for Ethical Leadership
    Center for Entrepreneurship & Innovation
    Institute for Cyber Operations
  • Contact
    1. UNG
    2. Academics
    3. Mike Cottrell College of Business
    4. Faculty & Staff

    Ahmad Ghafarian, Ph.D

    Ahmad Ghafarian

    Professor - Computer Science

    Phone706-864-1498

    Office locationCottrell Center, 304, Dahlonega

    Area(s) of Expertise: Information Security, Computer Forensics

    Overview

    Dr. Ahmad Ghafarian serves as professor of computer science in the Mike Cottrell College of Business at the University of North Georgia and has served UNG's students for more than 20 years. Dr. Ghafarian believes in fostering a positive teacher-student relationship by caring for the students’ well-being and understanding their difficulties in acquiring knowledge. A good teacher should be committed to bringing out the best in every student with their passion for teaching and love for the students.

    Courses Taught

    Graduate Cybersecurity Courses

    Foundation of Information Security
    Cryptography & Data Protection
    Intrusion Detection Systems (IDS)
    Risk Management
    Advanced Network Security
    Advanced Software Security
    Cloud Computing Security
    Information Security Capstone

    Graduate Computer Science Courses

    Operating Systems
    Compiler Construction
    Software Engineering
    Analysis of Algorithms
    Theory of Computation
    Programming Languages
    Numerical Analysis
    Software Security

    Undergrad Cybersecurity courses

    Information Security Architecture
    Computer Security
    Cybersecurity & Cyberterrorism
    Computer Forensics
    Information Security
    Cybersecurity Capstone
    Network Security

    Undergrad Computer Science Courses

    Object-Oriented Programming
    C++, Java & Python Programming
    Data Structure
    Computer Organization
    Computer Ethics
    Computer Science Capstone
    Operating Systems

    Education

    • Ph.D, Computer Science, University of Glasgow, UK, 1982
    • M.S., Computer Science, University of Glasgow, UK, 1974
    • B.S., Mathematics, Ferdowsi University of Mashhad, Iran, 1970
    • Postdoctoral Studies, Information Security, University of Maryland University College (UMUC), 2007
    • Graduate Certificate, Information Security, Purdue University, Indiana, 2003

    Research/Special Interests

    • Computer Forensics
    • Malware detection and analysis
    • Cloud computing security
    • Security/privacy of online social media networking
    • SQL injection attack

    Publications

    • Ghafarian, A. and Deep Patel. “Application of Memory Forensics in the Assessment of Twitter Security and Privacy.” Submitted November 12, 2021, to the International Journal of Cyber Forensics and Advanced Threat Investigation.
    • Ghafarian, A., Ash Mady and kyung Park. “An Empirical Analysis of Email Forensics Tools”. International Journal of Network Security & Its Application (IJNSA). Vol 12, No. 3, pp. 39-57, May 2020. ISSN: 0974 – 9330 [online]: 0975 – 2307 [print].https://aircconline.com/ijnsa/V12N3/12320ijnsa03.pdf
    • Ghafarian, A, Ash Mady and Charlie Wood. “An empirical Study of Skype Data Retrieval from Main Memory”. International Journal of Computer Applications (0975 –8887). Vol 178, No. 29, pp. 4-12, July 18, 2019. DOI: 10.5120/ijca2019919115 https://www.ijcaonline.org/archives/volume178/number29/30717-2019919115
    • Ghafarian, A and Maria Dehghani, “An Empirical Study of Security of VoIP System”. International Journal of Computer Applications (0975 – 8887). Vol 181-No 10, pages 6-11, August 2018. https://www.ijcaonline.org/archives/volume181/number10/29806-2018916399%20ISBN%20:%20973-93-80899-07-2
    • Cannols, B and A. Ghafarian, “Hacking Experiment Using USB Rubber Ducky Scripting.” Journal of Systemics, Cybernetics and Informatics, 15(2), pp. 66-71, 2017. http://www.iiisci.org/journal/sci/SearchAuthor.asp?var=
    • Ghafarian A, and S. A. Hosseini Seno, “Forensics Evaluation of Privacy of Portable Web Browsers.” International Journal of Computer Applications, 132(16), pp. 27-34, 2016.
    • Ghafarian A., and S. A. Hosseini Seno, “Analysis of Privacy of Private Browsing Mode through Memory Forensics.” International Journal of Computer Application, 132(16), pp. 27-34, 2015.
    • Jahanbin A, A. Ghafarian, S.A. Hosseini Seno, and S. Nikokar, “A Computer Forensics Approach Based on Autonomous Intelligent Multi-Agent System.” International Journal of Database Theory and Applications, 6(5), pp. 1-12, 2013.
    • Ghafarian A., “Securing Voice over Interment Protocol (VoIP). International Journal of Information Assurance and Security (IAS), 2(3), pp. 200-204, September 2007.
    • Ghafarian A., “Integrating Ethical Issues Into the Undergraduate Computer Science Curriculum.” Journal of Computing Science in Colleges, 18(2), pp. 180-188, December 2002.
    • Ghafarian A., “Incorporating a Semester long Project into the CS 2 course.“ Journal of Computing Science in Colleges, 17(2), pp. 172-178, December 2001.
    • Ghafarian A., “Teaching Design Effectively in the Introductory Programming Courses.” Journal of Computing in Small Colleges, 16(2), pp. 201-208, January 2001.
    • Ghafarian A., “Lessons Learned in Teaching Object-Oriented Programming in CS1.” Journal of Computing in Small Colleges, 15(2), pp. 278-286, November 1999.
    • Ghafarian A., “Incorporating Software Testing In Programming Courses.“ Journal of Computing in Small Colleges, 14 (3), pp. 85-91, 1998.
    • Ghafarian A., “Electronic Administration and Grading of Programming Assignments, “Journal of Computing in Small Colleges, 13 (4), pp. 6 - 11, November, 1997.
    • Jameison M.J. and A. Ghafarian, “The Geometric Approximation as an Example of Aitken’s - ∂2 Transformation,” Molecular Physics, 32(6), pp. 1777-1780, 1976.
    • Jameison M.J. and A. Ghafarian, “The Geometric Approximation in Time Dependent Hartree-Fock Theory”, Molecular Physics, 30(5), pp. 1611-1614, 1975.
    • Ghafarian, A. and Deniz Keskin. “Using Memory Forensics to Investigate Security and Privacy of Facebook.” Proceedings of the 2022 Computing Conference, Springer Publication, (IEEE Explore) Vol 3, pp. 581-601. The conference was held in London, UK, July 14-15. (Attended Virtually). ISSN 2367-3370 ISSN 2367-3389 (electronic). Lecture Notes in Networks and Systems ISBN 978-3-031-10466-4 ISBN 978-3-031-10467-1 (eBook). https://doi.org/10.1007/978-3-031-10467-1
    • Ghafarian, A. Darius Fiallo. An Analysis of Twitter Security and Privacy using Memory Forensics. Proceedings of 2021 Computing Conference, Springer publication, (IEEE Explore) Vol 3, pp. 743-760. The conference was held in London, UK, on July 15-16, 2021. (Attended Virtually). ISSN 2367-3370 ISSN 2367-3389 (electronic). Lecture Notes in Networks and Systems. ISBN 978-3-030-80128-1 ISBN 978-3-030-80129-8 (eBook). https://doi.org/10.1007/978-3-030-80129-8
    • Ghafarian, A, Deniz Keskin, and Graham Helton. An Assessment of Obfuscated Ransomware Detection and Prevention Methods. Proceedings of the Future of the Information Communication Conference (FICC) 2021 Conference, pp Vancouver, Canada April 29-30, 2021. (IEEE Explore) Vol 1, pp 793-811.
    • Ghafarian, A. and Deniz Keskin. Windows 10 Hibernation File Forensics. Proceedings of the Computing Conference. 16-17 July 2020. London UK. (IEEE Explore) (IEEE Explore) Vol 3, PP. 431-445. ISSN 2194-5357, ISSN 2194-5365 (electronic), ISBN 978-3-030-52242-1, 978-3-030-52243-8 (eBook). Advances in Intelligent Systems and Computing. https://doi.org/10.1007/978-3-030-52243-8.
    • Ghafarian, A. and Saman Sardari. An Analysis of Connected Cars Technology and Security. Proceedings of the 15th International Conference on Cyber Warfare and Security. Old Dominion University, Norfolk, VA, March 12-13, 2020. pp 195-203.
    • Ghafarian, A. Capabilities of Email Forensics Tools. Proceedings of the Computing Conference. 16-17 July 2019. London UK. (IEEE Explore). Vol 1, PP. 514-528. ISSN 2194-5357, ISSN 2194-5365 (electronic), ISBN 978-3-030-22867-5, ISBN 978-3-030-22868-2 (eBook). Advances in Intelligent Systems and Computing. https://doi.org/10.1007/978-3-030-22868-2.
    • Ghafarian A. Using Kali Linux Security Tools to Create Laboratory Projects for Cybersecurity Education. Proceedings of the Future Technology Conference. Held in Vancouver, BC Canada 13-14 November 2018. Vol 2, pp. 358-367. https://link.springer.com/search?facet-conf-event-id=ftc2018&facet-content-type=Chapter&query=ahmad+Ghafarian
    • Ghafarian A and Charlie Wood. “Forensics Data Recovery of Skype Communication from Physical Memory”. Proceedings of the Computing Conference. 10-12 July 2018. London UK. Pages 1095-1102. ISBN (IEEE XPLORE): 978-1-5386-1350-4. https://link.springer.com/search?facet-conf-event-id=sai2018&facet-content-type=Chapter&query=ahmad+ghafarian
    • Ghafarian A and Ethan Hills, “Forensics Analysis of Windows 10 Volume Shadow Copy Service”. Proceedings of the 9th International Multi-Conference on Complexity, Informatics and Cybernetics, (IMCIC 2018). pp. 47-52. Held in Orlando, FL on March 13-16, 2018.
    • Ghafarian A., “A Hybrid Method for Detection and Prevention of SQL Injection Attacks”. Proceedings of the Computing Conference. London, UK. July 18-20, 2017. Pp.833-846. ISBN (IEEE XPLORE): 978-1-5090-5443-5.
    • Ghafarian A., S. A. Hosseini Seno, and Maria Dehghani, “An Empirical Study of Security of VoIP System.” Proceedings of the SAI Computing Conference. July 13-15, 2016, London, UK. pp. 1031-1036. IEEE Catalog Number: CFP16SAA-USB.
    • Ghafarian, A. “Forensics Analysis of Privacy of Portable Web browser.” Proceedings of the 11th Annual ADFSL conference on Digital Forensics, Security and Law. , May 24-26, 2016, Daytona Beach, FL, USA. pp. 183-192.
    • Ghafarian A. Forensics Analysis of Cloud Storage Services. Proceedings of the Science and Information (SAI) Conference, July 28-30, 2015, London, UK, pp. 1335-1339. IEEE Catalog Number: CFP 15SAA-USB.
    • Ghafarian A, Investigating Forensics Values of Windows Jump List Data. Proceedings of the10th Annual ADFSL Conference, on Digital Forensics, Security and Law. May 19-21, 2015, Daytona Beach, Florida, USA, pp. 69-76.
    • Ghafarian A. and S.A. Hosseini Seno, “Exploring Digital Forensics Tools in Backtrack 5.0 r3”. Proceedings of the 2014 International Conference on Security and Management, July 20-25, 2014, Las Vegas, NV , Vol. 1, pp. 351-357.
    • Ghafarian A, “An Empirical Study of Network Forensics Analysis Tools.” Proceedings of the 9th International Conference on Cyber Warfare and Security, March 24-25, 2014, Purdue University, West Lafayette, Indiana, USA, pp. 366-370.
    • Ghafarian A. and Travis Smith, “Information Security Risk Assessment Analysis”. Proceedings of the 2011 International Conference on Security & Management (SAM’11), July 18-21, 2011, Las Vegas, NV, Vol I, pp. 121-125.
    • Ghafarian, A. and Jonathan Strahan, “Asset Identification and Valuation” Proceedings of the 2010. International Conference on Security & Management (SAM’10), July 12-15, 2010, Las Vegas, NV, Vol II, pp. 466-470.
    • Ghafarian A. and Jason Garruto, “An Analysis of Data Protection Strategies”. Proceedings of the 2009 International Conference on Security & Management (SAM’9), July 13-16, 2009, Las Vegas, NV, Vol I, pp. 37-41.
    • Ghafarian A., “Web Spoofing”. Proceedings of the 2008 International Conference on Security & Management (SAM’8), July 14--17, 2008, Las Vegas, NV, Vol I, pp. 313-317.
    • Dark, Melissa, A. Ghafarian and Jesse Yu, “Incorporating Ethical Issues into the Computer Science Curriculum using Case-Based Instruction and Rubric.” Proceedings of the 35th Symposium in Computer Science Education (SGCSE), Norfolk, March 3- 7, 2004, VA, USA.
    • Ghafarian A. and S. Ahmed, “Data mining and Privacy Issues.” proceedings of the International Conference on Information Technology Coding and Computing”, ITCC 2003 April 28-30, 2003.
    • Ghafarian A. and Willie Yip, “Application of PBL and APL Strategies in Teaching of Information Systems Courses in Two countries.” Proceedings of the 17th Annual International Academy for Information Management, (IAIM) conference, Dec. 13-15, 2002, Barcelona, Spain, pp. 268-276.
    • Dark Melissa and A. Ghafarian, “Information Ethics and Social Issues in the Undergraduate Computer Science Curriculum: A Curriculum Development and Implementation Report.” Proceedings of 6th National Colloquium for Information Systems Security Education Conference, June 3-6, 2002Seattle Washington.
    • Ghafarian A, and Willie Yip “Students Assessment in PBL Setting for Information Systems Courses.” Proceedings of the 16th Annual International Academy for Information Management, (IAIM) conference pp.173-181, Dec. 14-16, 2001, New Orleans, Louisiana.

    Work Experience

    Tenured Professor of Computer Science & Cybersecurity
    University of North Georgia
    1996-present

    Assistant Professor of Computer Science
    Tuskegee University
    1994 - 1996

    Assistant Professor of Computer Science
    Ferdowsi University of Mashhad, College of Engineering
    1992 - 1994

    Associate Professor of Computer Science
    Marycrest International University
    1990 - 1992

    Visiting Scholar
    University of Chicago, Aragon National Lab
    1989 - 1990

    Assistant Professor
    Shahid Bahonar University of Kerman, Department of Math and Computer Science
    1982 - 1989

    Curriculum Vitae

    Ahmad Ghararian's Curriculum Vitae (PDF)

    UNG Logo
    • Contact Us
    • Request Information
    • Quick Facts
    • Campus Maps & Directions
    • Student Consumer Information
    • Campus Safety
    • Emergency Information
    • Employment/HR
    • UNG Policies & Procedures
    • UNG Alumni Association
    • UNG Foundation
    • Ethics & Compliance Hotline
    • Human Trafficking Notice
    • Equal Empl. Opportunity

    © 2023 The University System of Georgia and the University of North Georgia.

    UNG follows the section 508 Standards and WCAG 2.0 for web accessibility. If you require this content in another format, please send an email to the ADA Coordinator.

    Use of military-themed imagery does not constitute endorsement by the U.S. Department of Defense.

    • Accreditation
    • Accessibility
    • Privacy Policy
    Establishing Connection...
    AskNigel