Search Results - "Dehghantanha, Ali"

Refine Results
  1. 1

    Internet of Things security and forensics: Challenges and opportunities by Conti, Mauro, Dehghantanha, Ali, Franke, Katrin, Watson, Steve

    Published in Future generation computer systems (01-01-2018)
    “…The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution,…”
    Get full text
    Journal Article
  2. 2

    A survey on security and privacy of federated learning by Mothukuri, Viraaji, Parizi, Reza M., Pouriyeh, Seyedamin, Huang, Yan, Dehghantanha, Ali, Srivastava, Gautam

    Published in Future generation computer systems (01-02-2021)
    “…Federated learning (FL) is a new breed of Artificial Intelligence (AI) that builds upon decentralized data and training that brings learning to the edge or…”
    Get full text
    Journal Article
  3. 3

    A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting by HaddadPajouh, Hamed, Dehghantanha, Ali, Khayami, Raouf, Choo, Kim-Kwang Raymond

    Published in Future generation computer systems (01-08-2018)
    “…Internet of Things (IoT) devices are increasingly deployed in different industries and for different purposes (e.g. sensing/collecting of environmental data in…”
    Get full text
    Journal Article
  4. 4

    Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain by Yazdinejad, Abbas, Srivastava, Gautam, Parizi, Reza M., Dehghantanha, Ali, Choo, Kim-Kwang Raymond, Aledhari, Mohammed

    “…In any interconnected healthcare system (e.g., those that are part of a smart city), interactions between patients, medical doctors, nurses and other…”
    Get full text
    Journal Article
  5. 5

    Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities by Singh, Amritraj, Parizi, Reza M., Zhang, Qi, Choo, Kim-Kwang Raymond, Dehghantanha, Ali

    Published in Computers & security (01-01-2020)
    “…•Blockchain smart contracts formalization.•Vulnerability aspects of smart contracts targeted by formalization approaches.•Domain specific languages (DSL) for…”
    Get full text
    Journal Article
  6. 6

    A systematic literature review of blockchain cyber security by Taylor, Paul J., Dargahi, Tooska, Dehghantanha, Ali, Parizi, Reza M., Choo, Kim-Kwang Raymond

    Published in Digital communications and networks (01-05-2020)
    “…Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for…”
    Get full text
    Journal Article
  7. 7

    Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning by Azmoodeh, Amin, Dehghantanha, Ali, Choo, Kim-Kwang Raymond

    Published in IEEE transactions on sustainable computing (01-01-2019)
    “…Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-connected devices and nodes (e.g., medical devices and wearable…”
    Get full text
    Journal Article
  8. 8

    A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks by Pajouh, Hamed Haddad, Javidan, Reza, Khayami, Raouf, Dehghantanha, Ali, Choo, Kim-Kwang Raymond

    “…With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is…”
    Get full text
    Journal Article
  9. 9

    A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids by Karimipour, Hadis, Dehghantanha, Ali, Parizi, Reza M., Choo, Kim-Kwang Raymond, Leung, Henry

    Published in IEEE access (2019)
    “…Smart grid technology increases reliability, security, and efficiency of the electrical grids. However, its strong dependencies on digital communication…”
    Get full text
    Journal Article
  10. 10

    Security aspects of Internet of Things aided smart grids: A bibliometric survey by Sakhnini, Jacob, Karimipour, Hadis, Dehghantanha, Ali, Parizi, Reza M., Srivastava, Gautam

    Published in Internet of things (Amsterdam. Online) (01-06-2021)
    “…The integration of sensors and communication technology in power systems, known as the smart grid, is an emerging topic in science and technology. One of the…”
    Get full text
    Journal Article
  11. 11

    A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure by Walker-Roberts, Steven, Hammoudeh, Mohammad, Dehghantanha, Ali

    Published in IEEE access (01-01-2018)
    “…Insider attacks are becoming increasingly detrimental and frequent, affecting critical infrastructure at a massive scale. Recent attacks such as the U.K…”
    Get full text
    Journal Article
  12. 12

    Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis by Darabian, Hamid, Homayounoot, Sajad, Dehghantanha, Ali, Hashemi, Sattar, Karimipour, Hadis, Parizi, Reza M., Choo, Kim-Kwang Raymond

    Published in Journal of grid computing (01-06-2020)
    “…Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim’s CPU or GPU resources with…”
    Get full text
    Journal Article
  13. 13

    Threats on the horizon: understanding security threats in the era of cyber-physical systems by Walker-Roberts, Steven, Hammoudeh, Mohammad, Aldabbas, Omar, Aydin, Mehmet, Dehghantanha, Ali

    Published in The Journal of supercomputing (01-04-2020)
    “…Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made possible by higher integration of physical and digital…”
    Get full text
    Journal Article
  14. 14

    An ensemble deep learning model for cyber threat hunting in industrial internet of things by Yazdinejad, Abbas, Kazemi, Mostafa, Parizi, Reza M., Dehghantanha, Ali, Karimipour, Hadis

    Published in Digital communications and networks (01-02-2023)
    “…By the emergence of the fourth industrial revolution, interconnected devices and sensors generate large-scale, dynamic, and inharmonious data in Industrial…”
    Get full text
    Journal Article
  15. 15

    Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies by Yang, Teing Yee, Dehghantanha, Ali, Choo, Kim-Kwang Raymond, Muda, Zaiton

    Published in PloS one (16-03-2016)
    “…Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made…”
    Get full text
    Journal Article
  16. 16

    A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures by Yazdinejad, Abbas, Zolfaghari, Behrouz, Azmoodeh, Amin, Dehghantanha, Ali, Karimipour, Hadis, Fraser, Evan, Green, Arthur G., Russell, Conor, Duncan, Emily

    Published in Applied sciences (01-08-2021)
    “…In recent years, Smart Farming (SF) and Precision Agriculture (PA) have attracted attention from both the agriculture industry as well as the research…”
    Get full text
    Journal Article
  17. 17

    Accurate threat hunting in industrial internet of things edge devices by Yazdinejad, Abbas, Zolfaghari, Behrouz, Dehghantanha, Ali, Karimipour, Hadis, Srivastava, Gautam, Parizi, Reza M.

    Published in Digital communications and networks (01-10-2023)
    “…Industrial Internet of Things (IIoT) systems depend on a growing number of edge devices such as sensors, controllers, and robots for data collection,…”
    Get full text
    Journal Article
  18. 18

    A multiview learning method for malware threat hunting: windows, IoT and android as case studies by Darabian, Hamid, Dehghantanha, Ali, Hashemi, Sattar, Taheri, Mohammad, Azmoodeh, Amin, Homayoun, Sajad, Choo, Kim-Kwang Raymond, Parizi, Reza M.

    Published in World wide web (Bussum) (01-03-2020)
    “…Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as…”
    Get full text
    Journal Article
  19. 19

    An analysis of anti-forensic capabilities of B-tree file system (Btrfs) by Wani, Mohamad Ahtisham, Bhat, Wasim Ahmad, Dehghantanha, Ali

    Published in Australian journal of forensic sciences (03-07-2020)
    “…Anti-forensic techniques aim to prevent, hinder or corrupt the forensic process of evidence acquisition, its analysis, and/or its admissibility. File systems…”
    Get full text
    Journal Article
  20. 20

    An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System by Al-Abassi, Abdulrahman, Karimipour, Hadis, Dehghantanha, Ali, Parizi, Reza M.

    Published in IEEE access (2020)
    “…The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards…”
    Get full text
    Journal Article