Ali Dehghantanha
#149,134
Most Influential Person Now
Ali Dehghantanha's AcademicInfluence.com Rankings
Ali Dehghantanhacomputer-science Degrees
Computer Science
#7720
World Rank
#8125
Historical Rank
Information Security
#22
World Rank
#22
Historical Rank
Database
#4775
World Rank
#4960
Historical Rank

Download Badge
Computer Science
Ali Dehghantanha's Degrees
- PhD Computer Science University of Technology Sydney
- Masters Information Security University of Tehran
- Bachelors Computer Engineering University of Tehran
Similar Degrees You Can Earn
Why Is Ali Dehghantanha Influential?
(Suggest an Edit or Addition)Ali Dehghantanha's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Internet of Things security and forensics: Challenges and opportunities (2018) (440)
- A survey on security and privacy of federated learning (2021) (396)
- A systematic literature review of blockchain cyber security (2020) (323)
- A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks (2019) (317)
- A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting (2018) (285)
- Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing (2016) (267)
- Machine learning aided Android malware classification (2017) (257)
- Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning (2019) (240)
- Detecting crypto-ransomware in IoT networks based on energy consumption footprint (2018) (217)
- A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids (2019) (149)
- An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security (2020) (136)
- Sidechain technologies in blockchain networks: An examination and state-of-the-art review (2020) (136)
- A survey on internet of things security: Requirements, challenges, and solutions (2019) (131)
- Fuzzy pattern tree for edge malware detection and categorization in IoT (2019) (124)
- Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence (2018) (116)
- Federated-Learning-Based Anomaly Detection for IoT Security Attacks (2021) (116)
- Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security (2018) (115)
- Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains (2018) (113)
- Security Aspects of Internet of Things aided Smart Grids: a Bibliometric Survey (2019) (110)
- Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities (2020) (108)
- Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection (2018) (108)
- Digital forensics: the missing piece of the Internet of Things promise (2016) (107)
- Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks (2019) (106)
- Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain (2020) (104)
- Forensics investigation challenges in cloud computing environments (2012) (96)
- Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security (2020) (95)
- Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms (2016) (94)
- DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer (2019) (92)
- Machine Learning Aided Static Malware Analysis: A Survey and Tutorial (2018) (82)
- An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System (2020) (80)
- Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection (2019) (78)
- A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure (2018) (77)
- M0Droid: An Android Behavioral-Based Malware Detection Model (2015) (73)
- An improved two-hidden-layer extreme learning machine for malware hunting (2020) (68)
- An opcode‐based technique for polymorphic Internet of Things malware detection (2020) (67)
- P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking (2020) (65)
- Cyber Threat Intelligence : Challenges and Opportunities (2018) (65)
- Cryptocurrency malware hunting: A deep Recurrent Neural Network approach (2020) (64)
- Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies (2016) (64)
- A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence (2017) (63)
- Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study (2017) (61)
- A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS (2014) (61)
- Investigating the antecedents to the adoption of SCRM technologies by start-up companies (2017) (59)
- An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic (2020) (59)
- Cloud storage forensics: MEGA as a case study (2017) (59)
- Intelligent OS X malware threat detection with code inspection (2018) (56)
- Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices (2016) (54)
- SugarSync forensic analysis (2016) (52)
- BoTShark: A Deep Learning Approach for Botnet Traffic Detection (2018) (50)
- Privacy-respecting digital investigation (2014) (50)
- The Future of Blockchain Technology in Healthcare Internet of Things Security (2020) (45)
- A Cyber-Kill-Chain based taxonomy of crypto-ransomware features (2019) (45)
- AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things (2020) (43)
- A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment (2019) (40)
- Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures (2019) (40)
- Threats on the horizon: understanding security threats in the era of cyber-physical systems (2019) (40)
- Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks (2018) (39)
- Cost optimization of secure routing with untrusted devices in software defined networking (2020) (39)
- Federated learning for drone authentication (2021) (39)
- A high-performance framework for a network programmable packet processor using P4 and FPGA (2020) (38)
- Volatile memory acquisition using backup for forensic investigation (2012) (38)
- Trends In Android Malware Detection (2013) (38)
- Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware (2018) (38)
- Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis (2020) (37)
- A survey about impacts of cloud computing on digital forensics (2013) (37)
- Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks (2022) (36)
- An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems (2020) (36)
- CloudMe forensics: A case of big data forensic investigation (2017) (36)
- Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains (2019) (36)
- A Survey of Machine Learning Techniques in Adversarial Image Forensics (2020) (36)
- A kangaroo-based intrusion detection system on software-defined networks (2021) (35)
- Intelligent Anomaly Detection for Large-scale Smart Grids (2019) (35)
- Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain (2019) (34)
- Exploit Kits: The production line of the Cybercrime economy? (2015) (34)
- Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study (2017) (34)
- A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence (2020) (33)
- Ubuntu One investigation: Detecting evidences on client machines (2015) (32)
- A review on impacts of cloud computing and digital forensics (2014) (32)
- Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study (2018) (31)
- Investigation of bypassing malware defences and malware detections (2011) (31)
- Towards secure model for SCADA systems (2012) (31)
- Data Sharing and Privacy for Patient IoT Devices Using Blockchain (2019) (31)
- Big Data and Internet of Things Security and Forensics: Challenges and Opportunities (2019) (30)
- A Survey on Digital Forensics Trends (2014) (30)
- Trust challenges and issues of e-government: E-tax prospective (2010) (30)
- On the Understanding of Gamification in Blockchain Systems (2018) (29)
- Cloud Forensics Issues and Opportunities (2013) (29)
- Cyber Threat Intelligence (2018) (28)
- Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments (2019) (28)
- A multiview learning method for malware threat hunting: windows, IoT and android as case studies (2020) (27)
- Framework of digital forensics for the Samsung Star Series phone (2011) (27)
- SLPoW: Secure and Low Latency Proof of Work Protocol for Blockchain in Green IoT Networks (2020) (27)
- A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores (2019) (26)
- Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies (2017) (26)
- Towards a Pervasive Formal Privacy Language (2010) (25)
- Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study (2017) (25)
- A Review of Vulnerabilities in Identity Management Using Biometrics (2010) (25)
- Towards a Unified Forensic Investigation Framework of Smartphones (2013) (24)
- VoIP evidence model: A new forensic method for investigating VoIP malicious attacks (2012) (24)
- Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies (2018) (24)
- An Empirical Evaluation of AI Deep Explainable Tools (2020) (24)
- Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber–Physical Systems (2021) (22)
- Cloud Storage Forensic: hubiC as a Case-Study (2015) (22)
- A deep unsupervised representation learning approach for effective cyber-physical attack detection and identification on highly imbalanced data (2019) (22)
- Anomaly Detection in Cyber-Physical Systems Using Machine Learning (2020) (22)
- Application of Machine Learning Algorithms for Android Malware Detection (2018) (20)
- Making Sense of Blockchain for AI Deepfakes Technology (2020) (19)
- Handbook of Big Data and IoT Security (2019) (19)
- Defusing the Hazards of Social Network Services (2011) (19)
- Public Blockchains Scalability: An Examination of Sharding and Segregated Witness (2020) (18)
- A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures (2021) (18)
- A User-Centered Context-Sensitive Privacy Model in Pervasive Systems (2010) (18)
- A Mitigation Approach to the Privacy and Malware Threats of Social Network Services (2011) (18)
- Utilizing trusted platform module to mitigate botnet attacks (2010) (18)
- Advances of mobile forensic procedures in Firefox OS (2014) (17)
- Analysis of virtual honeynet and VLAN-based virtual networks (2011) (17)
- A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks (2020) (16)
- UPM: User-Centered Privacy Model in Pervasive Computing Systems (2009) (16)
- Generative adversarial network to detect unseen Internet of Things malware (2021) (16)
- Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors (2017) (15)
- Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems (2011) (15)
- A Framework of TPM, SVM and Boot Control for Securing Forensic Logs (2012) (15)
- User-centered Privacy and Trust Model in Cloud Computing Systems (2009) (15)
- Forensics Analysis of Android Mobile VoIP Apps (2017) (15)
- Adaptive Traffic Fingerprinting for Darknet Threat Intelligence (2018) (15)
- Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin (2019) (15)
- A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection (2020) (15)
- Forensics Investigation of OpenFlow-Based SDN Platforms (2018) (14)
- Greening Digital Forensics: Opportunities and Challenges (2011) (14)
- Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges (2020) (14)
- An efficient packet parser architecture for software-defined 5G networks (2022) (14)
- Accurate threat hunting in industrial internet of things edge devices (2022) (14)
- A Guideline to Enforce Data Protection and Privacy Digital Laws in Malaysia (2010) (14)
- Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform (2019) (13)
- Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks (2023) (13)
- Investigating Storage as a Service Cloud Platform: pCloud as a Case Study (2017) (13)
- A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies (2018) (13)
- Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats (2019) (13)
- SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning (2021) (13)
- Mobile Forensics: A Bibliometric Analysis (2018) (13)
- A Comparison Between Different Machine Learning Models for IoT Malware Detection (2020) (13)
- Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies (2017) (12)
- Industrial Big Data Analytics: Challenges and Opportunities (2020) (12)
- Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies (2017) (12)
- Towards data centric mobile security (2011) (12)
- Performance measurement for mobile forensic data acquisition in Firefox OS (2014) (12)
- An ensemble deep learning model for cyber threat hunting in industrial internet of things (2022) (12)
- Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach (2021) (11)
- A Machine Learning-based SDN Controller Framework for Drone Management (2021) (11)
- Ensemble sparse representation-based cyber threat hunting for security of smart cities (2020) (11)
- Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis (2020) (11)
- MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution (2020) (11)
- Honeypots for employee information security awareness and education training: A conceptual EASY training model (2017) (11)
- Cloud computing and conflicts with digital forensic investigation (2013) (11)
- A hierarchical key pre‐distribution scheme for fog networks (2018) (11)
- Secure AI and Blockchain-enabled Framework in Smart Vehicular Networks (2021) (10)
- Real‐time stability assessment in smart cyber‐physical grids: a deep learning approach (2020) (10)
- A Bibliometric Analysis of Authentication and Access Control in IoT Devices (2019) (10)
- Xml-Based Privacy Model in Pervasive Computing (2008) (10)
- Active Spectral Botnet Detection Based on Eigenvalue Weighting (2020) (10)
- A XML based, user-centered privacy model in pervasivecomputing systems (2009) (10)
- A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts (2016) (9)
- CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction (2018) (9)
- Cyber warfare trends and future (2013) (9)
- An analysis of anti-forensic capabilities of B-tree file system (Btrfs) (2018) (9)
- Blockchain Applications in Power Systems: A Bibliometric Analysis (2019) (9)
- Mobile forensic data acquisition in Firefox OS (2014) (9)
- An Android Cloud Storage Apps Forensic Taxonomy (2017) (9)
- A Cyber Kill Chain Based Analysis of Remote Access Trojans (2019) (9)
- A data-centric model for smartphone security (2013) (9)
- A survey on privacy impacts of digital investigation (2013) (9)
- An approach for forensic investigation in Firefox OS (2014) (8)
- Performance of Android Forensics Data Recovery Tools (2017) (7)
- MODELLING BASED APPROACH FOR RECONSTRUCTING EVIDENCE OF VOIP MALICIOUS ATTACKS (2012) (7)
- Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study (2019) (7)
- Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications (2019) (7)
- Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes (2014) (7)
- Blockchain in Cybersecurity Realm: An Overview (2020) (7)
- Private Cloud Storage Forensics: Seafile as a Case Study (2019) (7)
- Security in Online Games: Current Implementations and Challenges (2019) (7)
- Federated IoT security attack detection using decentralized edge data (2022) (7)
- Finest authorizing member of common criteria certification (2012) (6)
- Towards Better Ocular Recognition for Secure Real-World Applications (2018) (6)
- Blockchain Cybersecurity, Trust and Privacy (2020) (6)
- FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems (2022) (6)
- A Survey on Application of Big Data in Fin Tech Banking Security and Privacy (2020) (6)
- Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach (2020) (6)
- Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning (2020) (6)
- Artificial Intelligence and Security of Industrial Control Systems (2020) (6)
- Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine (2017) (6)
- A Bibliometric Analysis of Botnet Detection Techniques (2019) (6)
- UPEM : user-centered privacy evaluation model in pervasive computing system. (2009) (6)
- Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study (2019) (5)
- Contemporary Digital Forensics Investigations of Cloud and Mobile Applications (2017) (5)
- A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection (2020) (5)
- Towards green frameworks for digital forensics investigation (2013) (5)
- Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study. (2019) (5)
- Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems (2021) (5)
- A Bibliometric Analysis on the Application of Deep Learning in Cybersecurity (2020) (4)
- AI and Security of Critical Infrastructure (2020) (4)
- Big Data and Privacy: Challenges and Opportunities (2020) (4)
- An optimized fuzzy deep learning model for data classification based on NSGA-II (2022) (4)
- Introduction to the Minitrack on Cyber Threat Intelligence and Analytics (2018) (4)
- A Self-Tuning Cyber-Attacks’ Location Identification Approach for Critical Infrastructures (2022) (4)
- A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications (2019) (4)
- A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks (2017) (4)
- A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks (2021) (4)
- Big Data Forensics: Hadoop Distributed File Systems as a Case Study (2019) (4)
- Big-Data and Cyber-Physical Systems in Healthcare: Challenges and Opportunities (2020) (4)
- IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection (2022) (3)
- Blockchain Ecosystem: Technological and Management Opportunities and Challenges (2020) (3)
- A Survey On Cyber-Crime Prediction Techniques (2013) (3)
- Analysis of known and unknown malware bypassing techniques (2013) (3)
- Crypto Makes AI Evolve (2022) (3)
- Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems (2021) (3)
- RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features (2020) (3)
- Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1 (2019) (3)
- Torture-free cyberspace – a human right (2017) (3)
- The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective (2022) (2)
- A Deep Recurrent Neural Network to Support Guidelines and Decision Making of Social Distancing (2020) (2)
- An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things (2022) (2)
- A Survey On CyberCrime Prediction Techniques (2013) (2)
- CloudMe Forensics: A Case of Big-Data Investigation (2018) (2)
- Immutable and Secure IP Address Protection Using Blockchain (2020) (2)
- Cybersecurity in Smart Farming: Canada Market Research (2021) (2)
- Communication Layer Security in Smart Farming: A Survey on Wireless Technologies (2022) (2)
- IoT Privacy, Security and Forensics Challenges: An Unmanned Aerial Vehicle (UAV) Case Study (2022) (2)
- Big Data Analytics and Forensics: An Overview (2022) (2)
- Distributed Filesystem Forensics: Ceph as a Case Study (2019) (2)
- A Recurrent Attention Model for Cyber Attack Classification (2021) (1)
- Handbook of Big Data Privacy (2020) (1)
- Framework for Cyber Crime Law Implementation in Zimbabwe (2011) (1)
- Introduction to the Minitrack on Decentralized Federated Learning: Applications, Solutions, and Challenges (2021) (1)
- Proactive Detection of Query-based Adversarial Scenarios in NLP Systems (2022) (1)
- A layered security architecture based on cyber kill chain against advanced persistent threats (2019) (1)
- Bibliometric Analysis on the Rise of Cloud Security (2019) (1)
- Forensic investigation of P 2 P cloud storage services and backbone for IoT networks (2017) (1)
- Threats on the horizon: understanding security threats in the era of cyber-physical systems (2019) (1)
- Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies (2019) (1)
- Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps) (2021) (1)
- A survey on privacy issues (2017) (1)
- Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II (2022) (0)
- A Framework for Defending Deep Neural Networks Against Out-Of-Distribution Adversarial Attacks (2019) (0)
- Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems (2021) (0)
- Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis (2020) (0)
- A multiview learning method for malware threat hunting: windows, IoT and android as case studies (2020) (0)
- Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence (2021) (0)
- Privacy in Pervasive Computing Systems (2010) (0)
- Classification of advance malware for autonomous vehicles by using stochastic logic (2018) (0)
- Generative Adversarial Networks for Cyber Threat Hunting in Ethereum Blockchain (2023) (0)
- Intelligent OS X malware threat detection with code inspection (2017) (0)
- Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2 (2019) (0)
- Evaluating the adoption of cybersecurity and its influence on organizational performance (2023) (0)
- Preface (2015) (0)
- Protecting Identity Using Biometrics Protection Systems (2010) (0)
- Deep Fake Detection, Deterrence and Response: Challenges and Opportunities (2022) (0)
- Nonreciprocity Compensation (2020) (0)
- AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things (2020) (0)
- Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics (2020) (0)
- A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation (2016) (0)
- Deep dive into ransomware threat hunting and intelligence at fog layer (2019) (0)
- Chapter 1 Adaptive Traffic Fingerprinting for Darknet Threat Intelligence (2017) (0)
- Access control in open distributed systems (2012) (0)
- Detecting crypto-ransomware in IoT networks based on energy consumption footprint (2017) (0)
- Formal Methods for Analyzing Privacy Policies (2011) (0)
- A Formal Calculus for International Relations Computation and Evaluation (2016) (0)
- Deep Representation Learning for Cyber-Attack Detection in Industrial IoT (2021) (0)
- Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing (2016) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Ali Dehghantanha?
Ali Dehghantanha is affiliated with the following schools: