Publications

2019

— T Dargahi, A Dehghantanha, PN Bahrami , M Conti, G Bianchi, and L Benedetto 2019, “A cyber-kill-chain based taxonomy of crypto-ransomware features” , Journal of Computer Virology and Hacking Techniques, 2019.

— M Alaeiyan, A Dehghantanha, T Dargahi, M Conti, S Parsa, “A Multi-label Fuzzy Relevance Clustering system for Malware Attack Attribution in the Edge Layer of Cyber Physical Networks”, ACM Transactions on Cyber-Physical Systems, 2019 (Accepted)

— H Karimipour, A Dehghantaha, R Parizi, KKR Choo, H Leung, “A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids”, in IEEE Access, vol. 7, pp. 80778-80788, 2019, doi: 10.1109/ACCESS.2019.2920326 (IF: 4.098)

— PN Bahrami, A Dehghantanha, T Dargahi, R Parizi, KKR Choo, HHS Javadi, “A Cyber Kill Chain based Analysis of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques and Procedures”, Journal of Information Processing Systems (JIPS), 2019 (Accepted) (received JIPS Gold Survey Paper medal in 2019)

— AN Jahromi, S Hashemi, A Dehghantanha, R Parizi, KKR Choo, “An Enhanced Stacked LSTM Method with no Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems”, IEEE Transactions on Emerging Topics in Computational Intelligence, 2019 (Accepted)

— DR McKinnel, T Dargahi, A Dehghantanha, KKR Choo, “A Systematic Literature Review and Meta-Analysis on Artificial Intelligence in Penetration Testing and Vulnerability Assessment”, (Elsevier) Computer & Electrical Engineering, vol. 75, pp. 175-188, May 2019, https://doi.org/10.1016/j.compeleceng.2019.02.022 (IF: 2.189)

— E Modiri, A Azmoodeh, A Dehghantanha, DE Newton, R Parizi, H Karimipour, “Fuzzy Pattern Tree for Edge Malware Detection and Categorization in IoT”, (Elsevier) Journal of System Architecture, vol. 97, pp. 1-7, Aug 2019, https://doi.org/10.1016/j.sysarc.2019.01.017 (IF: 1.159)

— PJ Taylor, T Dargahi, A Dehghantanha, R Parizi, KKR Choo, “A Systematic Literature Review of Blockchain Cyber Security”, (Elsevier) Digtial Communications and Networks journal, 2019, https://DOI.org/10.1016/j.dcan.2019.01.005

— H Darabian, A Dehghantanha, S Hashemi, S Homayoun, and KKR Choo, “An Opcode‐based Technique for Polymorphic Internet of Things Malware Detection”, (Wiley) Cuncurrency and Computation: Pactice and Experience, 2019, https://DOI.org/10.1002/cpe.5173 (IF: 1.114)

— PJ Taylor, H Mwiki, A Dehghantanha, A Akibini, KKR Choo, M Hammoudeh, R Parizi, “Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study”, (Elsevier) Science and Justice, 2019, https://DOI.org/10.1016/j.scijus.2019.01.005 (IF: 1.845)

— M Wani, W Bhat, A Dehghantanha, “Analysis of Anti-forensic Capabilities of B-tree file System (Btrfs)”, Australian Journal of Forensics Sciences, 2019, https://DOI.org/10.1080/00450618.2018.1533038

— S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, KKR Choo, “DRTHIS: Deep Dive into Ransomware Threat Hunting and Intelligence at Fog Layer”, (Elsevier) Journal of Future Generation Computer Systems (FGCS), 2019, https://DOI.org/10.1016/j.future.2018.07.045 (IF: 5.768).

2018

— PN Bahrami, HS Javadi, T Dargahi, A Dehghantanha, KKR Choo, “A Hierarchical Key Pre-Distribution Scheme for Fog Networks”, (Wiley) Journal of Concurrency and Computation: Practice and Experience, 2018, DOI: https://doi.org/10.1002/cpe.4776 (IF: 1.167)

— S Walker-Roberts, M Hammoudeh and A Dehghantanha, “A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure,” in IEEE Access, 2018, DOI: 10.1109/ACCESS.2018.2817560 (IF:3.244)

— H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo, “A Deep Recurrent Neural Network Based Approach for Internet of Things Malware Threat Hunting”, (Elsevier) Journal of Future Generation Computer Systems (FGCS), 2018, DOI: https://DOI.org/10.1016/j.future.2018.03.007 (IF: 3.997)

— A Azmoudeh, A Dehghantanha and KKR Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning”, (IEEE) Transactions on Sustainable Computing, 2018, DOI: 10.1109/TSUSC.2018.2809665

— M Conti, A Dehghantanha, K Franke, S Watson, “Internet of Things Security and Forensics: Challenges and Opportunities”, (Elsevier) Future Generation Computer Systems Journal, DOI: https://DOI.org/10.1016/j.future.2017.07.060, 2018 (IF: 3.997) (cited: 120+)

2017

— S Newbery, A Dehghantanha, “Torture-free cyberspace–a human right”, (Elsevier) Journal of Computer Fraud & Security, Nov 2017, DOI: https://DOI.org/10.1016/S1361-3723(17)30083-0

— H HaddadPajouh, A Dehghantanha, R Khayami, and KKR Choo, “Intelligent OS X Malware Threat Detection with Code Inspection”, (Springer) Journal of Computer Virology and Hacking Techniques, 2017 – https://DOI.org/10.1007/s11416-017-0307-5.

— Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, “Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence”, (IEEE) Transactions on Emerging Topics in Computing, 2017 – DOI: 10.1109/TETC.2017.2756908 (IF:3.826).

— G Epiphaniou, P Karadimas, DK Ismail, H Al-Khateeb, A Dehghantanha, and KKR Choo, “Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks”, (IEEE) Internet of Things Journal, 2017 – DOI: http://ieeexplore.ieee.org/document/8070945/ (IF:7.596)

— D Kiwia, A Dehghantanha, KKR Choo, J Slaughter, “A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence”, (Elsevier) Journal of Computational Science, 2017, https://DOI.org/10.1016/j.jocs.2017.10.020 (IF: 1.784)

— YY Teing, A Dehghantanha, KKR Choo, “CloudMe Forensics: A Case of Big-Data Investigation,” (Wiley) Concurrency and Computation: Practice and Experience, http://onlinelibrary.wiley.com/DOI/10.1002/cpe.4277, 2017 (IF:1.133)

— A Azmoodeh, A Dehghantanha, M Conti, KKR Choo, “Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint”, (Springer) Journal of Ambient Intelligence and Humanized Computing, DOI: https://DOI.org/10.1007/s12652-017-0558-5 (IF:1.588 – cited: 50+)

— YY Teing, A Dehghantanha, KKR Choo, Z Muda, and MT Abdullah, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” (IEEE) Transactions on Sustainable Computing, DOI: 10.1109/TSUSC.2017.2687103, 2017.

— N Milosevic, A Dehghantanha, KKR Choo, “Machine learning aided Android malware classification”, (Elsevier) Journal of Computers & Electrical Engineering, 2017, DOI:http://dx.DOI.org/10.1016/j.compeleceng.2017.02.013, (IF:1.084 – cited: 60+)

2016

— T Hasani, J Bojeie, A Dehghantanha, “Investigating the Antecedents to the Adoption of SCRM Technologies by Start-up Companies”, (Elsevier) Journal of Telematics and Informatics, DOI: http://dx.DOI.org/10.1016/j.tele.2016.12.004, (IF:3.398), 2016
J 28. H HaddadPajouh, R Javidan, R Khaymi, A Dehghantanha and KKR Choo, “A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks”, (IEEE) Transactions on Emerging Topics in Computing; DOI: 10.1109/TETC.2016.2633228), 2016 (IF:3.826)

— YY Teing, A Dehghantanha, KKR Choo, “Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study”, (Elsevier) International Journal of Computers & Electrical Engineering DOI:
http://dx.DOI.org/10.1016/j.compeleceng.2016.08.020, 2016 (IF: 1.570)

— O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo, “Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing”, (EURASIP) Journal of Wireless Communications and Networking 2016:130, 2016, DOI: https://DOI.org/10.1186/s13638-016-0623-3 (IF:1.529) (won 2019 EURASIP JWCN best paper award – cited: 100+)

— S Watson, A Dehghantanha, “Digital Forensics: The Missing Piece of the Internet of Things Promise”, (Elsevier) Journal of Computer Fraud & Security, 2016, https://DOI.org/10.1016/S1361-3723(15)30045-2 (cited:50+)

— YY Teing, A Dehghantanha, KKR Choo, M Conti, T Dargahi, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study”, (Wiley) Journal of Forensics Sciences (Ranks 2 in Forensics Science) , DOI: 10.1111/1556, 2016, (IF:1.127)

— F Daryabar, A Dehghantanha, and KKR Choo (2016), “Cloud storage forensics: MEGA as a case study”, (tandf) Australian Journal of Forensic Sciences, DOI:10.1080/00450618.2016.1153714, 2016, (IF:0.833)

— YY Teing, A Dehghantanha, KKR Choo, Zaiton Muda, “Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies”, PLOSONE, Vol.11 Issue 3, 2016 (IF:3.234), DOI: 10.1371/journal.pone.0150300 .

— F Daryabar; A Dehghantanha; B Eterovic-Soric, KKR Choo, “Forensic Investigation of OneDrive, Box, GoogleDrive and Dropbox Applications on Android and iOS Devices”, (Taylor & Francis) Australian Journal of Forensic Sciences, Vol.48, Issue 6, pp. 615-643, 2016 (IF:0.833), DOI:10.1080/00450618.2015.1110620;

— M Shariati, A Dehghantanha, KKR Choo, “Sugar Sync Forensics”- (Taylor & Francis) Australian Journal of Forensic Sciences, Vol 48, Issue 1, pp.95-117, 2016 (JCR IF 2014IF:0.583) – DOI:10.1080/00450618.2015.1021379 (IF:0.833)