Tooska Dargahi

Orcid: 0000-0002-0908-6483

According to our database1, Tooska Dargahi authored at least 50 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors.
ACM Trans. Priv. Secur., August, 2023

Deriving Environmental Risk Profiles for Autonomous Vehicles From Simulated Trips.
IEEE Access, 2023

Poster: Continuous Authentication in Highly Connected 6G-enabled Transportation Systems.
Proceedings of the IEEE Vehicular Networking Conference, 2023

Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

LIFT the AV: Location InFerence aTtack on Autonomous Vehicle Camera Data.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge.
ACM J. Data Inf. Qual., 2022

Graph-powered learning for social networks.
Neurocomputing, 2022

DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy.
IEEE Access, 2022

2021
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence.
IEEE Trans. Sustain. Comput., 2021

On the Security and Privacy Challenges of Virtual Assistants.
Sensors, 2021

Security challenges of Internet of Underwater Things: A systematic literature review.
Trans. Emerg. Telecommun. Technol., 2021

BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications.
Comput. Commun., 2021

Big Data Processing at the Edge with Data Skew Aware Resource Allocation.
Proceedings of the 2021 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2021

2020
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
ACM Trans. Cyber Phys. Syst., 2020

PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications.
Future Gener. Comput. Syst., 2020

A systematic literature review of blockchain cyber security.
Digit. Commun. Networks, 2020

Vulnerability Assessment Of Vehicle To Infrastructure Communication: A Case Study Of Unmanned Ground Vehicle.
Proceedings of the IEEE Globecom Workshops, 2020

Privacy Enhanced Interface Identifiers in IPv6.
Proceedings of the 12th International Symposium on Communication Systems, 2020

2019
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features.
J. Comput. Virol. Hacking Tech., 2019

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019

Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies.
Int. J. Multim. Intell. Secur., 2019

Intelligent conditional collaborative private data sharing.
Future Gener. Comput. Syst., 2019

A hierarchical key pre-distribution scheme for fog networks.
Concurr. Comput. Pract. Exp., 2019

A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.
Comput. Electr. Eng., 2019

IoT Database Forensics: An Investigation on HarperDB Security.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Blockchain-Based Privacy-Preserving Healthcare Architecture.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

Bibliometric Analysis on the Rise of Cloud Security.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A Bibliometric Analysis of Authentication and Access Control in IoT Devices.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A Bibliometric Analysis of Botnet Detection Techniques.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2018

Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2018

Cyber Threat Intelligence : Challenges and Opportunities.
CoRR, 2018

2017
Securing Underwater Sensor Networks Against Routing Attacks.
Wirel. Pers. Commun., 2017

Forensics Analysis of Android Mobile VoIP Apps.
CoRR, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
CoRR, 2017

A Survey on the Security of Stateful SDN Data Planes.
IEEE Commun. Surv. Tutorials, 2017

On the feasibility of attribute-based encryption for WLAN access control.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

Complete edge function onloading for effective backend-driven cyber foraging.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Forensics Analysis of Android Mobile VoIP Apps.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices.
IEEE Micro, 2016

ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs.
Comput. Commun., 2016

WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures.
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2016

FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks.
Secur. Commun. Networks, 2015

On the Feasibility of Attribute-Based Encryption on Smartphone Devices.
Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015


  Loading...