Amin Azmoodeh
Amin Azmoodeh
PhD Student of Computational Science, University of Guelph
Verified email at uoguelph.ca
Title
Cited by
Cited by
Year
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KK Raymond Choo
Journal of Ambient Intelligence and Humanized Computing, 2017
1132017
Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning
A Azmoodeh, A Dehghantanha, KKR Choo
IEEE Transactions on Sustainable Computing, 2018
1042018
Fuzzy pattern tree for edge malware detection and categorization in IoT
EM Dovom, A Azmoodeh, A Dehghantanha, DE Newton, RM Parizi, ...
Journal of Systems Architecture 97, 1-7, 2019
462019
Graph embedding as a new approach for unknown malware detection
H Hashemi, A Azmoodeh, A Hamzeh, S Hashemi
Journal of Computer Virology, 1-14, 2016
292016
Big data and internet of things security and forensics: challenges and opportunities
A Azmoodeh, A Dehghantanha, KKR Choo
Handbook of Big Data and IoT Security, 1-4, 2019
122019
Fuzzy pattern tree for edge attack detection and categorization
E Modiri, A Azmoodeh, A Dehghantanha, H Karimipour
J. Syst. Archit 9, 1-15, 2018
72018
Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform
K Bolouri, A Azmoodeh, A Dehghantanha, M Firouzmand
Handbook of Big Data and IoT Security, 211-223, 2019
52019
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
H Darabian, A Dehghantanha, S Hashemi, M Taheri, A Azmoodeh, ...
World Wide Web 23 (2), 1241-1260, 2020
32020
CyberPDF: smart and secure coordinate-based automated health PDF data batch extraction
RM Parizi, L Guo, Y Bian, A Azmoodeh, A Dehghantanha, KKR Choo
2018 IEEE/ACM International Conference on Connected Health: Applications …, 2018
32018
A hybrid deep generative local metric learning method for intrusion detection
M Saharkhizan, A Azmoodeh, H HaddadPajouh, A Dehghantanha, ...
Handbook of Big Data Privacy, 343-357, 2020
22020
An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic
M Saharkhizan, A Azmoodeh, A Dehghantanha, KKR Choo, RM Parizi
IEEE Internet of Things Journal, 2020
12020
Privacy preserving abnormality detection: a deep learning approach
W Han, A Azmoodeh, H Karimipour, S Yang
Handbook of Big Data Privacy, 285-303, 2020
12020
Active spectral botnet detection based on eigenvalue weighting
A Azmoodeh, A Dehghantanha, RM Parizi, S Hashemi, B Gharabaghi, ...
Handbook of Big Data Privacy, 385-397, 2020
12020
To boost graph clustering based on power iteration by removing outliers
A Azmoodeh, S Hashemi
Proceedings of the First International Conference on Advanced Data and …, 2014
12014
MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution
H Haddadpajouh, A Azmoodeh, A Dehghantanaha, RM Parizi
IEEE Access, 2020
2020
RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features
MM BehradFar, H HaddadPajouh, A Dehghantanha, A Azmoodeh, ...
Handbook of Big Data Privacy, 371-383, 2020
2020
Big Data and Privacy: Challenges and Opportunities
A Azmoodeh, A Dehghantanha
Handbook of Big Data Privacy, 1-5, 2020
2020
Blockchain in Cybersecurity Realm: An Overview
RM Parizi, A Dehghantanha, A Azmoodeh, KKR Choo
Blockchain Cybersecurity, Trust and Privacy, 1-5, 2020
2020
2019 Index IEEE Transactions on Sustainable Computing Vol. 4
MT Abdullah, I Ahmad, A Azmoodeh
The system can't perform the operation now. Try again later.
Articles 1–19