Hamed HaddadPajouh
Hamed HaddadPajouh
Verified email at uoguelph.ca - Homepage
Cited by
Cited by
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, D Ali, KKR Choo
IEEE Transactions on Emerging Topics in Computing, 2016
A deep recurrent neural network based approach for internet of things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
Two-tier network anomaly detection model: a machine learning approach
HH Pajouh, GH Dastghaibyfard, S Hashemi
Journal of Intelligent Information Systems 48 (1), 61-74, 2017
Intelligent OS X malware threat detection with code inspection
HH Pajouh, A Dehghantanha, R Khayami, KKR Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 213-223, 2018
A survey on internet of things security: Requirements, challenges, and solutions
H HaddadPajouh, A Dehghantanha, RM Parizi, M Aledhari, H Karimipour
Internet of Things, 100129, 2019
Mobile forensics: A bibliometric analysis
J Gill, I Okere, H HaddadPajouh, A Dehghantanha
Cyber Threat Intelligence, 297-310, 2018
AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things
H HaddadPajouh, R Khayami, A Dehghantanha, KKR Choo, RM Parizi
Neural Computing and Applications, 1-15, 2020
A cyber kill chain based analysis of remote access trojans
R HosseiniNejad, H HaddadPajouh, A Dehghantanha, RM Parizi
Handbook of big data and iot security, 273-299, 2019
Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach
M Nassiri, H HaddadPajouh, A Dehghantanha, H Karimipour, RM Parizi, ...
Handbook of Big Data Privacy, 359-370, 2020
A hybrid deep generative local metric learning method for intrusion detection
M Saharkhizan, A Azmoodeh, H HaddadPajouh, A Dehghantanha, ...
Handbook of Big Data Privacy, 343-357, 2020
Industrial big data analytics: challenges and opportunities
A Al-Abassi, H Karimipour, H HaddadPajouh, A Dehghantanha, RM Parizi
Handbook of Big Data Privacy, 37-61, 2020
Cryptocurrency malware hunting: A deep recurrent neural network approach
A Yazdinejad, H HaddadPajouh, A Dehghantanha, RM Parizi, ...
Applied Soft Computing 96, 106630, 2020
MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution
H Haddadpajouh, A Azmoodeh, A Dehghantanha, RM Parizi
IEEE Access 8, 139188-139198, 2020
Artificial intelligence and security of industrial control systems
S Singh, H Karimipour, H HaddadPajouh, A Dehghantanha
Handbook of Big Data Privacy, 121-164, 2020
An Investigation on the Use of Expert Systems in Developing Web-Based Fitness Exercise Plan Generator
A Darejeh, HH Pajouh, A Darejeh
International Review on Computers and Software, 2014
A Multi-Kernel and Meta-heuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer
H Haddadpajouh, A Mohtadi, A Dehghantanaha, H Karimipour, X Lin, ...
IEEE Internet of Things Journal, 2020
RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features
MM BehradFar, H HaddadPajouh, A Dehghantanha, A Azmoodeh, ...
Handbook of Big Data Privacy, 371-383, 2020
The system can't perform the operation now. Try again later.
Articles 1–17