Ali Dehghantanha

According to our database1, Ali Dehghantanha authored at least 37 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer.
Future Generation Comp. Syst., 2019

2018
Intelligent OS X malware threat detection with code inspection.
J. Computer Virology and Hacking Techniques, 2018

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.
J. Comput. Science, 2018

Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intelligence and Humanized Computing, 2018

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet of Things Journal, 2018

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Generation Comp. Syst., 2018

Internet of Things security and forensics: Challenges and opportunities.
Future Generation Comp. Syst., 2018

CloudMe forensics: A case of big data forensic investigation.
Concurrency and Computation: Practice and Experience, 2018

A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure.
IEEE Access, 2018

Towards Better Ocular Recognition for Secure Real-World Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security.
Proceedings of the Blockchain - ICBC 2018, 2018

Introduction to the Minitrack on Cyber Threat Intelligence and Analytics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
Investigating the antecedents to the adoption of SCRM technologies by start-up companies.
Telematics and Informatics, 2017

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Computers & Electrical Engineering, 2017

Machine learning aided Android malware classification.
Computers & Electrical Engineering, 2017

2016
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wireless Comm. and Networking, 2016

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

2015
Preface.
Int. J. Image Graphics, 2015

Exploit Kits: The production line of the Cybercrime economy?
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

Cloud Storage Forensic: hubiC as a Case-Study.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Ubuntu One investigation: Detecting evidences on client machines.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Privacy-respecting digital investigation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes.
Proceedings of the Computational Forensics, 2014

An approach for forensic investigation in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

Mobile forensic data acquisition in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

2013
Trends In Android Malware Detection.
JDFSL, 2013

2012
Finest authorizing member of common criteria certification.
Proceedings of the 2012 International Conference on Cyber Security, 2012

VoIP evidence model: A new forensic method for investigating VoIP malicious attacks.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Volatile memory acquisition using backup for forensic investigation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Towards secure model for SCADA systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Forensics investigation challenges in cloud computing environments.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Greening Digital Forensics: Opportunities and Challenges.
Proceedings of the Signal Processing and Information Technology, 2011

Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Towards data centric mobile security.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Investigation of bypassing malware defences and malware detections.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Utilizing Trusted Platform Module to Mitigate Botnet Attacks.
Int. J. Adv. Comp. Techn., 2010

Towards a Pervasive Formal Privacy Language.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010


  Loading...