Search Results - "Dargahi, Tooska"
-
1
A systematic literature review of blockchain cyber security
Published in Digital communications and networks (01-05-2020)“…Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for…”
Get full text
Journal Article -
2
On the Security and Privacy Challenges of Virtual Assistants
Published in Sensors (Basel, Switzerland) (26-03-2021)“…Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The…”
Get full text
Journal Article -
3
DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy
Published in IEEE access (2022)“…Autonomous Vehicles (AVs) are equipped with several sensors which produce various forms of data, such as geo-location, distance, and camera data. The volume…”
Get full text
Journal Article -
4
Deriving Environmental Risk Profiles for Autonomous Vehicles from Simulated Trips
Published in IEEE access (01-01-2023)“…The commercial adoption of Autonomous Vehicles (AVs) and the positive impact they are expected to have on traffic safety depends on appropriate insurance…”
Get full text
Journal Article -
5
Blockchain-Based Privacy-Preserving Healthcare Architecture
Published in 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE) (05-05-2019)“…Since the introduction of Internet of Things (IoT), e-health has become one of the main research topics. Due to the sensitivity of patient data, preserving the…”
Get full text
Conference Proceeding -
6
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications
Published in Future generation computer systems (01-10-2020)“…The ever-growing number of Internet connected devices poses several cybersecurity risks. Most of the exchanged data between the Internet of Things (IoT)…”
Get full text
Journal Article -
7
A Survey on the Security of Stateful SDN Data Planes
Published in IEEE Communications surveys and tutorials (01-01-2017)“…Software-defined networking (SDN) emerged as an attempt to introduce network innovations faster, and to radically simplify and automate the management of large…”
Get full text
Journal Article -
8
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications
Published in Computer communications (01-12-2021)“…The advancements in networking technologies have introduced the Internet of Everything (IoE) and smart living concepts. The main idea behind making everything…”
Get full text
Journal Article -
9
Graph-powered learning for social networks
Published in Neurocomputing (Amsterdam) (28-08-2022)Get full text
Journal Article -
10
Security challenges of Internet of Underwater Things: A systematic literature review
Published in Transactions on emerging telecommunications technologies (01-03-2021)“…Water covers approximately 71% of the earth surface, yet much of the underwater world remains unexplored due to technology limitations. Internet of Underwater…”
Get full text
Journal Article -
11
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices
Published in IEEE MICRO (01-11-2016)“…The Internet of Things (IoT) is emerging with the pace of technology evolution, connecting people and things through the Internet. IoT devices enable…”
Get full text
Journal Article -
12
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment
Published in Computers & electrical engineering (01-05-2019)“…•Artificial intelligence in penetration testing and vulnerability assessment.•Literature review of penetration testing and vulnerability…”
Get full text
Journal Article -
13
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
Published in Journal of Computer Virology and Hacking Techniques (01-12-2019)“…In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of…”
Get full text
Journal Article -
14
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs
Published in Computer communications (01-07-2016)“…The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs,…”
Get full text
Journal Article -
15
Intelligent conditional collaborative private data sharing
Published in Future generation computer systems (01-07-2019)“…With the advent of distributed systems, secure and privacy-preserving data sharing between different entities (individuals or organizations) becomes a…”
Get full text
Journal Article -
16
Securing Underwater Sensor Networks Against Routing Attacks
Published in Wireless personal communications (01-09-2017)“…With the advances in technology, there has been an increasing interest both from research and industrial communities in the use of Underwater Wireless Sensor…”
Get full text
Journal Article -
17
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things
Published in IEEE transactions on information forensics and security (01-08-2018)“…Cloning is a very serious threat in the Internet of Things (IoT), owing to the simplicity for an attacker to gather configuration and authentication…”
Get full text
Journal Article -
18
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence
Published in IEEE transactions on sustainable computing (01-04-2021)“…The papers in this special issue focus on sustainable cyber forensics and threat intelligence. Increasing societal reliance on interconnected digital systems,…”
Get full text
Journal Article -
19
Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study
Published in Journal of forensic sciences (01-05-2017)“…Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic…”
Get full text
Journal Article -
20
A hierarchical key pre‐distribution scheme for fog networks
Published in Concurrency and computation (25-11-2019)“…Summary Security in fog computing is multi‐faceted, and one particular challenge is establishing a secure communication channel between fog nodes and end…”
Get full text
Journal Article