Ali Dehghantanha
Orcid: 0000-0002-9294-7554Affiliations:
- University of Guelph, Ontario, Canada
According to our database1,
Ali Dehghantanha
authored at least 220 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
AP2FL: Auditable Privacy-Preserving Federated Learning Framework for Electronics in Healthcare.
IEEE Trans. Consumer Electron., February, 2024
Two-Level Privacy-Preserving Framework: Federated Learning for Attack Detection in the Consumer Internet of Things.
IEEE Trans. Consumer Electron., February, 2024
A Robust Privacy-Preserving Federated Learning Model Against Model Poisoning Attacks.
IEEE Trans. Inf. Forensics Secur., 2024
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things.
J. Syst. Archit., 2024
A GNN-Based Adversarial Internet of Things Malware Detection Framework for Critical Infrastructure: Studying Gafgyt, Mirai, and Tsunami Campaigns.
IEEE Internet Things J., 2024
A Federated Learning Approach for Multi-stage Threat Analysis in Advanced Persistent Threat Campaigns.
CoRR, 2024
P3GNN: A Privacy-Preserving Provenance Graph-Based Model for APT Detection in Software Defined Networking.
CoRR, 2024
Proceedings of the Workshop on Autonomous Cybersecurity, 2024
P3GNN: A Privacy-Preserving Provenance Graph-Based Model for Autonomous APT Detection in Software Defined Networking.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024
Autonomous Cybersecurity: Evolving Challenges, Emerging Opportunities, and Future Research Trajectories.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024
2023
A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems.
IEEE Syst. J., December, 2023
Digit. Commun. Networks, October, 2023
Distributed Ledger Technol. Res. Pract., June, 2023
An ensemble deep learning model for cyber threat hunting in industrial internet of things.
Digit. Commun. Networks, February, 2023
Neurocomputing, 2023
Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks.
CoRR, 2023
Systemization of Knowledge (SoK)- Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives.
CoRR, 2023
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things.
Comput. Commun., 2023
Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks.
Comput. Ind., 2023
2022
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks.
IEEE Trans. Ind. Informatics, 2022
IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection.
IEEE Trans. Ind. Informatics, 2022
A Self-Tuning Cyber-Attacks' Location Identification Approach for Critical Infrastructures.
IEEE Trans. Ind. Informatics, 2022
Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II.
IEEE Trans. Engineering Management, 2022
FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems.
IEEE Syst. J., 2022
Phys. Commun., 2022
IEEE Internet Things J., 2022
CoRR, 2022
CoRR, 2022
CoRR, 2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
2021
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence.
IEEE Trans. Sustain. Comput., 2021
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems.
ACM Trans. Internet Techn., 2021
Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks.
IEEE Trans. Netw. Sci. Eng., 2021
Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach.
Phys. Commun., 2021
Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security.
IEEE Internet Things J., 2021
Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems.
IEEE Internet Things J., 2021
A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer.
IEEE Internet Things J., 2021
Internet Things, 2021
Internet Things, 2021
Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems.
IEEE Commun. Lett., 2021
Future Gener. Comput. Syst., 2021
Comput. Secur., 2021
Comput. Networks, 2021
Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps).
Comput. Electr. Eng., 2021
Ad Hoc Networks, 2021
SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Introduction to the Minitrack on Decentralized Federated Learning: Applications, Solutions, and Challenges.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
2020
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020
A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security.
IEEE Trans. Serv. Comput., 2020
Threats on the horizon: understanding security threats in the era of cyber-physical systems.
J. Supercomput., 2020
Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain.
IEEE J. Biomed. Health Informatics, 2020
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence.
IEEE Trans. Emerg. Top. Comput., 2020
Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges.
IEEE Trans. Engineering Management, 2020
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
ACM Trans. Cyber Phys. Syst., 2020
Neural Comput. Appl., 2020
Cost optimization of secure routing with untrusted devices in software defined networking.
J. Parallel Distributed Comput., 2020
A high-performance framework for a network programmable packet processor using P4 and FPGA.
J. Netw. Comput. Appl., 2020
Sidechain technologies in blockchain networks: An examination and state-of-the-art review.
J. Netw. Comput. Appl., 2020
An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic.
IEEE Internet Things J., 2020
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020
Digit. Commun. Networks, 2020
Concurr. Comput. Pract. Exp., 2020
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.
Comput. Secur., 2020
Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.
Comput. Secur., 2020
Comput. Secur., 2020
Ensemble sparse representation-based cyber threat hunting for security of smart cities.
Comput. Electr. Eng., 2020
Appl. Soft Comput., 2020
IEEE Access, 2020
IEEE Access, 2020
SLPoW: Secure and Low Latency Proof of Work Protocol for Blockchain in Green IoT Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the IEEE Globecom Workshops, 2020
Proceedings of the IEEE Globecom Workshops, 2020
A Deep Recurrent Neural Network to Support Guidelines and Decision Making of Social Distancing.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection.
Proceedings of the Handbook of Big Data Privacy., 2020
Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach.
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features.
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
Proceedings of the Handbook of Big Data Privacy., 2020
2019
J. Comput. Virol. Hacking Tech., 2019
IEEE Trans. Sustain. Comput., 2019
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning.
IEEE Trans. Sustain. Comput., 2019
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.
IEEE Trans. Emerg. Top. Comput., 2019
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.
IEEE Trans. Big Data, 2019
Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.
IEEE Trans. Big Data, 2019
J. Syst. Archit., 2019
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019
Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies.
Int. J. Multim. Intell. Secur., 2019
Future Gener. Comput. Syst., 2019
Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection.
CoRR, 2019
Concurr. Comput. Pract. Exp., 2019
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.
Comput. Electr. Eng., 2019
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019
A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids.
IEEE Access, 2019
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
A deep unsupervised representation learning approach for effective cyber-physical attack detection and identification on highly imbalanced data.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Big Data and Internet of Things Security and Forensics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications.
Proceedings of the Handbook of Big Data and IoT Security, 2019
A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
J. Comput. Virol. Hacking Tech., 2018
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.
J. Comput. Sci., 2018
J. Ambient Intell. Humaniz. Comput., 2018
Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet Things J., 2018
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018
CoRR, 2018
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing.
CoRR, 2018
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware.
CoRR, 2018
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection.
CoRR, 2018
CoRR, 2018
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies.
CoRR, 2018
Concurr. Comput. Pract. Exp., 2018
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure.
IEEE Access, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security.
Proceedings of the Blockchain - ICBC 2018, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018
CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018
Empirical vulnerability analysis of automated smart contracts security testing on blockchains.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018
2017
Investigating the antecedents to the adoption of SCRM technologies by start-up companies.
Telematics Informatics, 2017
CoRR, 2017
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies.
CoRR, 2017
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies.
CoRR, 2017
CoRR, 2017
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
CoRR, 2017
Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors.
CoRR, 2017
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
CoRR, 2017
Honeypots for employee information security awareness and education training: A conceptual EASY training model.
CoRR, 2017
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Comput. Electr. Eng., 2017
Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
2016
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wirel. Commun. Netw., 2016
CoRR, 2016
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
2015
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the Cloud Security Ecosystem, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Computational Forensics, 2014
Proceedings of the Third International Conference on Cyber Security, 2014
Proceedings of the Third International Conference on Cyber Security, 2014
2013
2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Proceedings of the Signal Processing and Information Technology, 2011
Proceedings of the Digital Information Processing and Communications, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Int. J. Adv. Comp. Techn., 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010