Ali Dehghantanha
Ali Dehghantanha
Director - Cyber Science Lab, University of Guelph- ON- Canada; EU Marie Curie Fellow Alumni
Verified email at - Homepage
Cited by
Cited by
Internet of Things security and forensics: Challenges and opportunities
M Conti, A Dehghantanha, K Franke, S Watson
Future Generation Computer Systems 78, 544-546, 2018
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo
EURASIP Journal on Wireless Communications and Networking 2016 (1), 130, 2016
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, D Ali, KKR Choo
IEEE Transactions on Emerging Topics in Computing, 2016
Machine learning aided Android malware classification
N Milosevic, A Dehghantanha, KKR Choo
Computers & Electrical Engineering 61, 266-274, 2017
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KKR Choo
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1141-1152, 2018
Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning
A Azmoodeh, A Dehghantanha, KKR Choo
IEEE Transactions on Sustainable Computing 4 (1), 88-95, 2018
A deep recurrent neural network based approach for internet of things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
Forensics investigation challenges in cloud computing environments
M Damshenas, A Dehghantanha, R Mahmoud, S bin Shamsuddin
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
A systematic literature review of blockchain cyber security
PJ Taylor, T Dargahi, A Dehghantanha, RM Parizi, KKR Choo
Digital Communications and Networks 6 (2), 147-156, 2020
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
F Norouzizadeh Dezfouli, A Dehghantanha, B Eterovic-Soric, KKR Choo
Australian journal of forensic sciences 48 (4), 469-488, 2016
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing, 2017
Digital forensics: the missing piece of the Internet of Things promise
S Watson, A Dehghantanha
Computer Fraud & Security 2016 (6), 5-8, 2016
Empirical vulnerability analysis of automated smart contracts security testing on blockchains
RM Parizi, A Dehghantanha, KKR Choo, A Singh
arXiv preprint arXiv:1809.02702, 2018
Smart contract programming languages on blockchains: an empirical evaluation of usability and security
RM Parizi, A Dehghantanha
International Conference on Blockchain, 75-91, 2018
A survey on malware propagation, analysis, and detection
M Damshenas, A Dehghantanha, R Mahmoud
International Journal of Cyber-Security and Digital Forensics 2 (4), 10-30, 2013
M0droid: An android behavioral-based malware detection model
M Damshenas, A Dehghantanha, KKR Choo, R Mahmud
Journal of Information Privacy and Security 11 (3), 141-157, 2015
A survey on privacy issues in digital forensics
A Aminnezhad, A Dehghantanha, MT Abdullah
International Journal of Cyber-Security and Digital Forensics 1 (4), 311-324, 2012
A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids
H Karimipour, A Dehghantanha, RM Parizi, KKR Choo, H Leung
IEEE Access 7, 80778-80788, 2019
A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure
S Walker-Roberts, M Hammoudeh, A Dehghantanha
IEEE Access 6, 25167-25177, 2018
A survey about impacts of cloud computing on digital forensics
F Daryabar, A Dehghantanha, NI Udzir, N Sani, S Shamsuddin, ...
International Journal of Cyber-Security and Digital Forensics (IJCSDF), The …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20