default search action
Ali Dehghantanha
Person information
- affiliation: University of Guelph, Ontario, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j88]Bardia Esmaeili, Amin Azmoodeh, Ali Dehghantanha, Gautam Srivastava, Hadis Karimipour, Jerry Chun-Wei Lin:
A GNN-Based Adversarial Internet of Things Malware Detection Framework for Critical Infrastructure: Studying Gafgyt, Mirai, and Tsunami Campaigns. IEEE Internet Things J. 11(16): 26826-26836 (2024) - [j87]Abbas Yazdinejad, Ali Dehghantanha, Gautam Srivastava, Hadis Karimipour, Reza M. Parizi:
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things. J. Syst. Archit. 148: 103088 (2024) - [j86]Abbas Yazdinejad, Ali Dehghantanha, Gautam Srivastava:
AP2FL: Auditable Privacy-Preserving Federated Learning Framework for Electronics in Healthcare. IEEE Trans. Consumer Electron. 70(1): 2527-2535 (2024) - [j85]Elnaz Rabieinejad, Abbas Yazdinejad, Ali Dehghantanha, Gautam Srivastava:
Two-Level Privacy-Preserving Framework: Federated Learning for Attack Detection in the Consumer Internet of Things. IEEE Trans. Consumer Electron. 70(1): 4258-4265 (2024) - [j84]Abbas Yazdinejad, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi:
A Robust Privacy-Preserving Federated Learning Model Against Model Poisoning Attacks. IEEE Trans. Inf. Forensics Secur. 19: 6693-6708 (2024) - [c49]Ali Dehghantanha, Abbas Yazdinejad, Reza M. Parizi:
Autonomous Cybersecurity: Evolving Challenges, Emerging Opportunities, and Future Research Trajectories. AutonomousCyber@CCS 2024: 1-10 - [c48]Hedyeh Nazari, Abbas Yazdinejad, Ali Dehghantanha, Fattane Zarrinkalam, Gautam Srivastava:
P3GNN: A Privacy-Preserving Provenance Graph-Based Model for Autonomous APT Detection in Software Defined Networking. AutonomousCyber@CCS 2024: 34-44 - [c47]Mohsen Sorkhpour, Abbas Yazdinejad, Ali Dehghantanha:
Auto-CIDS: An Autonomous Intrusion Detection System for Vehicular Networks. AutonomousCyber@CCS 2024: 45-55 - [c46]Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou:
AutonomousCyber '24 - Workshop on Autonomous Cybersecurity. CCS 2024: 4911-4913 - [e6]Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou:
Proceedings of the Workshop on Autonomous Cybersecurity, AutonomousCyber 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1229-6 [contents] - [i50]Hedyeh Nazari, Abbas Yazdinejad, Ali Dehghantanha, Fattane Zarrinkalam, Gautam Srivastava:
P3GNN: A Privacy-Preserving Provenance Graph-Based Model for APT Detection in Software Defined Networking. CoRR abs/2406.12003 (2024) - [i49]Florian Nelles, Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
A Federated Learning Approach for Multi-stage Threat Analysis in Advanced Persistent Threat Campaigns. CoRR abs/2406.13186 (2024) - 2023
- [j83]Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, Hadis Karimipour:
Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks. Comput. Ind. 144: 103801 (2023) - [j82]Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha:
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things. Comput. Commun. 198: 108-116 (2023) - [j81]Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour:
An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digit. Commun. Networks 9(1): 101-110 (2023) - [j80]Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi:
Accurate threat hunting in industrial internet of things edge devices. Digit. Commun. Networks 9(5): 1123-1130 (2023) - [j79]Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha:
Generative Adversarial Networks for Cyber Threat Hunting in Ethereum Blockchain. Distributed Ledger Technol. Res. Pract. 2(2): 1-19 (2023) - [j78]Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou:
An optimized fuzzy deep learning model for data classification based on NSGA-II. Neurocomputing 522: 116-128 (2023) - [j77]Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Abbas Yazdinejad, Thippa Reddy Gadekallu, Nancy Victor, Anik Islam:
A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems. IEEE Syst. J. 17(4): 5152-5160 (2023) - [i48]Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha:
Machine Learning in Digital Forensics: A Systematic Literature Review. CoRR abs/2306.04965 (2023) - [i47]Sofiya Makar, Ali Dehghantanha, Fattane Zarrinkalam, Gautam Srivastava, Abbas Yazdinejad:
Systemization of Knowledge (SoK)- Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives. CoRR abs/2309.05889 (2023) - [i46]Ehsan Nowroozi, Samaneh Ghelichkhani, Imran Haider, Ali Dehghantanha:
Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks. CoRR abs/2311.03373 (2023) - 2022
- [j76]Viraaji Mothukuri, Prachi Khare, Reza M. Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, Gautam Srivastava:
Federated-Learning-Based Anomaly Detection for IoT Security Attacks. IEEE Internet Things J. 9(4): 2545-2554 (2022) - [j75]Abbas Yazdinejad, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi:
An efficient packet parser architecture for software-defined 5G networks. Phys. Commun. 53: 101677 (2022) - [j74]Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, Kim-Kwang Raymond Choo:
FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems. IEEE Syst. J. 16(3): 3711-3722 (2022) - [j73]Kim-Kwang Raymond Choo, Sercan Ozcan, Ali Dehghantanha, Reza M. Parizi:
Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II. IEEE Trans. Engineering Management 69(3): 773-775 (2022) - [j72]Abdulrahman Al-Abassi, Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha, Pierluigi Siano, Henry Leung:
A Self-Tuning Cyber-Attacks' Location Identification Approach for Critical Infrastructures. IEEE Trans. Ind. Informatics 18(7): 5018-5027 (2022) - [j71]Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava:
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks. IEEE Trans. Ind. Informatics 18(11): 8356-8366 (2022) - [j70]Bardia Esmaeili, Amin Azmoodeh, Ali Dehghantanha, Hadis Karimipour, Behrouz Zolfaghari, Mohammad Hammoudeh:
IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection. IEEE Trans. Ind. Informatics 18(12): 8477-8486 (2022) - [c45]Mohammad Maghsoudimehrabani, Amin Azmoodeh, Ali Dehghantanha, Behrouz Zolfaghari, Gautam Srivastava:
Proactive Detection of Query-based Adversarial Scenarios in NLP Systems. AISec@CCS 2022: 103-113 - [c44]Glenn Dietrich, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics. HICSS 2022: 1-2 - [i45]Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell:
Communication Layer Security in Smart Farming: A Survey on Wireless Technologies. CoRR abs/2203.06013 (2022) - [i44]Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava:
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks. CoRR abs/2204.09829 (2022) - [i43]Behrouz Zolfaghari, Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha:
Crypto Makes AI Evolve. CoRR abs/2206.12669 (2022) - [i42]Behrouz Zolfaghari, Abbas Yazdinejad, Ali Dehghantanha:
The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective. CoRR abs/2207.01590 (2022) - [i41]Amin Azmoodeh, Ali Dehghantanha:
Deep Fake Detection, Deterrence and Response: Challenges and Opportunities. CoRR abs/2211.14667 (2022) - 2021
- [j69]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour:
Federated learning for drone authentication. Ad Hoc Networks 120: 102574 (2021) - [j68]Zahra Moti, Sattar Hashemi, Hadis Karimipour, Ali Dehghantanha, Amir Namavar Jahromi, Lida Abdi, Fatemeh Alavi:
Generative adversarial network to detect unseen Internet of Things malware. Ad Hoc Networks 122: 102591 (2021) - [j67]Kim-Kwang Raymond Choo, Ali Dehghantanha, Hadis Karimipour:
Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps). Comput. Electr. Eng. 92: 107145 (2021) - [j66]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Mohammad S. Khan:
A kangaroo-based intrusion detection system on software-defined networks. Comput. Networks 184: 107688 (2021) - [j65]Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A survey of machine learning techniques in adversarial image forensics. Comput. Secur. 100: 102092 (2021) - [j64]Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Yan Huang, Ali Dehghantanha, Gautam Srivastava:
A survey on security and privacy of federated learning. Future Gener. Comput. Syst. 115: 619-640 (2021) - [j63]Behrouz Zolfaghari, Vikrant Singh, Sushmitha Reddy, Brijesh Kumar Rai, Khodakhast Bibak, Ali Dehghantanha:
Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems. IEEE Commun. Lett. 25(5): 1477-1481 (2021) - [j62]Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
Security aspects of Internet of Things aided smart grids: A bibliometric survey. Internet Things 14: 100111 (2021) - [j61]Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Mohammed Aledhari, Hadis Karimipour:
A survey on internet of things security: Requirements, challenges, and solutions. Internet Things 14: 100129 (2021) - [j60]Hamed HaddadPajouh, Alireza Mohtadi, Ali Dehghantanha, Hadis Karimipour, Xiaodong Lin, Kim-Kwang Raymond Choo:
A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer. IEEE Internet Things J. 8(6): 4540-4547 (2021) - [j59]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Mohammed Aledhari:
Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security. IEEE Internet Things J. 8(8): 6406-6415 (2021) - [j58]Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems. IEEE Internet Things J. 8(17): 13712-13722 (2021) - [j57]Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi:
Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach. Phys. Commun. 47: 101394 (2021) - [j56]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 1120-1132 (2021) - [j55]Kim-Kwang Raymond Choo, Uttam Ghosh, Deepak K. Tosh, Reza M. Parizi, Ali Dehghantanha:
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems. ACM Trans. Internet Techn. 21(2): 38e:1-38e:3 (2021) - [j54]Rafael Salema Marques, Gregory Epiphaniou, Haider M. Al-Khateeb, Carsten Maple, Mohammad Hammoudeh, Paulo André Lima de Castro, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks. ACM Trans. Internet Techn. 21(4): 103:1-103:30 (2021) - [j53]Giuseppe Bianchi, Mauro Conti, Tooska Dargahi, Ali Dehghantanha:
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence. IEEE Trans. Sustain. Comput. 6(2): 182-183 (2021) - [c43]Elnaz Rabieinejad, Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
Secure AI and Blockchain-enabled Framework in Smart Vehicular Networks. GLOBECOM (Workshops) 2021: 1-6 - [c42]Abbas Yazdinejad, Elnaz Rabieinejad, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
A Machine Learning-based SDN Controller Framework for Drone Management. GLOBECOM (Workshops) 2021: 1-6 - [c41]Ali Dehghantanha, Glenn Dietrich, Kim-Kwang Raymond Choo:
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics. HICSS 2021: 1-3 - [c40]Qi Zhang, Ali Dehghantanha, Katrin Franke, Reza M. Parizi:
Introduction to the Minitrack on Decentralized Federated Learning: Applications, Solutions, and Challenges. HICSS 2021: 1-3 - [c39]Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha:
Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems. PST 2021: 1-6 - [c38]Sanaz Nakhodchi, Behrouz Zolfaghari, Abbas Yazdinejad, Ali Dehghantanha:
SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning. PST 2021: 1-8 - [i40]Ali Dehghantanha, Hadis Karimipour, Amin Azmoodeh:
Cybersecurity in Smart Farming: Canada Market Research. CoRR abs/2104.05183 (2021) - 2020
- [j52]Abdulrahman Al-Abassi, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi:
An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System. IEEE Access 8: 83965-83973 (2020) - [j51]Hamed Haddad Pajouh, Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi:
MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution. IEEE Access 8: 139188-139198 (2020) - [j50]Abbas Yazdinejad, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, Mu-Yen Chen:
Cryptocurrency malware hunting: A deep Recurrent Neural Network approach. Appl. Soft Comput. 96: 106630 (2020) - [j49]Seyed Mehdi Hazrati Fard, Hadis Karimipour, Ali Dehghantanha, Amir Namavar Jahromi, Gautam Srivastava:
Ensemble sparse representation-based cyber threat hunting for security of smart cities. Comput. Electr. Eng. 88: 106825 (2020) - [j48]Amritraj Singh, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. Comput. Secur. 88 (2020) - [j47]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. Comput. Secur. 88 (2020) - [j46]Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Hadis Karimipour, David Ellis Newton, Reza M. Parizi:
An improved two-hidden-layer extreme learning machine for malware hunting. Comput. Secur. 89 (2020) - [j45]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Sajad Homayoun, Kim-Kwang Raymond Choo:
An opcode-based technique for polymorphic Internet of Things malware detection. Concurr. Comput. Pract. Exp. 32(6) (2020) - [j44]Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A systematic literature review of blockchain cyber security. Digit. Commun. Networks 6(2): 147-156 (2020) - [j43]Hamid Darabian, Sajad Homayoun, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M. Parizi, Kim-Kwang Raymond Choo:
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. J. Grid Comput. 18(2): 293-303 (2020) - [j42]Mahdis Saharkhizan, Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi:
An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic. IEEE Internet Things J. 7(9): 8852-8859 (2020) - [j41]Amritraj Singh, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Sidechain technologies in blockchain networks: An examination and state-of-the-art review. J. Netw. Comput. Appl. 149 (2020) - [j40]Abbas Yazdinejad, Reza M. Parizi, Ali Bohlooli, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A high-performance framework for a network programmable packet processor using P4 and FPGA. J. Netw. Comput. Appl. 156: 102564 (2020) - [j39]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Gautam Srivastava, Senthilkumar Mohan, Abedallah M. Rababah:
Cost optimization of secure routing with untrusted devices in software defined networking. J. Parallel Distributed Comput. 143: 36-46 (2020) - [j38]Hamed HaddadPajouh, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi:
AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things. Neural Comput. Appl. 32(20): 16119-16133 (2020) - [j37]Mohammad Hadi Alaeiyan, Ali Dehghantanha, Tooska Dargahi, Mauro Conti, Saeed Parsa:
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks. ACM Trans. Cyber Phys. Syst. 4(3): 31:1-31:22 (2020) - [j36]Kim-Kwang Raymond Choo, Sercan Ozcan, Ali Dehghantanha, Reza M. Parizi:
Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges. IEEE Trans. Engineering Management 67(4): 982-987 (2020) - [j35]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. IEEE Trans. Emerg. Top. Comput. 8(2): 341-351 (2020) - [j34]Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 630-640 (2020) - [j33]Abbas Yazdinejad, Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammed Aledhari:
Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain. IEEE J. Biomed. Health Informatics 24(8): 2146-2156 (2020) - [j32]Steven Walker-Roberts, Mohammad Hammoudeh, Omer Aldabbas, Mehmet Aydin, Ali Dehghantanha:
Threats on the horizon: understanding security threats in the era of cyber-physical systems. J. Supercomput. 76(4): 2643-2664 (2020) - [j31]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Qi Zhang, Kim-Kwang Raymond Choo:
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security. IEEE Trans. Serv. Comput. 13(4): 625-638 (2020) - [j30]Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri, Amin Azmoodeh, Sajad Homayoun, Kim-Kwang Raymond Choo, Reza M. Parizi:
A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web 23(2): 1241-1260 (2020) - [c37]Mohammed Aledhari, Rehma Razzak, Reza M. Parizi, Ali Dehghantanha:
A Deep Recurrent Neural Network to Support Guidelines and Decision Making of Social Distancing. IEEE BigData 2020: 4233-4240 - [c36]Yoseph Hailemariam, Abbas Yazdinejad, Reza M. Parizi, Gautam Srivastava, Ali Dehghantanha:
An Empirical Evaluation of AI Deep Explainable Tools. GLOBECOM (Workshops) 2020: 1-6 - [c35]Abbas Yazdinejad, Reza M. Parizi, Gautam Srivastava, Ali Dehghantanha:
Making Sense of Blockchain for AI Deepfakes Technology. GLOBECOM (Workshops) 2020: 1-6 - [c34]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics. HICSS 2020: 1-2 - [c33]Abbas Yazdinejad, Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour, Somayeh Razaghi Karizno:
SLPoW: Secure and Low Latency Proof of Work Protocol for Blockchain in Green IoT Networks. VTC Spring 2020: 1-5 - [p48]Amin Azmoodeh, Ali Dehghantanha:
Big Data and Privacy: Challenges and Opportunities. Handbook of Big Data Privacy 2020: 1-5 - [p47]Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi:
AI and Security of Critical Infrastructure. Handbook of Big Data Privacy 2020: 7-36 - [p46]Abdulrahman Al-Abassi, Hadis Karimipour, Hamed Haddad Pajouh, Ali Dehghantanha, Reza M. Parizi:
Industrial Big Data Analytics: Challenges and Opportunities. Handbook of Big Data Privacy 2020: 37-61 - [p45]William Peters, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection. Handbook of Big Data Privacy 2020: 109-120 - [p44]Suby Singh, Hadis Karimipour, Hamed HaddadPajouh, Ali Dehghantanha:
Artificial Intelligence and Security of Industrial Control Systems. Handbook of Big Data Privacy 2020: 121-164 - [p43]Hossein Mohammadi Rouzbahani, Hadis Karimipour, Abolfazl Rahimnejad, Ali Dehghantanha, Gautam Srivastava:
Anomaly Detection in Cyber-Physical Systems Using Machine Learning. Handbook of Big Data Privacy 2020: 219-235 - [p42]Jesus Castillo Cabello, Hadis Karimipour, Amir Namavar Jahromi, Ali Dehghantanha, Reza M. Parizi:
Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities. Handbook of Big Data Privacy 2020: 255-283 - [p41]Sanaz Nakhodchi, Ali Dehghantanha, Hadis Karimipour:
Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis. Handbook of Big Data Privacy 2020: 305-318 - [p40]Mahdi Amrollahi, Ali Dehghantanha, Reza M. Parizi:
A Survey on Application of Big Data in Fin Tech Banking Security and Privacy. Handbook of Big Data Privacy 2020: 319-342 - [p39]Mahdis Saharkhizan, Amin Azmoodeh, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection. Handbook of Big Data Privacy 2020: 343-357 - [p38]Mohammad Nassiri, Hamed HaddadPajouh, Ali Dehghantanha, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava:
Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach. Handbook of Big Data Privacy 2020: 359-370 - [p37]Mohammad Mehdi BehradFar, Hamed HaddadPajouh, Ali Dehghantanha, Amin Azmoodeh, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava:
RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features. Handbook of Big Data Privacy 2020: 371-383 - [p36]Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi, Sattar Hashemi, Bahram Gharabaghi, Gautam Srivastava:
Active Spectral Botnet Detection Based on Eigenvalue Weighting. Handbook of Big Data Privacy 2020: 385-397 - [p35]Reza M. Parizi, Ali Dehghantanha, Amin Azmoodeh, Kim-Kwang Raymond Choo:
Blockchain in Cybersecurity Realm: An Overview. Blockchain Cybersecurity, Trust and Privacy 2020: 1-5 - [p34]Kevin Tiba, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, Hadis Karimipour, Kim-Kwang Raymond Choo:
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning. Blockchain Cybersecurity, Trust and Privacy 2020: 99-128 - [p33]Hossein Mohammadi Rouzbahani, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi:
Blockchain Applications in Power Systems: A Bibliometric Analysis. Blockchain Cybersecurity, Trust and Privacy 2020: 129-145 - [p32]Ala Ekramifard, Haleh Amintoosi, Amin Hosseini Seno, Ali Dehghantanha, Reza M. Parizi:
A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence. Blockchain Cybersecurity, Trust and Privacy 2020: 147-160 - [p31]Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha:
The Future of Blockchain Technology in Healthcare Internet of Things Security. Blockchain Cybersecurity, Trust and Privacy 2020: 161-184 - [p30]Amritraj Singh, Reza M. Parizi, Meng Han, Ali Dehghantanha, Hadis Karimipour, Kim-Kwang Raymond Choo:
Public Blockchains Scalability: An Examination of Sharding and Segregated Witness. Blockchain Cybersecurity, Trust and Privacy 2020: 203-232 - [p29]Kelly Click, Amritraj Singh, Reza M. Parizi, Gautam Srivastava, Ali Dehghantanha:
Immutable and Secure IP Address Protection Using Blockchain. Blockchain Cybersecurity, Trust and Privacy 2020: 233-246 - [e5]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Handbook of Big Data Privacy. Springer 2020, ISBN 978-3-030-38556-9 [contents] - [e4]Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh:
Cyber Security Intelligence and Analytics, CSIA 2019, Shenyang, China, 21-22 February 2019. Advances in Intelligent Systems and Computing 928, Springer 2020, ISBN 978-3-030-15234-5 [contents] - [e3]Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi:
Blockchain Cybersecurity, Trust and Privacy. Advances in Information Security 79, Springer 2020, ISBN 978-3-030-38180-6 [contents] - [i39]Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
Security Aspects of Internet of Things aided Smart Grids: a Bibliometric Survey. CoRR abs/2005.00915 (2020) - [i38]Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Survey of Machine Learning Techniques in Adversarial Image Forensics. CoRR abs/2010.09680 (2020)
2010 – 2019
- 2019
- [j29]Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo, Henry Leung:
A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids. IEEE Access 7: 80778-80788 (2019) - [j28]Marcus Walshe, Gregory Epiphaniou, Haider M. Al-Khateeb, Mohammad Hammoudeh, Vasilios Katos, Ali Dehghantanha:
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks 95 (2019) - [j27]Dean Richard McKinnel, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Comput. Electr. Eng. 75: 175-188 (2019) - [j26]Pooneh Nikkhah Bahrami, Hamid H. S. Javadi, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A hierarchical key pre-distribution scheme for fog networks. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j25]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami, Kim-Kwang Raymond Choo, David Ellis Newton:
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer. Future Gener. Comput. Syst. 90: 94-104 (2019) - [j24]Raúl Vera, Amina F. Shehu, Tooska Dargahi, Ali Dehghantanha:
Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies. Int. J. Multim. Intell. Secur. 3(3): 221-243 (2019) - [j23]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi:
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures. J. Inf. Process. Syst. 15(4): 865-889 (2019) - [j22]Ensieh Modiri Dovom, Amin Azmoodeh, Ali Dehghantanha, David Ellis Newton, Reza M. Parizi, Hadis Karimipour:
Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit. 97: 1-7 (2019) - [j21]Kim-Kwang Raymond Choo, Mauro Conti, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1. IEEE Trans. Big Data 5(3): 279-281 (2019) - [j20]Kim-Kwang Raymond Choo, Mauro Conti, Ali Dehghantanha:
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2. IEEE Trans. Big Data 5(4): 423-424 (2019) - [j19]Hamed Haddad Pajouh, Reza Javidan, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 7(2): 314-323 (2019) - [j18]Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning. IEEE Trans. Sustain. Comput. 4(1): 88-95 (2019) - [j17]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah:
Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study. IEEE Trans. Sustain. Comput. 4(2): 204-216 (2019) - [j16]Tooska Dargahi, Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti, Giuseppe Bianchi, Loris Benedetto:
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features. J. Comput. Virol. Hacking Tech. 15(4): 277-305 (2019) - [c32]Amir Namavar Jahromi, Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha:
A deep unsupervised representation learning approach for effective cyber-physical attack detection and identification on highly imbalanced data. CASCON 2019: 14-23 - [c31]Sajad Homayoun, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores. CCECE 2019: 1-4 - [c30]Hadis Karimipour, Sandra Geris, Ali Dehghantanha, Henry Leung:
Intelligent Anomaly Detection for Large-scale Smart Grids. CCECE 2019: 1-4 - [c29]Reza M. Parizi, Sajad Homayoun, Abbas Yazdinejad, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains. CCECE 2019: 1-4 - [c28]Abbas Yazdinejad, Reza M. Parizi, Gautam Srivastava, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain. GLOBECOM Workshops 2019: 1-6 - [c27]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Cyber Threat Intelligence and Analytics. HICSS 2019: 1-2 - [c26]Mohammed Aledhari, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications. ICII 2019: 233-240 - [c25]Gautam Srivastava, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Data Sharing and Privacy for Patient IoT Devices Using Blockchain. iSCI 2019: 334-348 - [p28]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi, Lizhe Wang, Fatos Xhafa, Wei Ren:
A layered security architecture based on cyber kill chain against advanced persistent threats. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 135-155 - [p27]Amin Azmoodeh, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities. Handbook of Big Data and IoT Security 2019: 1-4 - [p26]Samuel Grooby, Tooska Dargahi, Ali Dehghantanha:
A Bibliometric Analysis of Authentication and Access Control in IoT Devices. Handbook of Big Data and IoT Security 2019: 25-51 - [p25]Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou:
Private Cloud Storage Forensics: Seafile as a Case Study. Handbook of Big Data and IoT Security 2019: 73-127 - [p24]Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou, Mohammad Hammoudeh:
Distributed Filesystem Forensics: Ceph as a Case Study. Handbook of Big Data and IoT Security 2019: 129-151 - [p23]Paul J. Taylor, Henry Mwiki, Ali Dehghantanha, Alex Akinbi, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Reza M. Parizi:
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study. Handbook of Big Data and IoT Security 2019: 153-177 - [p22]Mohammed Asim, Dean Richard McKinnel, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou:
Big Data Forensics: Hadoop Distributed File Systems as a Case Study. Handbook of Big Data and IoT Security 2019: 179-210 - [p21]Kimia Bolouri, Amin Azmoodeh, Ali Dehghantanha, Mohammad Firouzmand:
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform. Handbook of Big Data and IoT Security 2019: 211-223 - [p20]Samuel Grooby, Tooska Dargahi, Ali Dehghantanha:
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats. Handbook of Big Data and IoT Security 2019: 225-255 - [p19]Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha:
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study. Handbook of Big Data and IoT Security 2019: 257-272 - [p18]Reyhaneh HosseiniNejad, Hamed Haddad Pajouh, Ali Dehghantanha, Reza M. Parizi:
A Cyber Kill Chain Based Analysis of Remote Access Trojans. Handbook of Big Data and IoT Security 2019: 273-299 - [p17]Omar M. K. Alhawi, Alex Akinbi, Ali Dehghantanha:
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications. Handbook of Big Data and IoT Security 2019: 301-327 - [p16]Lim Sze Thiam, Tooska Dargahi, Ali Dehghantanha:
Bibliometric Analysis on the Rise of Cloud Security. Handbook of Big Data and IoT Security 2019: 329-344 - [p15]Shehu Amina, Raúl Vera, Tooska Dargahi, Ali Dehghantanha:
A Bibliometric Analysis of Botnet Detection Techniques. Handbook of Big Data and IoT Security 2019: 345-365 - [p14]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Gregory Epiphaniou:
Security in Online Games: Current Implementations and Challenges. Handbook of Big Data and IoT Security 2019: 367-384 - [e2]Ali Dehghantanha, Kim-Kwang Raymond Choo:
Handbook of Big Data and IoT Security. Springer 2019, ISBN 978-3-030-10542-6 [contents] - [i37]Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Blockchain-enabled Authentication Handover with Efficient Privacy Protection in SDN-based 5G Networks. CoRR abs/1905.03193 (2019) - [i36]Sajad Homayoun, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores. CoRR abs/1906.04951 (2019) - [i35]Reza M. Parizi, Sajad Homayoun, Abbas Yazdinejad, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains. CoRR abs/1906.04953 (2019) - [i34]Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha:
Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection. CoRR abs/1907.03313 (2019) - [i33]Hossein Mohammadi Rouzbahani, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi:
Blockchain Applications in Power Systems: A Bibliometric Analysis. CoRR abs/1912.02611 (2019) - 2018
- [j15]Steven Walker-Roberts, Mohammad Hammoudeh, Ali Dehghantanha:
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure. IEEE Access 6: 25167-25177 (2018) - [j14]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo:
CloudMe forensics: A case of big data forensic investigation. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j13]Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson:
Internet of Things security and forensics: Challenges and opportunities. Future Gener. Comput. Syst. 78: 544-546 (2018) - [j12]Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener. Comput. Syst. 85: 88-96 (2018) - [j11]Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider M. Al-Khateeb, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks. IEEE Internet Things J. 5(4): 2496-2505 (2018) - [j10]Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Kim-Kwang Raymond Choo:
Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient Intell. Humaniz. Comput. 9(4): 1141-1152 (2018) - [j9]Dennis Kiwia, Ali Dehghantanha, Kim-Kwang Raymond Choo, Jim Slaughter:
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. J. Comput. Sci. 27: 394-409 (2018) - [j8]Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
Intelligent OS X malware threat detection with code inspection. J. Comput. Virol. Hacking Tech. 14(3): 213-223 (2018) - [c24]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Amritraj Singh:
Empirical vulnerability analysis of automated smart contracts security testing on blockchains. CASCON 2018: 103-113 - [c23]Reza M. Parizi, Liang Guo, Yao Bian, Ali Dehghantanha, Kim-Kwang Raymond Choo:
CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction. CHASE 2018: 106-111 - [c22]Reza M. Parizi, Ali Dehghantanha:
On the Understanding of Gamification in Blockchain Systems. FiCloud Workshops 2018: 214-219 - [c21]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Introduction to the Minitrack on Cyber Threat Intelligence and Analytics. HICSS 2018: 1-3 - [c20]Reza M. Parizi, Amritraj, Ali Dehghantanha:
Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security. ICBC 2018: 75-91 - [c19]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Towards Better Ocular Recognition for Secure Real-World Applications. TrustCom/BigDataSE 2018: 277-282 - [i32]Ben Blakeley, Chris Cooney, Ali Dehghantanha, Rob Aspin:
Cloud Storage Forensic: hubiC as a Case-Study. CoRR abs/1807.10214 (2018) - [i31]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo:
CloudMe Forensics: A Case of Big-Data Investigation. CoRR abs/1807.10218 (2018) - [i30]Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou:
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies. CoRR abs/1807.10435 (2018) - [i29]James Baldwin, Omar M. K. Alhawi, Simone Shaughnessy, Alex Akinbi, Ali Dehghantanha:
Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies. CoRR abs/1807.10436 (2018) - [i28]Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson:
Internet of Things Security and Forensics: Challenges and Opportunities. CoRR abs/1807.10438 (2018) - [i27]Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha:
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection. CoRR abs/1807.10440 (2018) - [i26]James Baldwin, Ali Dehghantanha:
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware. CoRR abs/1807.10442 (2018) - [i25]Opeyemi A. Osanaiye, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, Mqhele E. Dlodlo:
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing. CoRR abs/1807.10443 (2018) - [i24]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study. CoRR abs/1807.10445 (2018) - [i23]Dennis Kiwia, Ali Dehghantanha, Kim-Kwang Raymond Choo, Jim Slaughter:
A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence. CoRR abs/1807.10446 (2018) - [i22]Mohammad Shariati, Ali Dehghantanha, Ben Martini, Kim-Kwang Raymond Choo:
Ubuntu One Investigation: Detecting Evidences on Client Machines. CoRR abs/1807.10448 (2018) - [i21]Hamish Haughey, Gregory Epiphaniou, Haider M. Al-Khateeb, Ali Dehghantanha:
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence. CoRR abs/1808.01155 (2018) - [i20]Mauro Conti, Ali Dehghantanha, Tooska Dargahi:
Cyber Threat Intelligence : Challenges and Opportunities. CoRR abs/1808.01162 (2018) - [i19]Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke:
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial. CoRR abs/1808.01201 (2018) - [i18]Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider M. Al-Khateeb, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks. CoRR abs/1808.01202 (2018) - [i17]Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami:
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence. CoRR abs/1808.01957 (2018) - [i16]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Amritraj Singh:
Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains. CoRR abs/1809.02702 (2018) - 2017
- [j7]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Laurence T. Yang:
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study. Comput. Electr. Eng. 58: 350-363 (2017) - [j6]Nikola Milosevic, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Machine learning aided Android malware classification. Comput. Electr. Eng. 61: 266-274 (2017) - [j5]Tahereh Hasani, Jamil Bojei, Ali Dehghantanha:
Investigating the antecedents to the adoption of SCRM technologies by start-up companies. Telematics Informatics 34(5): 655-675 (2017) - [p13]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Contemporary Digital Forensics Investigations of Cloud and Mobile Applications. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 1-6 - [p12]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Forensics Analysis of Android Mobile VoIP Apps. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 7-20 - [p11]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda:
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 21-39 - [p10]Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod:
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 41-62 - [p9]Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod:
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 63-78 - [p8]Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou:
Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 79-89 - [p7]Bernard Chukwuemeka Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Performance of Android Forensics Data Recovery Tools. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 91-110 - [p6]Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 111-129 - [p5]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 185-204 - [p4]Seyed Hossein Mohtasebi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 205-246 - [p3]Ali Dehghantanha, Tooska Dargahi:
Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 247-283 - [p2]M. Amine Chelihi, Akintunde Elutilo, Imran Ahmed, Christos Papadopoulos, Ali Dehghantanha:
An Android Cloud Storage Apps Forensic Taxonomy. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 285-305 - [e1]Kim-Kwang Raymond Choo, Ali Dehghantanha:
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier 2017, ISBN 978-0-12-805303-4 [contents] - [i15]Seyed Hossein Mohtasebi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud. CoRR abs/1706.08042 (2017) - [i14]Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha:
Honeypots for employee information security awareness and education training: A conceptual EASY training model. CoRR abs/1706.08043 (2017) - [i13]M. Amine Chelihi, Akintunde Elutilo, Imran Ahmed, Christos Papadopoulos, Ali Dehghantanha:
An Android Cloud Storage Apps Forensic Taxonomy. CoRR abs/1706.08045 (2017) - [i12]Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou:
Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors. CoRR abs/1706.08048 (2017) - [i11]Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod:
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies. CoRR abs/1706.08056 (2017) - [i10]Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod:
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies. CoRR abs/1706.08062 (2017) - [i9]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda:
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine. CoRR abs/1706.08879 (2017) - [i8]Michael Hopkins, Ali Dehghantanha:
Exploit Kits: The production line of the Cybercrime Economy. CoRR abs/1707.04714 (2017) - [i7]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda:
Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study. CoRR abs/1707.04715 (2017) - [i6]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study. CoRR abs/1709.04417 (2017) - [i5]Bernard Chukwuemeka Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
Performance of Android Forensics Data Recovery Tools. CoRR abs/1709.05144 (2017) - [i4]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Forensics Analysis of Android Mobile VoIP Apps. CoRR abs/1709.05296 (2017) - 2016
- [j4]Opeyemi A. Osanaiye, Haibin Cai, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, Mqhele E. Dlodlo:
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J. Wirel. Commun. Netw. 2016: 130 (2016) - [c18]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah, Wee-Chiat Chai:
A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts. SpaCCS Workshops 2016: 342-357 - [i3]Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda:
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies. CoRR abs/1603.05369 (2016) - [i2]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Ali Dehghan Tanha:
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation. CoRR abs/1604.00980 (2016) - [i1]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Audun Jøsang, Ali Dehghan Tanha:
A Formal Calculus for International Relations Computation and Evaluation. CoRR abs/1606.02239 (2016) - 2015
- [j3]Jacek Stando, Ali Dehghan Tanha, Waralak V. Siricharoen, Yoshiro Imai:
Preface. Int. J. Image Graph. 15(2): 1502001:1 (2015) - [c17]Ben Blakeley, Chris Cooney, Ali Dehghantanha, Rob Aspin:
Cloud Storage Forensic: hubiC as a Case-Study. CloudCom 2015: 536-541 - [c16]Michael Hopkins, Ali Dehghantanha:
Exploit Kits: The production line of the Cybercrime economy? InfoSec 2015: 23-27 - [p1]Mohammad Shariati, Ali Dehghantanha, Ben Martini, Kim-Kwang Raymond Choo:
Ubuntu One investigation: Detecting evidences on client machines. The Cloud Security Ecosystem 2015: 429-446 - 2014
- [c15]Mohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah:
An approach for forensic investigation in Firefox OS. CyberSec 2014: 22-26 - [c14]Mohd Najwadi Yusoff, Ramlan Mahmod, Mohd Taufik Abdullah, Ali Dehghantanha:
Mobile forensic data acquisition in Firefox OS. CyberSec 2014: 27-31 - [c13]Javad Talebi, Ali Dehghantanha, Ramlan Mahmoud:
Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes. IWCF 2014: 145-162 - [c12]Ali Dehghantanha, Katrin Franke:
Privacy-respecting digital investigation. PST 2014: 129-138 - 2013
- [j2]Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod:
Trends In Android Malware Detection. J. Digit. Forensics Secur. Law 8(3): 21-40 (2013) - 2012
- [c11]Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin:
Towards secure model for SCADA systems. CyberSec 2012: 60-64 - [c10]Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha:
Finest authorizing member of common criteria certification. CyberSec 2012: 155-160 - [c9]Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin:
Volatile memory acquisition using backup for forensic investigation. CyberSec 2012: 186-189 - [c8]Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, Solahuddin bin Shamsuddin:
Forensics investigation challenges in cloud computing environments. CyberSec 2012: 190-194 - [c7]Mohammed Ibrahim, Mohd Taufik Abdullah, Ali Dehghantanha:
VoIP evidence model: A new forensic method for investigating VoIP malicious attacks. CyberSec 2012: 201-206 - 2011
- [c6]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Towards data centric mobile security. IAS 2011: 62-67 - [c5]Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir:
Investigation of bypassing malware defences and malware detections. IAS 2011: 173-178 - [c4]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems. CISIS 2011: 272-284 - [c3]Seyed Hossein Mohtasebi, Ali Dehghantanha:
A Mitigation Approach to the Privacy and Malware Threats of Social Network Services. ICDIPC (2) 2011: 448-459 - [c2]Yap TzeTzuen, Ali Dehghantanha, Andy Seddon, Seyed Hossein Mohtasebi:
Greening Digital Forensics: Opportunities and Challenges. SPIT/IPC 2011: 114-119 - 2010
- [j1]Muththolib Sidheeq, Ali Dehghantanha, Geetha Kananparan:
Utilizing Trusted Platform Module to Mitigate Botnet Attacks. Int. J. Adv. Comp. Techn. 2(5): 111-117 (2010) - [c1]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Towards a Pervasive Formal Privacy Language. AINA Workshops 2010: 1085-1091
Coauthor Index
aka: Ramlan Mahmoud
aka: Hamed HaddadPajouh
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint