Ali Dehghantanha

Orcid: 0000-0002-9294-7554

Affiliations:
  • University of Guelph, Ontario, Canada


According to our database1, Ali Dehghantanha authored at least 220 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AP2FL: Auditable Privacy-Preserving Federated Learning Framework for Electronics in Healthcare.
IEEE Trans. Consumer Electron., February, 2024

Two-Level Privacy-Preserving Framework: Federated Learning for Attack Detection in the Consumer Internet of Things.
IEEE Trans. Consumer Electron., February, 2024

A Robust Privacy-Preserving Federated Learning Model Against Model Poisoning Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things.
J. Syst. Archit., 2024

A GNN-Based Adversarial Internet of Things Malware Detection Framework for Critical Infrastructure: Studying Gafgyt, Mirai, and Tsunami Campaigns.
IEEE Internet Things J., 2024

A Federated Learning Approach for Multi-stage Threat Analysis in Advanced Persistent Threat Campaigns.
CoRR, 2024

P3GNN: A Privacy-Preserving Provenance Graph-Based Model for APT Detection in Software Defined Networking.
CoRR, 2024

Auto-CIDS: An Autonomous Intrusion Detection System for Vehicular Networks.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024

P3GNN: A Privacy-Preserving Provenance Graph-Based Model for Autonomous APT Detection in Software Defined Networking.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024

Autonomous Cybersecurity: Evolving Challenges, Emerging Opportunities, and Future Research Trajectories.
Proceedings of the Workshop on Autonomous Cybersecurity, 2024

2023
A Generalizable Deep Neural Network Method for Detecting Attacks in Industrial Cyber-Physical Systems.
IEEE Syst. J., December, 2023

Accurate threat hunting in industrial internet of things edge devices.
Digit. Commun. Networks, October, 2023

Generative Adversarial Networks for Cyber Threat Hunting in Ethereum Blockchain.
Distributed Ledger Technol. Res. Pract., June, 2023

An ensemble deep learning model for cyber threat hunting in industrial internet of things.
Digit. Commun. Networks, February, 2023

An optimized fuzzy deep learning model for data classification based on NSGA-II.
Neurocomputing, 2023

Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks.
CoRR, 2023

Systemization of Knowledge (SoK)- Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives.
CoRR, 2023

Machine Learning in Digital Forensics: A Systematic Literature Review.
CoRR, 2023

An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things.
Comput. Commun., 2023

Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks.
Comput. Ind., 2023

2022
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks.
IEEE Trans. Ind. Informatics, 2022

IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection.
IEEE Trans. Ind. Informatics, 2022

A Self-Tuning Cyber-Attacks' Location Identification Approach for Critical Infrastructures.
IEEE Trans. Ind. Informatics, 2022

Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II.
IEEE Trans. Engineering Management, 2022

FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems.
IEEE Syst. J., 2022

An efficient packet parser architecture for software-defined 5G networks.
Phys. Commun., 2022

Federated-Learning-Based Anomaly Detection for IoT Security Attacks.
IEEE Internet Things J., 2022

Deep Fake Detection, Deterrence and Response: Challenges and Opportunities.
CoRR, 2022

The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective.
CoRR, 2022

Crypto Makes AI Evolve.
CoRR, 2022

Communication Layer Security in Smart Farming: A Survey on Wireless Technologies.
CoRR, 2022

Proactive Detection of Query-based Adversarial Scenarios in NLP Systems.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

2021
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence.
IEEE Trans. Sustain. Comput., 2021

A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021

Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems.
ACM Trans. Internet Techn., 2021

Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach.
Phys. Commun., 2021

Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security.
IEEE Internet Things J., 2021

Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems.
IEEE Internet Things J., 2021

A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer.
IEEE Internet Things J., 2021

Security aspects of Internet of Things aided smart grids: A bibliometric survey.
Internet Things, 2021

A survey on internet of things security: Requirements, challenges, and solutions.
Internet Things, 2021

Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems.
IEEE Commun. Lett., 2021

A survey on security and privacy of federated learning.
Future Gener. Comput. Syst., 2021

Cybersecurity in Smart Farming: Canada Market Research.
CoRR, 2021

A survey of machine learning techniques in adversarial image forensics.
Comput. Secur., 2021

A kangaroo-based intrusion detection system on software-defined networks.
Comput. Networks, 2021

Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps).
Comput. Electr. Eng., 2021

Federated learning for drone authentication.
Ad Hoc Networks, 2021

Generative adversarial network to detect unseen Internet of Things malware.
Ad Hoc Networks, 2021

SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Introduction to the Minitrack on Decentralized Federated Learning: Applications, Solutions, and Challenges.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

A Machine Learning-based SDN Controller Framework for Drone Management.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

Secure AI and Blockchain-enabled Framework in Smart Vehicular Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

The Future of Blockchain Technology in Healthcare Internet of Things Security.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Blockchain Applications in Power Systems: A Bibliometric Analysis.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Blockchain in Cybersecurity Realm: An Overview.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Immutable and Secure IP Address Protection Using Blockchain.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020

An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security.
IEEE Trans. Serv. Comput., 2020

Threats on the horizon: understanding security threats in the era of cyber-physical systems.
J. Supercomput., 2020

Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain.
IEEE J. Biomed. Health Informatics, 2020

An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence.
IEEE Trans. Emerg. Top. Comput., 2020

Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges.
IEEE Trans. Engineering Management, 2020

A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
ACM Trans. Cyber Phys. Syst., 2020

AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things.
Neural Comput. Appl., 2020

Cost optimization of secure routing with untrusted devices in software defined networking.
J. Parallel Distributed Comput., 2020

A high-performance framework for a network programmable packet processor using P4 and FPGA.
J. Netw. Comput. Appl., 2020

Sidechain technologies in blockchain networks: An examination and state-of-the-art review.
J. Netw. Comput. Appl., 2020

An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic.
IEEE Internet Things J., 2020

Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020

A systematic literature review of blockchain cyber security.
Digit. Commun. Networks, 2020

An opcode-based technique for polymorphic Internet of Things malware detection.
Concurr. Comput. Pract. Exp., 2020

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.
Comput. Secur., 2020

Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.
Comput. Secur., 2020

An improved two-hidden-layer extreme learning machine for malware hunting.
Comput. Secur., 2020

Ensemble sparse representation-based cyber threat hunting for security of smart cities.
Comput. Electr. Eng., 2020

Cryptocurrency malware hunting: A deep Recurrent Neural Network approach.
Appl. Soft Comput., 2020

MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution.
IEEE Access, 2020

An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System.
IEEE Access, 2020

SLPoW: Secure and Low Latency Proof of Work Protocol for Blockchain in Green IoT Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Making Sense of Blockchain for AI Deepfakes Technology.
Proceedings of the IEEE Globecom Workshops, 2020

An Empirical Evaluation of AI Deep Explainable Tools.
Proceedings of the IEEE Globecom Workshops, 2020

A Deep Recurrent Neural Network to Support Guidelines and Decision Making of Social Distancing.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Artificial Intelligence and Security of Industrial Control Systems.
Proceedings of the Handbook of Big Data Privacy., 2020

AI and Security of Critical Infrastructure.
Proceedings of the Handbook of Big Data Privacy., 2020

A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection.
Proceedings of the Handbook of Big Data Privacy., 2020

Anomaly Detection in Cyber-Physical Systems Using Machine Learning.
Proceedings of the Handbook of Big Data Privacy., 2020

A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection.
Proceedings of the Handbook of Big Data Privacy., 2020

Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach.
Proceedings of the Handbook of Big Data Privacy., 2020

Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis.
Proceedings of the Handbook of Big Data Privacy., 2020

Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities.
Proceedings of the Handbook of Big Data Privacy., 2020

RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features.
Proceedings of the Handbook of Big Data Privacy., 2020

Active Spectral Botnet Detection Based on Eigenvalue Weighting.
Proceedings of the Handbook of Big Data Privacy., 2020

Big Data and Privacy: Challenges and Opportunities.
Proceedings of the Handbook of Big Data Privacy., 2020

A Survey on Application of Big Data in Fin Tech Banking Security and Privacy.
Proceedings of the Handbook of Big Data Privacy., 2020

Industrial Big Data Analytics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data Privacy., 2020

2019
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features.
J. Comput. Virol. Hacking Tech., 2019

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.
IEEE Trans. Sustain. Comput., 2019

Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning.
IEEE Trans. Sustain. Comput., 2019

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.
IEEE Trans. Emerg. Top. Comput., 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.
IEEE Trans. Big Data, 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.
IEEE Trans. Big Data, 2019

Fuzzy pattern tree for edge malware detection and categorization in IoT.
J. Syst. Archit., 2019

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019

Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies.
Int. J. Multim. Intell. Secur., 2019

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer.
Future Gener. Comput. Syst., 2019

Blockchain Applications in Power Systems: A Bibliometric Analysis.
CoRR, 2019

Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection.
CoRR, 2019

A hierarchical key pre-distribution scheme for fog networks.
Concurr. Comput. Pract. Exp., 2019

A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.
Comput. Electr. Eng., 2019

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids.
IEEE Access, 2019

Data Sharing and Privacy for Patient IoT Devices Using Blockchain.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

Intelligent Anomaly Detection for Large-scale Smart Grids.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

A deep unsupervised representation learning approach for effective cyber-physical attack detection and identification on highly imbalanced data.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

Bibliometric Analysis on the Rise of Cloud Security.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Security in Online Games: Current Implementations and Challenges.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Distributed Filesystem Forensics: Ceph as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A Cyber Kill Chain Based Analysis of Remote Access Trojans.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A Bibliometric Analysis of Authentication and Access Control in IoT Devices.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data and Internet of Things Security and Forensics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data Forensics: Hadoop Distributed File Systems as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A Bibliometric Analysis of Botnet Detection Techniques.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
Intelligent OS X malware threat detection with code inspection.
J. Comput. Virol. Hacking Tech., 2018

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.
J. Comput. Sci., 2018

Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intell. Humaniz. Comput., 2018

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet Things J., 2018

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Gener. Comput. Syst., 2018

Internet of Things security and forensics: Challenges and opportunities.
Future Gener. Comput. Syst., 2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial.
CoRR, 2018

Cyber Threat Intelligence : Challenges and Opportunities.
CoRR, 2018

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence.
CoRR, 2018

Ubuntu One Investigation: Detecting Evidences on Client Machines.
CoRR, 2018

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.
CoRR, 2018

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing.
CoRR, 2018

Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware.
CoRR, 2018

Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection.
CoRR, 2018

Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies.
CoRR, 2018

A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies.
CoRR, 2018

CloudMe Forensics: A Case of Big-Data Investigation.
CoRR, 2018

CloudMe forensics: A case of big data forensic investigation.
Concurr. Comput. Pract. Exp., 2018

A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure.
IEEE Access, 2018

Towards Better Ocular Recognition for Secure Real-World Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security.
Proceedings of the Blockchain - ICBC 2018, 2018

Introduction to the Minitrack on Cyber Threat Intelligence and Analytics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

On the Understanding of Gamification in Blockchain Systems.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018

CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

Empirical vulnerability analysis of automated smart contracts security testing on blockchains.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

2017
Investigating the antecedents to the adoption of SCRM technologies by start-up companies.
Telematics Informatics, 2017

Forensics Analysis of Android Mobile VoIP Apps.
CoRR, 2017

Performance of Android Forensics Data Recovery Tools.
CoRR, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
CoRR, 2017

Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies.
CoRR, 2017

Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies.
CoRR, 2017

Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study.
CoRR, 2017

Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
CoRR, 2017

Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors.
CoRR, 2017

Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
CoRR, 2017

Honeypots for employee information security awareness and education training: A conceptual EASY training model.
CoRR, 2017

An Android Cloud Storage Apps Forensic Taxonomy.
CoRR, 2017

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Comput. Electr. Eng., 2017

Machine learning aided Android malware classification.
Comput. Electr. Eng., 2017

Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Performance of Android Forensics Data Recovery Tools.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Investigating Storage as a Service Cloud Platform: pCloud as a Case Study.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Forensics Analysis of Android Mobile VoIP Apps.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Contemporary Digital Forensics Investigations of Cloud and Mobile Applications.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

An Android Cloud Storage Apps Forensic Taxonomy.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wirel. Commun. Netw., 2016

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.
CoRR, 2016

A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation.
CoRR, 2016

A Formal Calculus for International Relations Computation and Evaluation.
CoRR, 2016

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

2015
Preface.
Int. J. Image Graph., 2015

Exploit Kits: The production line of the Cybercrime economy?
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

Cloud Storage Forensic: hubiC as a Case-Study.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Ubuntu One investigation: Detecting evidences on client machines.
Proceedings of the Cloud Security Ecosystem, 2015

2014
Privacy-respecting digital investigation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes.
Proceedings of the Computational Forensics, 2014

An approach for forensic investigation in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

Mobile forensic data acquisition in Firefox OS.
Proceedings of the Third International Conference on Cyber Security, 2014

2013
Trends In Android Malware Detection.
J. Digit. Forensics Secur. Law, 2013

2012
Finest authorizing member of common criteria certification.
Proceedings of the 2012 International Conference on Cyber Security, 2012

VoIP evidence model: A new forensic method for investigating VoIP malicious attacks.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Volatile memory acquisition using backup for forensic investigation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Towards secure model for SCADA systems.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Forensics investigation challenges in cloud computing environments.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Greening Digital Forensics: Opportunities and Challenges.
Proceedings of the Signal Processing and Information Technology, 2011

A Mitigation Approach to the Privacy and Malware Threats of Social Network Services.
Proceedings of the Digital Information Processing and Communications, 2011

Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Towards data centric mobile security.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Investigation of bypassing malware defences and malware detections.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Utilizing Trusted Platform Module to Mitigate Botnet Attacks.
Int. J. Adv. Comp. Techn., 2010

Towards a Pervasive Formal Privacy Language.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010


  Loading...