A systematic literature review of blockchain cyber security PJ Taylor, T Dargahi, A Dehghantanha, RM Parizi, KKR Choo Digital Communications and Networks 6 (2), 147-156, 2020 | 637 | 2020 |
A survey on the security of stateful SDN data planes T Dargahi, A Caponi, M Ambrosin, G Bianchi, M Conti IEEE Communications Surveys & Tutorials 19 (3), 1701-1725, 2017 | 242 | 2017 |
Cyber threat intelligence: challenges and opportunities M Conti, T Dargahi, A Dehghantanha Cyber Threat Intelligence, 1-6, 2018 | 173 | 2018 |
On the feasibility of attribute-based encryption on internet of things devices M Ambrosin, A Anzanpour, M Conti, T Dargahi, SR Moosavi, AM Rahmani, ... IEEE Micro 36 (6), 25-35, 2016 | 151 | 2016 |
Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ... Journal of information processing systems 15 (4), 865-889, 2019 | 120 | 2019 |
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features T Dargahi, A Dehghantanha, PN Bahrami, M Conti, G Bianchi, ... Journal of Computer Virology and Hacking Techniques 15, 277-305, 2019 | 112 | 2019 |
On the Feasibility of Attribute-Based Encryption on Smartphone Devices M Ambrosin, M Conti, T Dargahi MobiSys'15 (IoTSys'15 Workshop), 49-54, 2015 | 106 | 2015 |
On the security and privacy challenges of virtual assistants T Bolton, T Dargahi, S Belguith, MS Al-Rakhami, AH Sodhro Sensors 21 (7), 2312, 2021 | 86 | 2021 |
Blockchain-Based Privacy-Preserving Healthcare Architecture KM Hossein, ME Esmaeili, T Dargahi, A Khonsari 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE …, 2019 | 86 | 2019 |
BCHealth: A novel blockchain-based privacy-preserving architecture for IoT healthcare applications KM Hossein, ME Esmaeili, T Dargahi, A Khonsari, M Conti Computer Communications 180, 31-47, 2021 | 82 | 2021 |
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment DR McKinnel, T Dargahi, A Dehghantanha, KKR Choo Computers & Electrical Engineering 75, 175-188, 2019 | 82 | 2019 |
Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications S Belguith, N Kaaniche, M Hammoudeh, T Dargahi Future Generation Computer Systems 111, 899-918, 2020 | 78 | 2020 |
Cyber threat intelligence A Dehghantanha, M Conti, T Dargahi Springer International Publishing, 2018 | 46 | 2018 |
Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: Apt28, red october, and regin H Mwiki, T Dargahi, A Dehghantanha, KKR Choo Critical Infrastructure Security and Resilience: Theories, Methods, Tools …, 2019 | 39 | 2019 |
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs T Dargahi, M Ambrosin, M Conti, N Asokan Computer Communications 85, 1-13, 2016 | 39 | 2016 |
Forensic investigation of cooperative storage cloud service: Symform as a case study YY Teing, A Dehghantanha, KKR Choo, T Dargahi, M Conti Journal of forensic sciences 62 (3), 641-654, 2017 | 37 | 2017 |
Security challenges of internet of underwater things: A systematic literature review AG Yisa, T Dargahi, S Belguith, M Hammoudeh Transactions on Emerging Telecommunications Technologies 32 (3), e4203, 2021 | 30 | 2021 |
Securing underwater sensor networks against routing attacks T Dargahi, HHS Javadi, H Shafiei Wireless Personal Communications 96, 2585-2602, 2017 | 30 | 2017 |
A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks M Alaeiyan, A Dehghantanha, T Dargahi, M Conti, S Parsa ACM Transactions on Cyber-Physical Systems 4 (3), 1-22, 2020 | 29 | 2020 |
Protecting IoT and ICS platforms against advanced persistent threat actors: analysis of APT1, silent chollima and molerats S Grooby, T Dargahi, A Dehghantanha Handbook of big data and IoT security, 225-255, 2019 | 27 | 2019 |