Search Results - "Dargahi, Tooska"

Refine Results
  1. 1

    A systematic literature review of blockchain cyber security by Taylor, Paul J., Dargahi, Tooska, Dehghantanha, Ali, Parizi, Reza M., Choo, Kim-Kwang Raymond

    Published in Digital communications and networks (01-05-2020)
    “…Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for…”
    Get full text
    Journal Article
  2. 2

    On the Security and Privacy Challenges of Virtual Assistants by Bolton, Tom, Dargahi, Tooska, Belguith, Sana, Al-Rakhami, Mabrook S, Sodhro, Ali Hassan

    Published in Sensors (Basel, Switzerland) (26-03-2021)
    “…Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The…”
    Get full text
    Journal Article
  3. 3

    DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy by Adeboye, Olayinka, Dargahi, Tooska, Babaie, Meisam, Saraee, Mohamad, Yu, Chia-Mu

    Published in IEEE access (2022)
    “…Autonomous Vehicles (AVs) are equipped with several sensors which produce various forms of data, such as geo-location, distance, and camera data. The volume…”
    Get full text
    Journal Article
  4. 4

    Deriving Environmental Risk Profiles for Autonomous Vehicles from Simulated Trips by Anih, John, Kolekar, Sarvesh, Dargahi, Tooska, Babaie, Meisam, Saraee, Mohamad, Wetherell, Jack

    Published in IEEE access (01-01-2023)
    “…The commercial adoption of Autonomous Vehicles (AVs) and the positive impact they are expected to have on traffic safety depends on appropriate insurance…”
    Get full text
    Journal Article
  5. 5

    Blockchain-Based Privacy-Preserving Healthcare Architecture by Hossein, Koosha Mohammad, Esmaeili, Mohammad Esmaeil, Dargahi, Tooska, khonsari, Ahmad

    “…Since the introduction of Internet of Things (IoT), e-health has become one of the main research topics. Due to the sensitivity of patient data, preserving the…”
    Get full text
    Conference Proceeding
  6. 6

    PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications by Belguith, Sana, Kaaniche, Nesrine, Hammoudeh, Mohammad, Dargahi, Tooska

    Published in Future generation computer systems (01-10-2020)
    “…The ever-growing number of Internet connected devices poses several cybersecurity risks. Most of the exchanged data between the Internet of Things (IoT)…”
    Get full text
    Journal Article
  7. 7

    A Survey on the Security of Stateful SDN Data Planes by Dargahi, Tooska, Caponi, Alberto, Ambrosin, Moreno, Bianchi, Giuseppe, Conti, Mauro

    Published in IEEE Communications surveys and tutorials (01-01-2017)
    “…Software-defined networking (SDN) emerged as an attempt to introduce network innovations faster, and to radically simplify and automate the management of large…”
    Get full text
    Journal Article
  8. 8

    BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications by Mohammad Hossein, Koosha, Esmaeili, Mohammad Esmaeil, Dargahi, Tooska, Khonsari, Ahmad, Conti, Mauro

    Published in Computer communications (01-12-2021)
    “…The advancements in networking technologies have introduced the Internet of Everything (IoE) and smart living concepts. The main idea behind making everything…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Security challenges of Internet of Underwater Things: A systematic literature review by Yisa, Aliyu Gana, Dargahi, Tooska, Belguith, Sana, Hammoudeh, Mohammad

    “…Water covers approximately 71% of the earth surface, yet much of the underwater world remains unexplored due to technology limitations. Internet of Underwater…”
    Get full text
    Journal Article
  11. 11

    On the Feasibility of Attribute-Based Encryption on Internet of Things Devices by Ambrosin, Moreno, Anzanpour, Arman, Conti, Mauro, Dargahi, Tooska, Moosavi, Sanaz Rahimi, Rahmani, Amir M., Liljeberg, Pasi

    Published in IEEE MICRO (01-11-2016)
    “…The Internet of Things (IoT) is emerging with the pace of technology evolution, connecting people and things through the Internet. IoT devices enable…”
    Get full text
    Journal Article
  12. 12

    A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment by McKinnel, Dean Richard, Dargahi, Tooska, Dehghantanha, Ali, Choo, Kim-Kwang Raymond

    Published in Computers & electrical engineering (01-05-2019)
    “…•Artificial intelligence in penetration testing and vulnerability assessment.•Literature review of penetration testing and vulnerability…”
    Get full text
    Journal Article
  13. 13

    A Cyber-Kill-Chain based taxonomy of crypto-ransomware features by Dargahi, Tooska, Dehghantanha, Ali, Bahrami, Pooneh Nikkhah, Conti, Mauro, Bianchi, Giuseppe, Benedetto, Loris

    “…In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of…”
    Get full text
    Journal Article
  14. 14

    ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs by Dargahi, Tooska, Ambrosin, Moreno, Conti, Mauro, Asokan, N.

    Published in Computer communications (01-07-2016)
    “…The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs,…”
    Get full text
    Journal Article
  15. 15

    Intelligent conditional collaborative private data sharing by Bianchi, Giuseppe, Dargahi, Tooska, Caponi, Alberto, Conti, Mauro

    Published in Future generation computer systems (01-07-2019)
    “…With the advent of distributed systems, secure and privacy-preserving data sharing between different entities (individuals or organizations) becomes a…”
    Get full text
    Journal Article
  16. 16

    Securing Underwater Sensor Networks Against Routing Attacks by Dargahi, Tooska, Javadi, Hamid H. S., Shafiei, Hosein

    Published in Wireless personal communications (01-09-2017)
    “…With the advances in technology, there has been an increasing interest both from research and industrial communities in the use of Underwater Wireless Sensor…”
    Get full text
    Journal Article
  17. 17

    MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things by Po-Yen Lee, Chia-Mu Yu, Dargahi, Tooska, Conti, Mauro, Bianchi, Giuseppe

    “…Cloning is a very serious threat in the Internet of Things (IoT), owing to the simplicity for an attacker to gather configuration and authentication…”
    Get full text
    Journal Article
  18. 18

    Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence by Bianchi, Giuseppe, Conti, Mauro, Dargahi, Tooska, Dehghantanha, Ali

    Published in IEEE transactions on sustainable computing (01-04-2021)
    “…The papers in this special issue focus on sustainable cyber forensics and threat intelligence. Increasing societal reliance on interconnected digital systems,…”
    Get full text
    Journal Article
  19. 19

    Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study by Teing, Yee‐Yang, Dehghantanha, Ali, Choo, Kim‐Kwang Raymond, Dargahi, Tooska, Conti, Mauro

    Published in Journal of forensic sciences (01-05-2017)
    “…Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic…”
    Get full text
    Journal Article
  20. 20

    A hierarchical key pre‐distribution scheme for fog networks by Bahrami, Pooneh Nikkhah, Javadi, Hamid H.S., Dargahi, Tooska, Dehghantanha, Ali, Choo, Kim‐Kwang Raymond

    Published in Concurrency and computation (25-11-2019)
    “…Summary Security in fog computing is multi‐faceted, and one particular challenge is establishing a secure communication channel between fog nodes and end…”
    Get full text
    Journal Article