Tooska Dargahi
Tooska Dargahi
Verified email at salford.ac.uk - Homepage
TitleCited byYear
A survey on the security of stateful SDN data planes
T Dargahi, A Caponi, M Ambrosin, G Bianchi, M Conti
IEEE Communications Surveys & Tutorials 19 (3), 1701-1725, 2017
742017
On the Feasibility of Attribute-Based Encryption on Smartphone Devices
M Ambrosin, M Conti, T Dargahi
MobiSys'15 (IoTSys'15 Workshop), 49-54, 2015
642015
On the feasibility of attribute-based encryption on internet of things devices
M Ambrosin, A Anzanpour, M Conti, T Dargahi, SR Moosavi, AM Rahmani, ...
IEEE Micro 36 (6), 25-35, 2016
572016
Application‐specific hybrid symmetric design of key pre‐distribution for wireless sensor networks
T Dargahi, H H. S. Javadi, M Hosseinzadeh
Security and Communications Networks 8 (8), 1561-1574, 2015
44*2015
A systematic literature review of blockchain cyber security
PJ Taylor, T Dargahi, A Dehghantanha, RM Parizi, KKR Choo
Digital Communications and Networks, 2019
272019
Forensic investigation of cooperative storage cloud service: Symform as a case study
YY Teing, A Dehghantanha, KKR Choo, T Dargahi, M Conti
Journal of forensic sciences 62 (3), 641-654, 2017
222017
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs
T Dargahi, M Ambrosin, M Conti, N Asokan
Computer Communications 85, 1-13, 2016
132016
Complete edge function onloading for effective backend-driven cyber foraging
F Esposito, A Cvetkovski, T Dargahi, J Pan
2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017
82017
Cyber threat intelligence: challenges and opportunities
M Conti, T Dargahi, A Dehghantanha
Cyber Threat Intelligence, 1-6, 2018
72018
Forensics Analysis of Android Mobile VoIP Apps
T Dargahi, A Dehghantanha, M Conti
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2016
72016
WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures
C Pisa, A Caponi, T Dargahi, G Bianchi, N Blefari-Melazzi
Proceedings of the 8th ACM International Workshop on Hot Topics in Planet …, 2016
72016
SP-AODV: A semi-proactive AODV routing protocol for wireless networks
T Dargahi, AM Rahmani, A Khademzadeh
International Conference on Advanced Computer Theory and Engineering (ICACTE …, 2008
62008
A hybrid of reactive and proactive approaches based on neighbors' conditions of nodes for mobile ad hoc networks
T Dargahi, AM Rahmani, A Khademzadeh
International Conference on Information and Automation for Sustainability …, 2008
52008
Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies
A Dehghantanha, T Dargahi
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2016
42016
Cyber threat intelligence
A Dehghantanha, M Conti, T Dargahi
Springer International Publishing, 2018
32018
MDSClone: multidimensional scaling aided clone detection in Internet of Things
PY Lee, CM Yu, T Dargahi, M Conti, G Bianchi
IEEE Transactions on Information Forensics and Security 13 (8), 2031-2046, 2018
32018
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study
T Dargahi, A Dehghantanha, M Conti
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2016
32016
A hierarchical key pre‐distribution scheme for fog networks
PN Bahrami, HHS Javadi, T Dargahi, A Dehghantanha, KKR Choo
Concurrency and Computation: Practice and Experience 31 (22), e4776, 2019
22019
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment
DR McKinnel, T Dargahi, A Dehghantanha, KKR Choo
Computers & Electrical Engineering 75, 175-188, 2019
22019
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks.
T Dargahi, HHS Javadi, H Shafiei, P Mousavi
IJHPCN 11 (2), 117-128, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20