Sajad Homayoun

Orcid: 0000-0001-9371-9759

According to our database1, Sajad Homayoun authored at least 13 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unmasking phishers: ML for malicious certificate detection.
Comput. Ind. Eng., 2024

2023
Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023

2022
Detecting Ambiguous Phishing Certificates using Machine Learning.
Proceedings of the International Conference on Information Networking, 2022

2021
An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence.
Proceedings of the Network and System Security - 15th International Conference, 2021

A Perfect Match: Deep Learning Towards Enhanced Data Trustworthiness in Crowd-Sensing Systems.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

2020
A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence.
IEEE Trans. Emerg. Top. Comput., 2020

Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020

An opcode-based technique for polymorphic Internet of Things malware detection.
Concurr. Comput. Pract. Exp., 2020

2019
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer.
Future Gener. Comput. Syst., 2019

Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019


  Loading...