2019

Homayoun, Sajad; Dehghantanha, Ali; Ahmadzadeh, Marzieh; Hashemi, Sattar; Khayami, Raouf; Choo, Kim-Kwang Raymond; Newton, David Ellis

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer Journal Article Forthcoming

Future Generation Computer Systems, 90 , pp. 11, Forthcoming.

Abstract | Links | BibTeX | Tags:

2018

HaddadPajouh, Hamed; Dehghantanha, Ali; Khayami, Raouf; Choo, Kim-Kwang Raymond

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting Journal Article

Future Generation Computer Systems, 85 , pp. 88–96, 2018.

Links | BibTeX | Tags:

Walker-Roberts, Steven; Hammoudeh, Mohammad; Dehghantanha, Ali

A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure Journal Article

IEEE Access, 6 , pp. 25167–25177, 2018.

Links | BibTeX | Tags:

Dehghantanha, Ali; Conti, Mauro; Dargahi, Tooska (Ed.)

Cyber Threat Intelligence Book

Springer International Publishing, 2018.

Links | BibTeX | Tags:

Azmoodeh, Amin; Dehghantanha, Ali; Choo, Kim-Kwang Raymond

Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning Journal Article

IEEE Transactions on Sustainable Computing, pp. 1–1, 2018.

Links | BibTeX | Tags:

2017

Newbery, Samantha; Dehghantanha, Ali

Torture-free cyberspace – a human right Journal Article

Computer Fraud & Security, 2017 (11), pp. 14–19, 2017.

Links | BibTeX | Tags:

Kiwia, Dennis; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Slaughter, Jim

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence Journal Article

Journal of Computational Science, 2017.

Links | BibTeX | Tags:

Azmoodeh, Amin; Dehghantanha, Ali; Conti, Mauro; Choo, Kim-Kwang Raymond

Detecting crypto-ransomware in IoT networks based on energy consumption footprint Journal Article

Journal of Ambient Intelligence and Humanized Computing, 2017.

Links | BibTeX | Tags:

Hasani, Tahereh; Bojei, Jamil; Dehghantanha, Ali

Investigating the antecedents to the adoption of SCRM technologies by start-up companies Journal Article

Telematics and Informatics, 34 (5), pp. 655–675, 2017.

Links | BibTeX | Tags:

Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond

CloudMe forensics: A case of big data forensic investigation Journal Article

Concurrency and Computation: Practice and Experience, 30 (5), pp. e4277, 2017.

Links | BibTeX | Tags:

Milosevic, Nikola; Dehghantanha, Ali; Choo, Kim-Kwang Raymond

Machine learning aided Android malware classification Journal Article

Computers & Electrical Engineering, 61 , pp. 266–274, 2017.

Links | BibTeX | Tags:

Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Yang, Laurence T

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study Journal Article

Computers & Electrical Engineering, 58 , pp. 350–363, 2017.

Links | BibTeX | Tags:

Homayoun, Sajad; Dehghantanha, Ali; Ahmadzadeh, Marzieh; Hashemi, Sattar; Khayami, Raouf

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence Journal Article Forthcoming

IEEE Transactions on Emerging Topics in Computing, pp. 1–1, Forthcoming.

Abstract | Links | BibTeX | Tags:

Epiphaniou, Gregory; Karadimas, Petros; Ismail, Dhouha Kbaier Ben; Al-Khateeb, Haider; Dehghantanha, Ali; Choo, Kim-Kwang Raymond

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks Journal Article

IEEE Internet of Things Journal, pp. 1–1, 2017.

Links | BibTeX | Tags:

Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Abdullah, Mohd T; Muda, Zaiton

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study Journal Article

IEEE Transactions on Sustainable Computing, pp. 1–1, 2017.

Links | BibTeX | Tags:

2016

Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Dargahi, Tooska; Conti, Mauro

Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study Journal Article

Journal of Forensic Sciences, 62 (3), pp. 641–654, 2016.

Links | BibTeX | Tags:

Watson, Steve; Dehghantanha, Ali

Digital forensics: the missing piece of the Internet of Things promise Journal Article

Computer Fraud & Security, 2016 (6), pp. 5–8, 2016.

Links | BibTeX | Tags:

Osanaiye, Opeyemi; Cai, Haibin; Choo, Kim-Kwang Raymond; Dehghantanha, Ali; Xu, Zheng; Dlodlo, Mqhele

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing Journal Article

EURASIP Journal on Wireless Communications and Networking, 2016 (1), 2016.

Links | BibTeX | Tags:

Daryabar, Farid; Dehghantanha, Ali; Choo, Kim-Kwang Raymond

Cloud storage forensics: MEGA as a case study Journal Article

Australian Journal of Forensic Sciences, 49 (3), pp. 344–357, 2016.

Links | BibTeX | Tags:

Yang, Teing Yee; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Muda, Zaiton

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies Journal Article

PLOS ONE, 11 (3), pp. e0150300, 2016.

Links | BibTeX | Tags:

Daryabar, Farid; Dehghantanha, Ali; Eterovic-Soric, Brett; Choo, Kim-Kwang Raymond

Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices Journal Article

Australian Journal of Forensic Sciences, 48 (6), pp. 615–642, 2016.

Links | BibTeX | Tags:

Dehghantanha, Kim-Kwang Raymond Choo Ali (Ed.)

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications Book

Elsevier, 2016.

Links | BibTeX | Tags:

HaddadPajouh, Hamed; Javidan, Reza; Khayami, Raouf; Dehghantanha, Ali; Choo, Kim-Kwang Raymond

A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks Journal Article

IEEE Transactions on Emerging Topics in Computing, pp. 1–1, 2016.

Links | BibTeX | Tags:

2015

Dezfouli, Farhood Norouzizadeh; Dehghantanha, Ali; Eterovic-Soric, Brett; Choo, Kim-Kwang Raymond

Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google$mathplus$ artefacts on Android and iOS platforms Journal Article

Australian Journal of Forensic Sciences, 48 (4), pp. 469–488, 2015.

Links | BibTeX | Tags:

Damshenas, Mohsen; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Mahmud, Ramlan

M0Droid: An Android Behavioral-Based Malware Detection Model Journal Article

Journal of Information Privacy and Security, 11 (3), pp. 141–157, 2015.

Links | BibTeX | Tags:

Shariati, Mohammad; Dehghantanha, Ali; Choo, Kim-Kwang Raymond

SugarSync forensic analysis Journal Article

Australian Journal of Forensic Sciences, 48 (1), pp. 95–117, 2015.

Links | BibTeX | Tags:

2013

Shaerpour, Kaveh; Dehghantanha, Ali; Mahmod, Ramlan

Trends in Android Malware Detection Journal Article

Journal of Digital Forensics, Security and Law, 2013.

Links | BibTeX | Tags: