Ali Dehghantanha

According to our database1, Ali Dehghantanha authored at least 67 papers between 2010 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Intelligent OS X malware threat detection with code inspection.
J. Computer Virology and Hacking Techniques, 2018

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.
J. Comput. Science, 2018

Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intelligence and Humanized Computing, 2018

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet of Things Journal, 2018

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Generation Comp. Syst., 2018

Internet of Things security and forensics: Challenges and opportunities.
Future Generation Comp. Syst., 2018

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence.
CoRR, 2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial.
CoRR, 2018

Cyber Threat Intelligence : Challenges and Opportunities.
CoRR, 2018

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence.
CoRR, 2018

Ubuntu One Investigation: Detecting Evidences on Client Machines.
CoRR, 2018

A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence.
CoRR, 2018

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.
CoRR, 2018

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing.
CoRR, 2018

Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware.
CoRR, 2018

Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection.
CoRR, 2018

Internet of Things Security and Forensics: Challenges and Opportunities.
CoRR, 2018

Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies.
CoRR, 2018

A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies.
CoRR, 2018

CloudMe Forensics: A Case of Big-Data Investigation.
CoRR, 2018

Cloud Storage Forensic: hubiC as a Case-Study.
CoRR, 2018

CloudMe forensics: A case of big data forensic investigation.
Concurrency and Computation: Practice and Experience, 2018

A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure.
IEEE Access, 2018

Towards Better Ocular Recognition for Secure Real-World Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security.
Proceedings of the Blockchain - ICBC 2018, 2018

Introduction to the Minitrack on Cyber Threat Intelligence and Analytics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
Investigating the antecedents to the adoption of SCRM technologies by start-up companies.
Telematics and Informatics, 2017

Forensics Analysis of Android Mobile VoIP Apps.
CoRR, 2017

Performance of Android Forensics Data Recovery Tools.
CoRR, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
CoRR, 2017

Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies.
CoRR, 2017

Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies.
CoRR, 2017

Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study.
CoRR, 2017

Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
CoRR, 2017

Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors.
CoRR, 2017

Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
CoRR, 2017

Exploit Kits: The production line of the Cybercrime Economy.
CoRR, 2017

Honeypots for employee information security awareness and education training: A conceptual EASY training model.
CoRR, 2017

An Android Cloud Storage Apps Forensic Taxonomy.
CoRR, 2017

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Computers & Electrical Engineering, 2017

Machine learning aided Android malware classification.
Computers & Electrical Engineering, 2017

2016
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wireless Comm. and Networking, 2016

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.
CoRR, 2016

A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016

A Formal Calculus for International Relations Computation and Evaluation.
CoRR, 2016

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

2015
Preface.
Int. J. Image Graphics, 2015

Exploit Kits: The production line of the Cybercrime economy?
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

Cloud Storage Forensic: hubiC as a Case-Study.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Ubuntu One investigation: Detecting evidences on client machines.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Privacy-respecting digital investigation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes.
Proceedings of the Computational Forensics, 2014

An approach for forensic investigation in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

Mobile forensic data acquisition in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

2013
Trends In Android Malware Detection.
JDFSL, 2013

2012
Finest authorizing member of common criteria certification.
Proceedings of the 2012 International Conference on Cyber Security, 2012

VoIP evidence model: A new forensic method for investigating VoIP malicious attacks.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Volatile memory acquisition using backup for forensic investigation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Towards secure model for SCADA systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Forensics investigation challenges in cloud computing environments.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Greening Digital Forensics: Opportunities and Challenges.
Proceedings of the Signal Processing and Information Technology, 2011

Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Towards data centric mobile security.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Investigation of bypassing malware defences and malware detections.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Utilizing Trusted Platform Module to Mitigate Botnet Attacks.
Int. J. Adv. Comp. Techn., 2010

Towards a Pervasive Formal Privacy Language.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010


  Loading...