Hamed HaddadPajouh
Hamed HaddadPajouh
Verified email at uoguelph.ca - Homepage
TitleCited byYear
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, D Ali, KKR Choo
IEEE Transactions on Emerging Topics in Computing, 2016
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
Two-tier network anomaly detection model: a machine learning approach
HH Pajouh, GH Dastghaibyfard, S Hashemi
Journal of Intelligent Information Systems 48 (1), 61-74, 2017
Intelligent OS X malware threat detection with code inspection
HH Pajouh, A Dehghantanha, R Khayami, KKR Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 213-223, 2018
Mobile forensics: A bibliometric analysis
J Gill, I Okere, H HaddadPajouh, A Dehghantanha
Cyber Threat Intelligence, 297-310, 2018
A cyber kill chain based analysis of remote access trojans
R HosseiniNejad, H HaddadPajouh, A Dehghantanha, RM Parizi
Handbook of Big Data and IoT Security, 273-299, 2019
An Investigation on the Use of Expert Systems in Developing Web-Based Fitness Exercise Plan Generator
A Darejeh, HH Pajouh, A Darejeh
International Review on Computers and Software, 2014
A survey on internet of things security: Requirements, challenges, and solutions
H HaddadPajouh, A Dehghantanha, RM Parizi, M Aledhari, H Karimipour
Internet of Things, 100129, 2019
The system can't perform the operation now. Try again later.
Articles 1–8