Hamid Jahankhani

According to our database1, Hamid Jahankhani authored at least 47 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data.
Comput. Electr. Eng., 2021

2020
Internet of things devices: digital forensic process and data reduction.
Int. J. Electron. Secur. Digit. Forensics, 2020

2019
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

AI: The Cyber-Physical Project Manager and their Digital Twin.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Blockchain as an Efficient and Alternative Mechanism for Strengthening and Securing the Privacy of Healthcare Patient and Clinical Research Data.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

The Role of Blockchain in Supporting Critical National Infrastructure.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

"Privacy by Design" Governance Framework to Achieve Privacy Assurance of Personal Health Information (PHI) Processed by IoT-based Telemedicine Devices and Applications Within Healthcare Services.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Ethical Considerations of People with Autistic Spectrum Disorder.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

An Examination into the Level of Training, Education and Awareness Among Officers in Tackling Cybercrime within the Metropolitan Police Service.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Blockchain as a Tool for Financial Transparency in Development Aid.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

A Study on Keyword Analytics as a Precursor to Machine Learning to Evaluate Radicalisation on Social Media.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Data Mining Metrics to Identify and Evaluate Potential Radicalisation Through Social Media.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Ransomware Threat and its Impact on SCADA.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Preparing 11- 17 Years Old Girls to Become Cyber Security Experts in the Future.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2015
Cloud Forensics Challenges Faced by Forensic Investigators.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Risk and Privacy Issues of Digital Oil Fields in the Cloud.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Security and Feasibility of Power Line Communication System.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Responsive Cyber-Physical Risk Management (RECYPHR) - A Systems Framework.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Challenges of Cloud Forensics.
Proceedings of the Enterprise Security - Second International Workshop, 2015

2014
Vulnerability considerations for power line communication's supervisory control and data acquisition.
Int. J. Electron. Secur. Digit. Forensics, 2014

2013
Analyzing Human Factors for an Effective Information Security Management System.
Int. J. Secur. Softw. Eng., 2013

2012
Analysis of firewall log-based detection scenarios for evidence in digital forensics.
Int. J. Electron. Secur. Digit. Forensics, 2012

A Probabilistic Knowledge-Based Information System for Environmental Policy Modeling and Decision Making.
Proceedings of the Artificial Intelligence Applications and Innovations, 2012

2011
Cybernetic approaches to robotics.
Paladyn J. Behav. Robotics, 2011

A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment.
Int. J. Inf. Secur. Priv., 2011

Financial Assessment of London Plan Policy 4A.2 by Probabilistic Inference and Influence Diagrams.
Proceedings of the Artificial Intelligence Applications and Innovations, 2011

Sufficiency of Windows Event Log as Evidence in Digital Forensics.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

GSi Compliant RAS for Public Private Sector Partnership.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

Visualizing Variability Models Using Hyperbolic Trees.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

2010
Cyberwar and the Russian Federation: the usual suspect.
Int. J. Electron. Secur. Digit. Forensics, 2010

A Review on Sustainability Models.
Proceedings of the Global Security, Safety, and Sustainability, 2010

Cybercrime Victimisations/Criminalisation and Punishment.
Proceedings of the Global Security, Safety, and Sustainability, 2010

2009
Criminal investigation and forensic tools for smartphones.
Int. J. Electron. Secur. Digit. Forensics, 2009

2008
Management versus security specialists: an empirical study on security related perceptions.
Inf. Manag. Comput. Secur., 2008

Memory-Based Antiforensic Tools and Techniques.
Int. J. Inf. Secur. Priv., 2008

Cultivating trust - an electronic-government development model for addressing the needs of developing countries.
Int. J. Electron. Secur. Digit. Forensics, 2008

2007
Information Systems Security: Cases of Network Administrator Threats.
Int. J. Inf. Secur. Priv., 2007

Evaluation of cyber legislations: trading in the global cyber village.
Int. J. Electron. Secur. Digit. Forensics, 2007

2005
Adaptation of the Balanced Scorecard Model to the IT Functions.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

2004
Underlying Platform of the E-Commerce System: J2EE vs. NET.
Proceedings of the ICEIS 2004, 2004

2002
Distributed Online Doctor Surgery.
Proceedings of the ICEIS 2002, 2002

E-Commerce Business Practices in the EU.
Proceedings of the ICEIS 2002, 2002

A Review of Web Tools Categories.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002

Web Accessibility: Impact of the Recent Law on E-Learning Provisions for the Visually Impaired.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002

The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EU.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002


  Loading...