Ali Dehghantanha

According to our database1, Ali Dehghantanha
  • authored at least 41 papers between 2010 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Internet of Things security and forensics: Challenges and opportunities.
Future Generation Comp. Syst., 2018

2017
Investigating the antecedents to the adoption of SCRM technologies by start-up companies.
Telematics and Informatics, 2017

Forensics Analysis of Android Mobile VoIP Apps.
CoRR, 2017

Performance of Android Forensics Data Recovery Tools.
CoRR, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
CoRR, 2017

Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies.
CoRR, 2017

Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies.
CoRR, 2017

Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study.
CoRR, 2017

Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
CoRR, 2017

Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors.
CoRR, 2017

Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
CoRR, 2017

Exploit Kits: The production line of the Cybercrime Economy.
CoRR, 2017

Honeypots for employee information security awareness and education training: A conceptual EASY training model.
CoRR, 2017

An Android Cloud Storage Apps Forensic Taxonomy.
CoRR, 2017

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Computers & Electrical Engineering, 2017

Machine learning aided Android malware classification.
Computers & Electrical Engineering, 2017

2016
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wireless Comm. and Networking, 2016

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.
CoRR, 2016

A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016

A Formal Calculus for International Relations Computation and Evaluation.
CoRR, 2016

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

2015
Preface.
Int. J. Image Graphics, 2015

Exploit Kits: The production line of the Cybercrime economy?
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

Cloud Storage Forensic: hubiC as a Case-Study.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Ubuntu One investigation: Detecting evidences on client machines.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Privacy-respecting digital investigation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes.
Proceedings of the Computational Forensics, 2014

An approach for forensic investigation in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

Mobile forensic data acquisition in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

2013
Trends In Android Malware Detection.
JDFSL, 2013

2012
Finest authorizing member of common criteria certification.
Proceedings of the 2012 International Conference on Cyber Security, 2012

VoIP evidence model: A new forensic method for investigating VoIP malicious attacks.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Volatile memory acquisition using backup for forensic investigation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Towards secure model for SCADA systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Forensics investigation challenges in cloud computing environments.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Greening Digital Forensics: Opportunities and Challenges.
Proceedings of the Signal Processing and Information Technology, 2011

Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Towards data centric mobile security.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Investigation of bypassing malware defences and malware detections.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Utilizing Trusted Platform Module to Mitigate Botnet Attacks.
Int. J. Adv. Comp. Techn., 2010

Towards a Pervasive Formal Privacy Language.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010


  Loading...