Ali Dehghantanha
Ali Dehghantanha
Director - Cyber Science Lab, University of Guelph- ON- Canada; EU Marie Curie Fellow Alumni
Verified email at - Homepage
TitleCited byYear
Internet of Things security and forensics: Challenges and opportunities
M Conti, A Dehghantanha, K Franke, S Watson
Future Generation Computer Systems 78, 544-546, 2018
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo
EURASIP Journal on Wireless Communications and Networking 2016 (1), 130, 2016
Machine learning aided Android malware classification
N Milosevic, A Dehghantanha, KKR Choo
Computers & Electrical Engineering 61, 266-274, 2017
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, D Ali, KKR Choo
IEEE Transactions on Emerging Topics in Computing, 2016
Forensics investigation challenges in cloud computing environments
M Damshenas, A Dehghantanha, R Mahmoud, S bin Shamsuddin
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KKR Choo
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1141-1152, 2018
Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
F Norouzizadeh Dezfouli, A Dehghantanha, B Eterovic-Soric, KKR Choo
Australian journal of forensic sciences 48 (4), 469-488, 2016
Digital forensics: the missing piece of the Internet of Things promise
S Watson, A Dehghantanha
Computer Fraud & Security 2016 (6), 5-8, 2016
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning
A Azmoodeh, A Dehghantanha, KKR Choo
IEEE Transactions on Sustainable Computing 4 (1), 88-95, 2018
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing, 2017
M0droid: An android behavioral-based malware detection model
M Damshenas, A Dehghantanha, KKR Choo, R Mahmud
Journal of Information Privacy and Security 11 (3), 141-157, 2015
A survey on malware propagation, analysis, and detection
M Damshenas, A Dehghantanha, R Mahmoud
International Journal of Cyber-Security and Digital Forensics 2 (4), 10-30, 2013
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
YY Teing, A Dehghantanha, KKR Choo, LT Yang
Computers & Electrical Engineering 58, 350-363, 2017
A survey about impacts of cloud computing on digital forensics
F Daryabar, A Dehghantanha, NI Udzir, N Sani, S Shamsuddin, ...
International Journal of Cyber-Security and Digital Forensics (IJCSDF), The …, 2013
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
F Daryabar, A Dehghantanha, B Eterovic-Soric, KKR Choo
Australian Journal of Forensic Sciences 48 (6), 615-642, 2016
Digital forensic trends and future
FN Dezfoli, A Dehghantanha, R Mahmoud, NFBM Sani, F Daryabar
International Journal of Cyber-Security and Digital Forensics 2 (2), 48-77, 2013
A survey on privacy issues in digital forensics
A Aminnezhad, A Dehghantanha, MT Abdullah
International Journal of Cyber-Security and Digital Forensics 1 (4), 311-324, 2012
Windows instant messaging app forensics: Facebook and Skype as case studies
TY Yang, A Dehghantanha, KKR Choo, Z Muda
PloS one 11 (3), 2016
Smartphone forensics: a case study with Nokia E5-00 mobile phone
S Mohtasebi, A Dehghantanha, HG Broujerdi
International Journal of Digital Information and Wireless Communications …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20