Search Results - "Dehghantanha, Ali"
-
1
Internet of Things security and forensics: Challenges and opportunities
Published in Future generation computer systems (01-01-2018)“…The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution,…”
Get full text
Journal Article -
2
A survey on security and privacy of federated learning
Published in Future generation computer systems (01-02-2021)“…Federated learning (FL) is a new breed of Artificial Intelligence (AI) that builds upon decentralized data and training that brings learning to the edge or…”
Get full text
Journal Article -
3
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
Published in Future generation computer systems (01-08-2018)“…Internet of Things (IoT) devices are increasingly deployed in different industries and for different purposes (e.g. sensing/collecting of environmental data in…”
Get full text
Journal Article -
4
Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain
Published in IEEE journal of biomedical and health informatics (01-08-2020)“…In any interconnected healthcare system (e.g., those that are part of a smart city), interactions between patients, medical doctors, nurses and other…”
Get full text
Journal Article -
5
Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities
Published in Computers & security (01-01-2020)“…•Blockchain smart contracts formalization.•Vulnerability aspects of smart contracts targeted by formalization approaches.•Domain specific languages (DSL) for…”
Get full text
Journal Article -
6
A systematic literature review of blockchain cyber security
Published in Digital communications and networks (01-05-2020)“…Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for…”
Get full text
Journal Article -
7
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
Published in IEEE transactions on sustainable computing (01-01-2019)“…Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-connected devices and nodes (e.g., medical devices and wearable…”
Get full text
Journal Article -
8
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
Published in IEEE transactions on emerging topics in computing (01-04-2019)“…With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is…”
Get full text
Journal Article -
9
A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids
Published in IEEE access (2019)“…Smart grid technology increases reliability, security, and efficiency of the electrical grids. However, its strong dependencies on digital communication…”
Get full text
Journal Article -
10
Security aspects of Internet of Things aided smart grids: A bibliometric survey
Published in Internet of things (Amsterdam. Online) (01-06-2021)“…The integration of sensors and communication technology in power systems, known as the smart grid, is an emerging topic in science and technology. One of the…”
Get full text
Journal Article -
11
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure
Published in IEEE access (01-01-2018)“…Insider attacks are becoming increasingly detrimental and frequent, affecting critical infrastructure at a massive scale. Recent attacks such as the U.K…”
Get full text
Journal Article -
12
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
Published in Journal of grid computing (01-06-2020)“…Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim’s CPU or GPU resources with…”
Get full text
Journal Article -
13
Threats on the horizon: understanding security threats in the era of cyber-physical systems
Published in The Journal of supercomputing (01-04-2020)“…Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made possible by higher integration of physical and digital…”
Get full text
Journal Article -
14
An ensemble deep learning model for cyber threat hunting in industrial internet of things
Published in Digital communications and networks (01-02-2023)“…By the emergence of the fourth industrial revolution, interconnected devices and sensors generate large-scale, dynamic, and inharmonious data in Industrial…”
Get full text
Journal Article -
15
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies
Published in PloS one (16-03-2016)“…Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made…”
Get full text
Journal Article -
16
A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures
Published in Applied sciences (01-08-2021)“…In recent years, Smart Farming (SF) and Precision Agriculture (PA) have attracted attention from both the agriculture industry as well as the research…”
Get full text
Journal Article -
17
Accurate threat hunting in industrial internet of things edge devices
Published in Digital communications and networks (01-10-2023)“…Industrial Internet of Things (IIoT) systems depend on a growing number of edge devices such as sensors, controllers, and robots for data collection,…”
Get full text
Journal Article -
18
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
Published in World wide web (Bussum) (01-03-2020)“…Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as…”
Get full text
Journal Article -
19
An analysis of anti-forensic capabilities of B-tree file system (Btrfs)
Published in Australian journal of forensic sciences (03-07-2020)“…Anti-forensic techniques aim to prevent, hinder or corrupt the forensic process of evidence acquisition, its analysis, and/or its admissibility. File systems…”
Get full text
Journal Article -
20
An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System
Published in IEEE access (2020)“…The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards…”
Get full text
Journal Article