Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami IEEE Transactions on Emerging Topics in Computing (In Press) 99, 11, 2017 | 220 | 2017 |
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ... Future Generation Computer Systems 90, 11, 2019 | 161 | 2019 |
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis H Darabian, S Homayoun, A Dehghantanha, S Hashemi, H Karimipour, ... Journal of Grid Computing, 2020 | 121 | 2020 |
An OpCode-Based Technique for Polymorphic Internet of Things Malware Detection H Darabian, A Dehghantanha, S Hashemi, S Homayoun, KKR Choo Concurrency and Computation: Practice and Experience, 2019 | 108 | 2019 |
BoTShark: A deep learning approach for botnet traffic detection S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami Cyber Threat Intelligence, 137-153, 2018 | 98 | 2018 |
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains R M. Parizi, S Homayoun, A Yazdinejad, A Dehghantanha, ... IEEE 32nd Canadian Conference of Electrical and Computer Engineering (IEEE …, 2019 | 62 | 2019 |
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores S Homayoun, A Dehghantanha, R M Parizi, KK Raymond Choo IEEE 32nd Canadian Conference of Electrical and Computer Engineering (IEEE …, 2019 | 53 | 2019 |
A multiview learning method for malware threat hunting: windows, IoT and android as case studies H Darabian, A Dehghantanha, S Hashemi, M Taheri, A Azmoodeh, ... World Wide Web 23, 1241-1260, 2020 | 44 | 2020 |
Forensics investigation of openflow-based SDN platforms MK Pandya, S Homayoun, A Dehghantanha Cyber Threat Intelligence, 281-296, 2018 | 25 | 2018 |
Private cloud storage forensics: Seafile as a case study YY Teing, S Homayoun, A Dehghantanha, KKR Choo, RM Parizi, ... Handbook of Big Data and IoT Security, 73-127, 2019 | 14 | 2019 |
A review on data stream classification approaches S Homayoun, M Ahmadzadeh Journal of Advanced Computer Science & Technology 5 (1), 8-13, 2016 | 14 | 2016 |
A website evaluation of travel agencies in Iran: An adoption level and value creation approach R Sadeghein, F Khoshalhan, S Homayoun International Journal of Advanced Information Technology 2 (6), 1, 2012 | 14 | 2012 |
Using machine learning algorithms to predict failure on the PCB surface under corrosive conditions S Bahrebar, S Homayoun, R Ambat Corrosion Science 206, 110500, 2022 | 9 | 2022 |
Efficient intrusion detection using weighted k-means clustering and naïve bayes classification Y Emami, M Ahmadzadeh, M Salehi, S Homayoun Journal of Emerging Trends in Computing and Information Sciences 5 (8), 620-623, 2014 | 8 | 2014 |
A perfect match: Deep learning towards enhanced data trustworthiness in crowd-sensing systems S Afzal-Houshmand, S Homayoun, T Giannetsos 2021 IEEE International Mediterranean Conference on Communications and …, 2021 | 5 | 2021 |
Deep dive into ransomware threat hunting and intelligence at fog layer S Homayoun, A Dehghantanha, M Ahmadzadeh, M Hashemi, R Khayami, ... Future Generation Computer Systems 90 (Jan 19), 2018 | 5 | 2018 |
Fault Tolerant Approach for WSN Chain Based Routing Protocols SH Ahmad Jalili, M Keshtgary International Journal of Computer Networks and Communications Security 3 (2), 2015 | 5 | 2015 |
Detecting ambiguous phishing certificates using machine learning S Homayoun, K Hageman, S Afzal-Houshmand, CD Jensen, ... 2022 International Conference on Information Networking (ICOIN), 1-6, 2022 | 4 | 2022 |
Performance Analysis of Multiple Virtualized Servers S Homayoun, A Jalili, M Keshtgari Computer Engineering and Applications Journal 4 (3), 183-188, 2015 | 2 | 2015 |
Grid Computing: Strategic Decision Making in Resource Selection S Mohammadi, S Homayoun, ET Zadeh International Journal of Computer Science, Engineering and Applications …, 2012 | 2 | 2012 |