Items where authors include "Dehghantanha, A."

Export as [feed] Atom [feed] RSS
Number of items: 19.

Article

Homayoun, S., Dehghantanha, A., Ahmadzadeh, M. et al. (2 more authors) (2020) Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence. IEEE Transactions on Emerging Topics in Computing, 8 (2). pp. 341-351. ISSN 2168-6750

Dehghantanha, A., Azmoodeh , A. and Choo, K.-K.R. (2019) Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning. IEEE Transactions on Sustainable Computing, 4 (1). pp. 88-95. ISSN 2377-3782

Azmoodeh, A., Dehghantanha, A. orcid.org/0000-0002-9294-7554, Conti, M. et al. (1 more author) (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. Journal of Ambient Intelligence and Humanized Computing, 9 (4). pp. 1141-1152. ISSN 1868-5137

Pajouh, H.H., Dehghantanha, A. orcid.org/0000-0002-9294-7554, Khayami, R. et al. (1 more author) (2018) Intelligent OS X malware threat detection with code inspection. Journal of Computer Virology and Hacking Techniques, 14 (3). pp. 213-223. ISSN 2274-2042

Epiphaniou, G., Karadimas, P., Ismail, D.K.B. et al. (3 more authors) (2018) Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks. IEEE Internet of Things Journal, 5 (4). pp. 2496-2505.

Milosevic, N., Dehghantanha, A. and Choo, K.-K.R. (2017) Machine learning aided Android malware classification. Computers & Electrical Engineering, 61. pp. 266-274. ISSN 0045-7906

Teing, Y.-Y., Dehghantanha, A., Choo, K.-K.R. et al. (2 more authors) (2017) Forensic investigation of cooperative storage cloud service: Symform as a case study. Journal of Forensic Sciences, 62 (3). pp. 641-654. ISSN 0022-1198

Yang, T.Y., Dehghantanha, A., Choo, K.-K.R. et al. (1 more author) (2017) Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study. Computers & Electrical Engineering, 58. pp. 350-363. ISSN 0045-7906

Haddad Pajouh, H., Javidan, R., Khayami, R. et al. (2 more authors) (2016) A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Transactions on Emerging Topics in Computing. ISSN 2168-6750

Book Section

Chelihi, M.A., Elutilo, A., Ahmed, I. et al. (2 more authors) (2017) An Android Cloud Storage Apps Forensic Taxonomy. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier , pp. 285-305. ISBN 9780128053034

Mohtasebi, S., Dehghantanha, A. and Choo, K.-K.R. (2017) Cloud storage forensics: analysis of data remnants on SpiderOak, JustCloud, and pCloud. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier , pp. 205-246. ISBN 978-0-12-805303-4

Dargahi, T., Dehghantanha, A. and Conti, M. (2017) Forensics Analysis of Android Mobile VoIP Apps. In: Choo, K.-K.R. and Dehghantanha , A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier , pp. 7-20. ISBN 9780128053034

Christopher, L., Choo, K.-K.R. and Dehghantanha, A. (2017) Honeypots for employee information security awareness and education training: A conceptual EASY training model. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier , pp. 111-129. ISBN 978-0-12-805303-4

Dargahi, T., Dehghantanha, A. and Conti, M. (2017) Investigating Storage as a Service Cloud Platform: pCloud as a Case Study. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier , pp. 185-204. ISBN 9780128053034

Petraityte, M., Dehghantanha, A. and Epiphaniou, G. (2017) Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier , pp. 79-89. ISBN 9780128053034

Yusoff, M.N., Dehghantanha, A. and Mahmod, R. (2017) Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Syngress , pp. 41-62. ISBN 9780128053034

Yusoff, M.N., Dehghantanha, A. and Mahmod, R. (2017) Network traffic forensics on firefox mobile OS: Facebook, Twitter and Telegram as case studies. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Syngress , pp. 63-78. ISBN 9780128053034

Ogazi-Onyemaechi, B.C., Dehghantanha, A. and Choo, K.-K.R. (2017) Performance of android forensics data recovery tools. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Syngress , pp. 91-110. ISBN 9780128053034

Proceedings Paper

Hopkins, M. and Dehghantanha, A. (2015) Exploit Kits: The production line of the Cybercrime Economy. In: Information Security and Cyber Forensics (InfoSec), 2015 Second International Conference on. 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 15-17 Nov 2015, Cape Town, South Africa. IEEE . ISBN 9781467369886

This list was generated on Sat Apr 13 13:01:10 2024 BST.