Amin Azmoodeh

Orcid: 0000-0002-4109-4395

According to our database1, Amin Azmoodeh authored at least 21 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A GNN-Based Adversarial Internet of Things Malware Detection Framework for Critical Infrastructure: Studying Gafgyt, Mirai, and Tsunami Campaigns.
IEEE Internet Things J., 2024

2022
IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection.
IEEE Trans. Ind. Informatics, 2022

Deep Fake Detection, Deterrence and Response: Challenges and Opportunities.
CoRR, 2022

Proactive Detection of Query-based Adversarial Scenarios in NLP Systems.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

2021
Cybersecurity in Smart Farming: Canada Market Research.
CoRR, 2021

2020
Blockchain in Cybersecurity Realm: An Overview.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020

An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic.
IEEE Internet Things J., 2020

MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution.
IEEE Access, 2020

A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection.
Proceedings of the Handbook of Big Data Privacy., 2020

Privacy Preserving Abnormality Detection: A Deep Learning Approach.
Proceedings of the Handbook of Big Data Privacy., 2020

RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features.
Proceedings of the Handbook of Big Data Privacy., 2020

Active Spectral Botnet Detection Based on Eigenvalue Weighting.
Proceedings of the Handbook of Big Data Privacy., 2020

Big Data and Privacy: Challenges and Opportunities.
Proceedings of the Handbook of Big Data Privacy., 2020

2019
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning.
IEEE Trans. Sustain. Comput., 2019

Fuzzy pattern tree for edge malware detection and categorization in IoT.
J. Syst. Archit., 2019

Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data and Internet of Things Security and Forensics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intell. Humaniz. Comput., 2018

2017
Graph embedding as a new approach for unknown malware detection.
J. Comput. Virol. Hacking Tech., 2017

2013
To Boost Graph Clustering Based on Power Iteration by Removing Outliers.
Proceedings of the First International Conference on Advanced Data and Information Engineering, 2013


  Loading...