Ali Dehghantanha
Ali Dehghantanha
Canada Research Chair in Cybersecurity & Threat Intelligence (Tier2) - University of Guelph
Verified email at - Homepage
Cited by
Cited by
Internet of Things security and forensics: Challenges and opportunities
M Conti, A Dehghantanha, K Franke, S Watson
Future Generation Computer Systems 78, 544-546, 2018
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, A Dehghantanha, KKR Choo
IEEE Transactions on Emerging Topics in Computing 7 (2), 314-323, 2016
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo
EURASIP Journal on Wireless Communications and Networking 2016 (1), 1-10, 2016
Machine learning aided Android malware classification
N Milosevic, A Dehghantanha, KKR Choo
Computers & Electrical Engineering 61, 266-274, 2017
A systematic literature review of blockchain cyber security
PJ Taylor, T Dargahi, A Dehghantanha, RM Parizi, KKR Choo
Digital Communications and Networks 6 (2), 147-156, 2020
A deep recurrent neural network based approach for internet of things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning
A Azmoodeh, A Dehghantanha, KKR Choo
IEEE transactions on sustainable computing 4 (1), 88-95, 2018
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KKR Choo
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1141-1152, 2018
A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids
H Karimipour, A Dehghantanha, RM Parizi, KKR Choo, H Leung
IEEE Access 7, 80778-80788, 2019
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017
Empirical vulnerability analysis of automated smart contracts security testing on blockchains
RM Parizi, A Dehghantanha, KKR Choo, A Singh
arXiv preprint arXiv:1809.02702, 2018
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
F Norouzizadeh Dezfouli, A Dehghantanha, B Eterovic-Soric, KKR Choo
Australian journal of forensic sciences 48 (4), 469-488, 2016
Forensics investigation challenges in cloud computing environments
M Damshenas, A Dehghantanha, R Mahmoud, S bin Shamsuddin
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
Digital forensics: the missing piece of the internet of things promise
S Watson, A Dehghantanha
Computer Fraud & Security 2016 (6), 5-8, 2016
Smart contract programming languages on blockchains: An empirical evaluation of usability and security
RM Parizi, A Dehghantanha
International Conference on Blockchain, 75-91, 2018
Fuzzy pattern tree for edge malware detection and categorization in IoT
EM Dovom, A Azmoodeh, A Dehghantanha, DE Newton, RM Parizi, ...
Journal of Systems Architecture 97, 1-7, 2019
A survey on internet of things security: Requirements, challenges, and solutions
H HaddadPajouh, A Dehghantanha, RM Parizi, M Aledhari, H Karimipour
Internet of Things, 100129, 2019
Leveraging machine learning techniques for windows ransomware network traffic detection
OMK Alhawi, J Baldwin, A Dehghantanha
Cyber threat intelligence, 93-106, 2018
A survey on security and privacy of federated learning
V Mothukuri, RM Parizi, S Pouriyeh, Y Huang, A Dehghantanha, ...
Future Generation Computer Systems 115, 619-640, 2021
A survey on malware propagation, analysis, and detection
M Damshenas, A Dehghantanha, R Mahmoud
International Journal of Cyber-Security and Digital Forensics 2 (4), 10-30, 2013
The system can't perform the operation now. Try again later.
Articles 1–20