Tooska Dargahi
Orcid: 0000-0002-0908-6483
According to our database1,
Tooska Dargahi
authored at least 52 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
0
5
10
15
6
3
3
3
4
3
6
3
4
2
1
1
3
1
2
2
2
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors.
ACM Trans. Priv. Secur., August, 2023
Digital Forensic Investigation of Web-Based Virtual Reality Worlds: Decentraland as a Case Study.
IEEE Commun. Mag., 2023
IEEE Access, 2023
Poster: Continuous Authentication in Highly Connected 6G-enabled Transportation Systems.
Proceedings of the IEEE Vehicular Networking Conference, 2023
Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge.
ACM J. Data Inf. Qual., 2022
DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy.
IEEE Access, 2022
2021
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence.
IEEE Trans. Sustain. Comput., 2021
Security challenges of Internet of Underwater Things: A systematic literature review.
Trans. Emerg. Telecommun. Technol., 2021
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications.
Comput. Commun., 2021
Proceedings of the 2021 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2021
2020
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
ACM Trans. Cyber Phys. Syst., 2020
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications.
Future Gener. Comput. Syst., 2020
Digit. Commun. Networks, 2020
Vulnerability Assessment Of Vehicle To Infrastructure Communication: A Case Study Of Unmanned Ground Vehicle.
Proceedings of the IEEE Globecom Workshops, 2020
Proceedings of the 12th International Symposium on Communication Systems, 2020
2019
J. Comput. Virol. Hacking Tech., 2019
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019
Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies.
Int. J. Multim. Intell. Secur., 2019
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.
Comput. Electr. Eng., 2019
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2018
2017
Wirel. Pers. Commun., 2017
CoRR, 2017
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017
2016
IEEE Micro, 2016
Comput. Commun., 2016
WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures.
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2016
FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks.
Secur. Commun. Networks, 2015
Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015