Ali Dehghantanha
Ali Dehghantanha
Canada Research Chair in Cybersecurity & Threat Intelligence (Tier2) - University of Guelph
Verified email at uoguelph.ca - Homepage
Title
Cited by
Cited by
Year
Internet of Things security and forensics: Challenges and opportunities
M Conti, A Dehghantanha, K Franke, S Watson
Future Generation Computer Systems 78, 544-546, 2018
3752018
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, A Dehghantanha, KKR Choo
IEEE Transactions on Emerging Topics in Computing 7 (2), 314-323, 2016
2252016
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo
EURASIP Journal on Wireless Communications and Networking 2016 (1), 1-10, 2016
2192016
Machine learning aided Android malware classification
N Milosevic, A Dehghantanha, KKR Choo
Computers & Electrical Engineering 61, 266-274, 2017
1992017
A deep recurrent neural network based approach for internet of things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
1692018
Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning
A Azmoodeh, A Dehghantanha, KKR Choo
IEEE transactions on sustainable computing 4 (1), 88-95, 2018
1682018
A systematic literature review of blockchain cyber security
PJ Taylor, T Dargahi, A Dehghantanha, RM Parizi, KKR Choo
Digital Communications and Networks 6 (2), 147-156, 2020
1652020
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KKR Choo
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1141-1152, 2018
1592018
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017
972017
Forensics investigation challenges in cloud computing environments
M Damshenas, A Dehghantanha, R Mahmoud, S bin Shamsuddin
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
952012
Digital forensics: the missing piece of the internet of things promise
S Watson, A Dehghantanha
Computer Fraud & Security 2016 (6), 5-8, 2016
932016
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
F Norouzizadeh Dezfouli, A Dehghantanha, B Eterovic-Soric, KKR Choo
Australian journal of forensic sciences 48 (4), 469-488, 2016
892016
A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids
H Karimipour, A Dehghantanha, RM Parizi, KKR Choo, H Leung
IEEE Access 7, 80778-80788, 2019
862019
Empirical vulnerability analysis of automated smart contracts security testing on blockchains
RM Parizi, A Dehghantanha, KKR Choo, A Singh
arXiv preprint arXiv:1809.02702, 2018
832018
Smart contract programming languages on blockchains: An empirical evaluation of usability and security
RM Parizi, A Dehghantanha
International Conference on Blockchain, 75-91, 2018
822018
A survey on malware propagation, analysis, and detection
M Damshenas, A Dehghantanha, R Mahmoud
International Journal of Cyber-Security and Digital Forensics 2 (4), 10-30, 2013
732013
M0droid: An android behavioral-based malware detection model
M Damshenas, A Dehghantanha, KKR Choo, R Mahmud
Journal of Information Privacy and Security 11 (3), 141-157, 2015
712015
Fuzzy pattern tree for edge malware detection and categorization in IoT
EM Dovom, A Azmoodeh, A Dehghantanha, DE Newton, RM Parizi, ...
Journal of Systems Architecture 97, 1-7, 2019
672019
A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure
S Walker-Roberts, M Hammoudeh, A Dehghantanha
IEEE Access 6, 25167-25177, 2018
652018
Leveraging machine learning techniques for windows ransomware network traffic detection
OMK Alhawi, J Baldwin, A Dehghantanha
Cyber Threat Intelligence, 93-106, 2018
642018
The system can't perform the operation now. Try again later.
Articles 1–20