Skip to main content

previous disabled Page of 4
and
  1. Article

    Evaluating the adoption of cybersecurity and its influence on organizational performance

    Cyberattacks negatively impact the performance of enterprises all around the globe. While organizations invest more in cybersecurity to avoid cyberattacks, studies on the factors affecting their overall cybers...

    Tahereh Hasani, Norman O’Reilly, Ali Dehghantanha, Davar Rezania in SN Business & Economics (2023)

  2. No Access

    Chapter

    Big Data Analytics and Forensics: An Overview

    Advances in consumer technologies such as Internet of Things (IoT) devices, communication technologies (e.g., 5G), and digitalization of our society reinforce the importance of designing cutting-edge big data ...

    Hossein Mohammadi Rouzbahani in Handbook of Big Data Analytics and Forensi… (2022)

  3. No Access

    Chapter

    IoT Privacy, Security and Forensics Challenges: An Unmanned Aerial Vehicle (UAV) Case Study

    Continuing advances in technologies such as sensors, automatic identification and tracking, embedded computing, wireless communications, broadband Internet access and distributed services have contributed to t...

    Isis Diaz Linares, Angelife Pardo in Handbook of Big Data Analytics and Forensi… (2022)

  4. No Access

    Book

  5. No Access

    Chapter

    A Recurrent Attention Model for Cyber Attack Classification

    The widespread integration of contemporary computer systems in vast regions of technological landscape has called for an emphasis on data security. Detecting polymorphic malware is an extremely difficult task,...

    Naseem Alsadi, Hadis Karimipour in AI-Enabled Threat Detection and Security A… (2021)

  6. No Access

    Chapter

    Deep Representation Learning for Cyber-Attack Detection in Industrial IoT

    Industrial Control System (ICSs), one type of Operational Technology (OT), plays an essential role in monitoring and controlling critical infrastructures such as power plants, smart grids, oil and gas industri...

    Amir Namavar Jahromi, Hadis Karimipour in AI-Enabled Threat Detection and Security A… (2021)

  7. No Access

    Article

    AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things

    With the increasing use of the Internet of things (IoT) in diverse domains, security concerns and IoT threats are constantly rising. The computational and memory limitations of IoT devices have resulted in eme...

    Hamed HaddadPajouh, Raouf Khayami, Ali Dehghantanha in Neural Computing and Applications (2020)

  8. No Access

    Article

    Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis

    Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim’s CPU or GPU resources with the aim of generating cryptocurrency. In this paper...

    Hamid Darabian, Sajad Homayounoot, Ali Dehghantanha in Journal of Grid Computing (2020)

  9. Article

    Open Access

    Threats on the horizon: understanding security threats in the era of cyber-physical systems

    Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made possible by higher integration of physical and digital elements. In today’s pervasive cyber-physical systems, co...

    Steven Walker-Roberts, Mohammad Hammoudeh, Omar Aldabbas in The Journal of Supercomputing (2020)

  10. No Access

    Article

    A multiview learning method for malware threat hunting: windows, IoT and android as case studies

    Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes, and API calls, to distinguish malwa...

    Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Mohammad Taheri in World Wide Web (2020)

  11. No Access

    Book

  12. No Access

    Chapter

    Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach

    According to recent reports from security repositories, malware caused global resources to sustain losses equal to 11.7 million dollars during the last year. The expansion in the tendencies of the profiteers t...

    Mohammad Nassiri, Hamed HaddadPajouh, Ali Dehghantanha in Handbook of Big Data Privacy (2020)

  13. No Access

    Chapter

    A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence

    Blockchain and artificial intelligence (AI) have gain the most research attention during recent years. Blockchain is a distributed ledger of trustworthy digital records shared by a network of participants. Blo...

    Ala Ekramifard, Haleh Amintoosi in Blockchain Cybersecurity, Trust and Privacy (2020)

  14. No Access

    Chapter

    Active Spectral Botnet Detection Based on Eigenvalue Weighting

    Botnets are a distributed network of infected nodes captured by cyber-criminals to design and implement a wide-range of cyber attacks. Graph clustering is a significant trend in machine learning that aims to g...

    Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi in Handbook of Big Data Privacy (2020)

  15. No Access

    Chapter

    Immutable and Secure IP Address Protection Using Blockchain

    IP addresses can be passed on to new recipients even with a damaged reputation score. It takes a lot of effort to defend a network against storing IP address data using current required practices. A blockchain...

    Kelly Click, Amritraj Singh, Reza M. Parizi in Blockchain Cybersecurity, Trust and Privacy (2020)

  16. No Access

    Chapter

    A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection

    The Internet of Things is dramatically changing the face of our modern world. A number of significant organizations are leveraging this onset of IoT to enhance the quality and scope of their digital services. ...

    William Peters, Ali Dehghantanha, Reza M. Parizi in Handbook of Big Data Privacy (2020)

  17. No Access

    Chapter

    Anomaly Detection in Cyber-Physical Systems Using Machine Learning

    Cyber-Physical Systems (CPS) are characterized by a wide range of complex multi-tasking components with close interaction that leads to integrating cyber sections into the physical world. Considering the signi...

    Hossein Mohammadi Rouzbahani, Hadis Karimipour in Handbook of Big Data Privacy (2020)

  18. No Access

    Chapter

    Blockchain in Cybersecurity Realm: An Overview

    Cybersecurity is a pressing need for governments, businesses, and individuals, which is compounded by the fast-pace technological changes and changing cyberthreat landscape. A large number of solutions have be...

    Reza M. Parizi, Ali Dehghantanha in Blockchain Cybersecurity, Trust and Privacy (2020)

  19. No Access

    Chapter

    A Comparison Between Different Machine Learning Models for IoT Malware Detection

    The rapid expansion of IoT devices and their use in business and critical infrastructure has made them vulnerable to threats from hackers and malwares. These malwares pose a serious threat to the availability ...

    Sanaz Nakhodchi, Aaruni Upadhyay, Ali Dehghantanha in Security of Cyber-Physical Systems (2020)

  20. No Access

    Chapter

    Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis

    By using IoT in agriculture which is used for remote monitoring and automation bring a new concern about security and privacy, due to facing huge scale of data in its environment. Most studies aim to present n...

    Sanaz Nakhodchi, Ali Dehghantanha, Hadis Karimipour in Handbook of Big Data Privacy (2020)

previous disabled Page of 4