Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ... Journal of information processing systems 15 (4), 865-889, 2019 | 109 | 2019 |
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features T Dargahi, A Dehghantanha, PN Bahrami, M Conti, G Bianchi, ... Journal of Computer Virology and Hacking Techniques 15, 277-305, 2019 | 101 | 2019 |
Your echos are heard: Tracking, profiling, and ad targeting in the amazon smart speaker ecosystem U Iqbal, PN Bahrami, R Trimananda, H Cui, A Gamero-Garrido, D Dubois, ... arXiv preprint arXiv:2204.10920, 2022 | 20 | 2022 |
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting PN Bahrami, U Iqbal, Z Shafiq Proceedings on Privacy Enhancing Technologies, 557-577, 2021 | 19 | 2021 |
A hierarchical key pre‐distribution scheme for fog networks PN Bahrami, HHS Javadi, T Dargahi, A Dehghantanha, KKR Choo Concurrency and Computation: Practice and Experience, e4776, 2018 | 17 | 2018 |
Tracking, profiling, and ad targeting in the Alexa echo smart speaker ecosystem U Iqbal, PN Bahrami, R Trimananda, H Cui, A Gamero-Garrido, ... Proceedings of the 2023 ACM on Internet Measurement Conference, 569-583, 2023 | 5 | 2023 |
A layered security architecture based on cyber kill chain against advanced persistent threats. PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ... Security and Privacy for Big Data, Cloud Computing and Applications, 135-155, 2019 | 1 | 2019 |