Hamed Haddad Pajouh

Orcid: 0000-0002-5952-1228

According to our database1, Hamed Haddad Pajouh authored at least 16 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
VQR: vulnerability analysis in quadratic residues-based authentication protocols.
J. Ambient Intell. Humaniz. Comput., 2023

2021
A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer.
IEEE Internet Things J., 2021

A survey on internet of things security: Requirements, challenges, and solutions.
Internet Things, 2021

2020
AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things.
Neural Comput. Appl., 2020

Cryptocurrency malware hunting: A deep Recurrent Neural Network approach.
Appl. Soft Comput., 2020

MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution.
IEEE Access, 2020

Artificial Intelligence and Security of Industrial Control Systems.
Proceedings of the Handbook of Big Data Privacy., 2020

A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection.
Proceedings of the Handbook of Big Data Privacy., 2020

Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach.
Proceedings of the Handbook of Big Data Privacy., 2020

RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features.
Proceedings of the Handbook of Big Data Privacy., 2020

Industrial Big Data Analytics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data Privacy., 2020

2019
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.
IEEE Trans. Emerg. Top. Comput., 2019

A Cyber Kill Chain Based Analysis of Remote Access Trojans.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
Intelligent OS X malware threat detection with code inspection.
J. Comput. Virol. Hacking Tech., 2018

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Gener. Comput. Syst., 2018

2017
Two-tier network anomaly detection model: a machine learning approach.
J. Intell. Inf. Syst., 2017


  Loading...