Journals:

— T Dargahi, A Dehghantanha, PN Bahrami , M Conti, G Bianchi, and L Benedetto 2019, “A cyber-kill-chain based taxonomy of crypto-ransomware features” , Journal of Computer Virology and Hacking Techniques, 2019. (Accepted)

— M Alaeiyan, A Dehghantanha, T Dargahi, M Conti, S Parsa, “A Multi-label Fuzzy Relevance Clustering system for Malware Attack Attribution in the Edge Layer of Cyber Physical Networks”, ACM Transactions on Cyber-Physical Systems, 2019 (Accepted)

— H Karimipour, A Dehghantaha, R Parizi, KKR Choo, H Leung, “A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids”, in IEEE Access, vol. 7, pp. 80778-80788, 2019, doi: 10.1109/ACCESS.2019.2920326 (IF: 4.098)

— PN Bahrami, A Dehghantanha, T Dargahi, R Parizi, KKR Choo, HHS Javadi, “A Cyber Kill Chain based Analysis of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques and Procedures”, Journal of Information Processing Systems (JIPS), 2019 (Accepted) (received JIPS Gold Survey Paper medal in 2019)

— AN Jahromi, S Hashemi, A Dehghantanha, R Parizi, KKR Choo, “An Enhanced Stacked LSTM Method with no Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems”, IEEE Transactions on Emerging Topics in Computational Intelligence, 2019 (Accepted)

— DR McKinnel, T Dargahi, A Dehghantanha, KKR Choo, “A Systematic Literature Review and Meta-Analysis on Artificial Intelligence in Penetration Testing and Vulnerability Assessment”, (Elsevier) Computer & Electrical Engineering, vol. 75, pp. 175-188, May 2019, https://doi.org/10.1016/j.compeleceng.2019.02.022 (IF: 2.189)

— E Modiri, A Azmoodeh, A Dehghantanha, DE Newton, R Parizi, H Karimipour, “Fuzzy Pattern Tree for Edge Malware Detection and Categorization in IoT”, (Elsevier) Journal of System Architecture, vol. 97, pp. 1-7, Aug 2019, https://doi.org/10.1016/j.sysarc.2019.01.017 (IF: 1.159)

— PJ Taylor, T Dargahi, A Dehghantanha, R Parizi, KKR Choo, “A Systematic Literature Review of Blockchain Cyber Security”, (Elsevier) Digtial Communications and Networks journal, 2019, https://DOI.org/10.1016/j.dcan.2019.01.005

— H Darabian, A Dehghantanha, S Hashemi, S Homayoun, and KKR Choo, “An Opcode‐based Technique for Polymorphic Internet of Things Malware Detection”, (Wiley) Cuncurrency and Computation: Pactice and Experience, 2019, https://DOI.org/10.1002/cpe.5173 (IF: 1.114)

— PJ Taylor, H Mwiki, A Dehghantanha, A Akibini, KKR Choo, M Hammoudeh, R Parizi, “Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study”, (Elsevier) Science and Justice, 2019, https://DOI.org/10.1016/j.scijus.2019.01.005 (IF: 1.845)

— M Wani, W Bhat, A Dehghantanha, “Analysis of Anti-forensic Capabilities of B-tree file System (Btrfs)”, Australian Journal of Forensics Sciences, 2019, https://DOI.org/10.1080/00450618.2018.1533038

— S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, KKR Choo, “DRTHIS: Deep Dive into Ransomware Threat Hunting and Intelligence at Fog Layer”, (Elsevier) Journal of Future Generation Computer Systems (FGCS), 2019, https://DOI.org/10.1016/j.future.2018.07.045 (IF: 5.768).

— PN Bahrami, HS Javadi, T Dargahi, A Dehghantanha, KKR Choo, “A Hierarchical Key Pre-Distribution Scheme for Fog Networks”, (Wiley) Journal of Concurrency and Computation: Practice and Experience, 2018, DOI: https://doi.org/10.1002/cpe.4776 (IF: 1.167)

— S Walker-Roberts, M Hammoudeh and A Dehghantanha, “A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure,” in IEEE Access, 2018, DOI: 10.1109/ACCESS.2018.2817560 (IF:3.244)

— H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo, “A Deep Recurrent Neural Network Based Approach for Internet of Things Malware Threat Hunting”, (Elsevier) Journal of Future Generation Computer Systems (FGCS), 2018, DOI: https://DOI.org/10.1016/j.future.2018.03.007 (IF: 3.997)

— A Azmoudeh, A Dehghantanha and KKR Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning”, (IEEE) Transactions on Sustainable Computing, 2018, DOI10.1109/TSUSC.2018.2809665

— M Conti, A Dehghantanha, K Franke, S Watson, “Internet of Things Security and Forensics: Challenges and Opportunities”, (Elsevier) Future Generation Computer Systems Journal, DOI: https://DOI.org/10.1016/j.future.2017.07.060, 2018 (IF: 3.997) (cited: 120+)

— S Newbery, A Dehghantanha, “Torture-free cyberspace–a human right”, (Elsevier) Journal of Computer Fraud & Security, Nov 2017, DOI: https://DOI.org/10.1016/S1361-3723(17)30083-0

— H HaddadPajouh, A Dehghantanha, R Khayami, and KKR Choo, “Intelligent OS X Malware Threat Detection with Code Inspection”, (Springer) Journal of Computer Virology and Hacking Techniques, 2017 – https://DOI.org/10.1007/s11416-017-0307-5.

— Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, “Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence”, (IEEE) Transactions on Emerging Topics in Computing, 2017 – DOI10.1109/TETC.2017.2756908 (IF:3.826).

— G Epiphaniou, P Karadimas, DK Ismail, H Al-Khateeb, A Dehghantanha, and KKR Choo, “Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks”, (IEEE) Internet of Things Journal, 2017 – DOI: http://ieeexplore.ieee.org/document/8070945/ (IF:7.596)

— D Kiwia, A Dehghantanha, KKR Choo, J Slaughter, “A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence”, (Elsevier) Journal of Computational Science, 2017, https://DOI.org/10.1016/j.jocs.2017.10.020 (IF: 1.784)

— YY Teing, A Dehghantanha, KKR Choo, “CloudMe Forensics: A Case of Big-Data Investigation,” (Wiley) Concurrency and Computation: Practice and Experience, http://onlinelibrary.wiley.com/DOI/10.1002/cpe.4277, 2017 (IF:1.133)

— A Azmoodeh, A Dehghantanha, M Conti, KKR Choo, “Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint”, (Springer) Journal of Ambient Intelligence and Humanized Computing, DOI: https://DOI.org/10.1007/s12652-017-0558-5  (IF:1.588 – cited: 50+)

— YY Teing, A Dehghantanha, KKR Choo, Z Muda, and MT Abdullah, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” (IEEE) Transactions on Sustainable Computing, DOI: 10.1109/TSUSC.2017.2687103, 2017.

— N Milosevic, A Dehghantanha, KKR Choo, “Machine learning aided Android malware classification”, (Elsevier) Journal of Computers & Electrical Engineering, 2017, DOI:http://dx.DOI.org/10.1016/j.compeleceng.2017.02.013, (IF:1.084 – cited: 60+)

— T Hasani, J Bojeie, A Dehghantanha, “Investigating the Antecedents to the Adoption of SCRM Technologies by Start-up Companies”, (Elsevier) Journal of Telematics and Informatics, DOI: http://dx.DOI.org/10.1016/j.tele.2016.12.004, (IF:3.398), 2016

J 28. H HaddadPajouh, R Javidan, R Khaymi, A Dehghantanha and KKR Choo, “A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks”, (IEEE) Transactions on Emerging Topics in Computing; DOI10.1109/TETC.2016.2633228), 2016 (IF:3.826)

— YY Teing, A Dehghantanha, KKR Choo, “Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study”, (Elsevier) International Journal of Computers & Electrical Engineering DOI:

http://dx.DOI.org/10.1016/j.compeleceng.2016.08.020, 2016 (IF: 1.570)

— O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo, “Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing”, (EURASIP) Journal of Wireless Communications and Networking  2016:130, 2016, DOI:  https://DOI.org/10.1186/s13638-016-0623-3 (IF:1.529) (won  2019 EURASIP JWCN best paper award – cited: 100+)

— S Watson, A Dehghantanha, “Digital Forensics: The Missing Piece of the Internet of Things Promise”, (Elsevier) Journal of Computer Fraud & Security, 2016, https://DOI.org/10.1016/S1361-3723(15)30045-2 (cited:50+)

— YY Teing, A Dehghantanha, KKR Choo, M Conti, T Dargahi, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study”, (Wiley) Journal of Forensics Sciences (Ranks 2 in Forensics Science) , DOI: 10.1111/1556, 2016, (IF:1.127)

— F Daryabar, A Dehghantanha, and KKR Choo (2016), “Cloud storage forensics: MEGA as a case study”, (tandf) Australian Journal of Forensic Sciences, DOI:10.1080/00450618.2016.1153714, 2016, (IF:0.833)

— YY Teing, A Dehghantanha, KKR Choo, Zaiton Muda, “Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies”, PLOSONE, Vol.11 Issue 3, 2016 (IF:3.234), DOI: 10.1371/journal.pone.0150300 .

— F Daryabar; A Dehghantanha; B Eterovic-Soric, KKR Choo, “Forensic Investigation of OneDrive, Box, GoogleDrive and Dropbox Applications on Android and iOS Devices”, (Taylor & Francis) Australian Journal of Forensic Sciences, Vol.48, Issue 6, pp. 615-643, 2016 (IF:0.833), DOI:10.1080/00450618.2015.1110620;

— M Shariati, A Dehghantanha, KKR Choo, “Sugar Sync Forensics”- (Taylor & Francis) Australian Journal of Forensic Sciences, Vol 48, Issue 1, pp.95-117, 2016 (JCR IF 2014IF:0.583) – DOI:10.1080/00450618.2015.1021379 (IF:0.833)

— M Damshenas, A Dehghantanha, KKR Choo & Ramlan Mahmud, “M0Droid: An Android Behavioural-Based Malware Detection Model”, (Taylor & Francis) Journal of Information Privacy and Security, Volume 11, Issue 3, pp. 141-157, 2015, DOI:10.1080/15536548.2015.1073510

— F Nourozizadeh, A Dehghantanha, KKR Choo, “Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms”, (Taylor & Francis) Australian Journal of Forensics Science, 2014 – DOI:10.1080/00450618.2015.1066854 (IF: 0.704 – cited: 60+) 

Book Chapters:

— PJ Taylor, T Dargahi, A Dehghantanha (2019) Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_11

— R Parizi, A Dehghantanha., KKR Choo, M Hammoudeh, G Epiphaniou (2019) Security in Online Games: Current Implementations and Challenges. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_16

— LS Thiam, T Dargahi, A Dehghantanha (2019) Bibliometric Analysis on the Rise of Cloud Security. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_14

— S Amina, R Vera , T Dargahi, A Dehghantanha (2019) A Bibliometric Analysis of Botnet Detection Techniques. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_15

— YY Tieng, S Homayoun, A Dehghantanha, KKR Choo, R Parizi (2019) Private Cloud Storage Forensics: Seafile as a Case Study. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_5

— S Grooby, T Dargahi, A Dehghantanha (2019) A Bibliometric Analysis of Authentication and Access Control in IoT Devices. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_3

— K Bolouri, A Azmoodeh, A Dehghantanha, M Firouzmand (2019) Internet of Things Camera Identification Algorithm Based on Sensor Pattern Noise Using Color Filter Array and Wavelet Transform. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_9

— R HosseiniNejad, H HaddadPajouh, A Dehghantanha., R Parizi (2019) A Cyber Kill Chain Based Analysis of Remote Access Trojans. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_12

— OMK Alhawi, A Akinbi, A Dehghantanha (2019) Evaluation and Application of Two Fuzzing Approaches for Security Testing of IoT Applications. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_13

— S Grooby, T Dargahi, A Dehghantanha (2019) Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_10

— M Asim, DR McKinnel, A Dehghantanha, R Parizi, M Hammoudeh, G Epiphaniou (2019) Big Data Forensics: Hadoop Distributed File Systems as a Case Study. In: Dehghantanha A., Choo KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham, https://doi.org/10.1007/978-3-030-10543-3_8

— H Mwiki, T Dargahi, A Dehghantanha, KKR Choo (2019), “Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin”,  Critical Infrastructure Security and Resilience. Advanced Sciences and Technologies for Security Applications. Springer, Cham. DOI: https://DOI.org/10.1007/978-3-030-00024-0_12

— M Pandya., S Homayoun, A Dehghantanha (2018) “Forensics Investigation of OpenFlow-Based SDN Platforms”, Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham, DOI: https://doi.org/10.1007/978-3-319-73951-9_14

— S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami (2018),  “BoTShark: A Deep Learning Approach for Botnet Traffic Detection”, Cyber Threat Intelligence, Advances in Information Security, vol 70. Springer, Cham, DOI: https://DOI.org/10.1007/978-3-319-73951-9_7

— M Petraityte, A Dehghantanha, G Epiphaniou (2018), “A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies”, Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham, DOI: https://DOI.org/10.1007/978-3-319-73951-9_11

— M Conti, T Dargahi, A Dehghantanha (2018), “Cyber Threat Intelligence: Challenges and Opportunities”, Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham, DOI: https://DOI.org/10.1007/978-3-319-73951-9_1

— H Haughey, G Epiphaniou, H Al-Khateeb, A Dehghantanha (2018), “Adaptive Traffic Fingerprinting for Darknet Threat Intelligence”, Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham, DOI: https://DOI.org/10.1007/978-3-319-73951-9_10

— A Shalaginov, S Banin, A Dehghantanha, K Franke (2018), “Machine Learning Aided Static Malware Analysis: A Survey and Tutorial”, Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham, https://DOI.org/10.1007/978-3-319-73951-9_2

— J Gill, I Okere, H HaddadPajouh, A Dehghantanha (2018), “Mobile Forensics: A Bibliometric Analysis”, Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham, DOI: https://DOI.org/10.1007/978-3-319-73951-9_15

— J Baldwin, A Dehghantanha (2018), “Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware”, Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham, DOI: https://DOI.org/10.1007/978-3-319-73951-9_6

— OMK Alhawi, J Baldwin, A Dehghantanha (2018), “Leveraging Machine Learning Techniques r Windows Ransomware Network Traffic Detection”, Cyber Threat Intelligence. Advances in Information Security, vol 70. Springer, Cham, DOI: https://DOI.org/10.1007/978-3-319-73951-9_5

— YY Teing, A Dehghantanha, KKR Choo, Z Muda (2016), “Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine”, Pages 21-40, Chapter 3, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications

— MN Yusoff, A Dehghantanha,  M Ramlan (2016), “Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies” Pages 41-62, Chapter 4, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications

— MN Yusoff, A Dehghantanha, M Ramlan (2016), “Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies” Pages 63-78, Chapter 5, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications

— M Petraityte, A Dehghantanha, G Epiphaniou (2016), “Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors” Pages 79-89, Chapter 6, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications

— L Christopher, KKR Choo, A Dehghantanha (2016), “Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model”, Pages 111-130, Chapter 8, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications

— SH Mohtasebi, A Dehghantanha, KKR Choo (2016), “Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud”, Pages 205-246, Chapter 13, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications

— M Shariati, A Dehghantanha, KKR Choo (2016), “Ubuntu One Investigation: Detecting Evidences on Client Machines”, Pages 429-446, Chapter 19, (Elsevier) the Cloud Security Eco-System – DOI:10.1016/B978-0-12-801595-7.00019-7.

Conference Papers:


— R Parizi, L Guo, Y Bian, A Dehghantanha and KKR Choo, “CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction,” 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Washington, DC, USA, 2018, pp. 106-111. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8648701&isnumber=8648665

— R Parizi, A Dehghantanha, “On the Understanding of Gamification in Blockchain Systems”, 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 6-8 Aug 2018, Barcelona, Spain, DOI: https://DOI.org/10.1109/W-FiCloud.2018.00041

— R Parizi, A Amritraj, A Dehghantanha, “Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security”. In: Chen S., Wang H., Zhang LJ. (eds) Blockchain – ICBC 2018. ICBC 2018. Lecture Notes in Computer Science, vol 10974. Springer, Cham, https://DOI.org/10.1007/978-3-319-94478-4_6

— AA Mohallel, JM Bass and A Dehghantaha, “Experimenting with docker: Linux container and base OS attack surfaces,” 2016 International Conference on Information Society (i-Society), Dublin, Ireland, 2016, pp. 17-21. DOI: https://DOI.org/10.1109/i-Society.2016.7854163

— YY Teing , A Dehghantanha, KKR Choo, Z Muda, MT Abdullah, Wee-Chiat Chai, “A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts”, pp 342-357, Proceedings of International Workshops on TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, (SpaCCS 2016) Zhangjiajie, China, November 16-18, 2016, DOI: https://link.springer.com/chapter/10.1007/978-3-319-49145-5_34

— B Blakeley, C Cooney, A Dehghantanha, R Aspin, “Cloud Storage Forensic: hubiC as a Case-Study”, proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom2015), pp.536-541, 30Nov-3Dec 2015, Vancouver, Canada. DOI: https://DOI.org/10.1109/CloudCom.2015.24

— M Hopkins, A Dehghantanha, “Exploit Kits: The production line of the Cybercrime Economy?”, the Second International Conference on Information Security and Cyber Forensics (InfoSec2015), pp. 23-27, 15-17 Nov 2015, Cape Town, South Africa. DOI: https://DOI.org/10.1109/InfoSec.2015.7435501

 A Dehghantanha, K Franke, “Privacy Respecting Digital Investigation,” pp. 129 – 138, Twelfth Annual International Conference on Privacy, Security and Trust (PST), 23-24 July 2014, Toronto, ON, Canada, DOI: https://DOI.org/10.1109/PST.2014.6890932

Books:

— A Dehghantanha, KKR Choo, “Handbook of Big Data and IoT Security”, 1st Edition Springer, 2019, (https://www.springer.com/la/book/9783030105426)

— A Dehghantanha, M Conti, T Dargahi, “Cyber Threat Intelligence”, 1st Edition Springer, 2018 (http://www.springer.com/us/book/9783319739502).

— KKR Choo, A Dehghantanha, “Contemporary Digital Forensic Investigations of Cloud and Mobile Applications”, 1st Edition, Elsevier, 2016 (https://www.elsevier.com/books/contemporary-digital-forensic-investigations-of-cloud-and-mobile-applications/choo/978-0-12-805303-4)

Technical Reports:

— A Dehghantanha, KKR Choo, Andrew Young, “Machine Learning Aided Ransomware Detection Using Process Power Consumption Patterns” InfoSecurity Magazine, 6th Oct 2017 – 2 pages- https://www.infosecurity-magazine.com/next-gen-infosec/machine-learning-ransomware/

— A Dehghantanha, “Investigation of BitTorrent Sync (v.2.0) as a P2P Cloud”, SANS Internet Storm Centre Diary, 26 Jun 2017 –  12 pages https://isc.sans.edu/forums/diary/Investigation+of+BitTorrent+Sync+v20+as+a+P2P+Cloud+Part+1/22554

— A Dehghantanha, “The Cybercrime Business—Cybercrime Entrepreneurs”, The Nexus, an ISACA journal, 10th Apr 2017. 2 pages, http://www.isaca.org/cyber/cyber-security-articles/Pages/the-cybercrime-business-cybercrime-entrepreneurs.aspx