Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning A Azmoodeh, A Dehghantanha, KKR Choo IEEE Transactions on Sustainable Computing, 2018 | 408 | 2018 |
Detecting crypto-ransomware in IoT networks based on energy consumption footprint A Azmoodeh, A Dehghantanha, M Conti, KK Raymond Choo Journal of Ambient Intelligence and Humanized Computing, 2017 | 323 | 2017 |
Fuzzy pattern tree for edge malware detection and categorization in IoT EM Dovom, A Azmoodeh, A Dehghantanha, DE Newton, RM Parizi, ... Journal of Systems Architecture 97, 1-7, 2019 | 216 | 2019 |
An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic M Saharkhizan, A Azmoodeh, A Dehghantanha, KKR Choo, RM Parizi IEEE Internet of Things Journal 7 (9), 8852-8859, 2020 | 174 | 2020 |
Graph embedding as a new approach for unknown malware detection H Hashemi, A Azmoodeh, A Hamzeh, S Hashemi Journal of Computer Virology, 1-14, 2016 | 104 | 2016 |
A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures A Yazdinejad, B Zolfaghari, A Azmoodeh, A Dehghantanha, H Karimipour, ... Applied Sciences 11 (16), 7518, 2021 | 93 | 2021 |
Big data and internet of things security and forensics: Challenges and opportunities A Azmoodeh, A Dehghantanha, KKR Choo Handbook of Big Data and IoT Security, 1-4, 2019 | 50 | 2019 |
A multiview learning method for malware threat hunting: windows, IoT and android as case studies H Darabian, A Dehghantanha, S Hashemi, M Taheri, A Azmoodeh, ... World Wide Web 23, 1241-1260, 2020 | 43 | 2020 |
MVFCC: A multi-view fuzzy consensus clustering model for malware threat attribution H Haddadpajouh, A Azmoodeh, A Dehghantanha, RM Parizi IEEE Access 8, 139188-139198, 2020 | 35 | 2020 |
A hybrid deep generative local metric learning method for intrusion detection M Saharkhizan, A Azmoodeh, H HaddadPajouh, A Dehghantanha, ... Handbook of Big Data Privacy, 343-357, 2020 | 22 | 2020 |
IIoT deep malware threat hunting: from adversarial example detection to adversarial scenario detection B Esmaeili, A Azmoodeh, A Dehghantanha, H Karimipour, B Zolfaghari, ... IEEE Transactions on Industrial Informatics 18 (12), 8477-8486, 2022 | 18 | 2022 |
Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform K Bolouri, A Azmoodeh, A Dehghantanha, M Firouzmand Handbook of Big Data and IoT Security, 211-223, 2019 | 15 | 2019 |
Big data and privacy: Challenges and opportunities A Azmoodeh, A Dehghantanha Handbook of Big Data Privacy, 1-5, 2020 | 12 | 2020 |
Active spectral botnet detection based on eigenvalue weighting A Azmoodeh, A Dehghantanha, RM Parizi, S Hashemi, B Gharabaghi, ... Handbook of Big Data Privacy, 385-397, 2020 | 11 | 2020 |
Blockchain in cybersecurity realm: an overview RM Parizi, A Dehghantanha, A Azmoodeh, KKR Choo Blockchain Cybersecurity, Trust and Privacy, 1-5, 2020 | 11 | 2020 |
CyberPDF: smart and secure coordinate-based automated health PDF data batch extraction RM Parizi, L Guo, Y Bian, A Dehghantanha, A Azmoodeh, KKR Choo Proceedings of the 2018 IEEE/ACM International Conference on Connected …, 2018 | 6 | 2018 |
A GNN-Based adversarial internet of things Malware Detection Framework for critical infrastructure: Studying Gafgyt, Mirai and Tsunami campaigns B Esmaeili, A Azmoodeh, A Dehghantanha, G Srivastava, H Karimipour, ... IEEE Internet of Things Journal, 2023 | 5 | 2023 |
Cybersecurity in smart farming: canada market research A Dehghantanha, H Karimipour, A Azmoodeh arXiv preprint arXiv:2104.05183, 2021 | 5 | 2021 |
RAT hunter: Building robust models for detecting remote access trojans based on optimum hybrid features MM BehradFar, H HaddadPajouh, A Dehghantanha, A Azmoodeh, ... Handbook of Big Data Privacy, 371-383, 2020 | 5 | 2020 |
Deep fake detection, deterrence and response: Challenges and opportunities A Azmoodeh, A Dehghantanha arXiv preprint arXiv:2211.14667, 2022 | 3 | 2022 |