Machine learning aided static malware analysis: A survey and tutorial
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …
reflection to development of different malware techniques to evade network-based and host …
Machine learning aided Android malware classification
N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …
private and confidential information have resulted in these devices being targeted by …
An opcode‐based technique for polymorphic Internet of Things malware detection
H Darabian, A Dehghantanha… - Concurrency and …, 2020 - Wiley Online Library
The increasing popularity of Internet of Things (IoT) devices makes them an attractive target
for malware authors. In this paper, we use sequential pattern mining technique to detect …
for malware authors. In this paper, we use sequential pattern mining technique to detect …
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence
D Kiwia, A Dehghantanha, KKR Choo… - Journal of computational …, 2018 - Elsevier
Malware such as banking Trojans are popular with financially-motivated cybercriminals.
Detection of banking Trojans remains a challenging task, due to the constant evolution of …
Detection of banking Trojans remains a challenging task, due to the constant evolution of …
[PDF][PDF] Cloud forensics issues and opportunities
A Aminnezhad, A Dehghantanha… - International Journal of …, 2013 - academia.edu
Cloud computing technology is a rapidly growing field of study, which relies on sharing
computing resources rather than having local servers or personal devices to handle …
computing resources rather than having local servers or personal devices to handle …
Intelligent OS X malware threat detection with code inspection
HH Pajouh, A Dehghantanha, R Khayami… - Journal of Computer …, 2018 - Springer
With the increasing market share of Mac OS X operating system, there is a corresponding
increase in the number of malicious programs (malware) designed to exploit vulnerabilities …
increase in the number of malicious programs (malware) designed to exploit vulnerabilities …
[Retracted] Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications
S Raghavendra, P Srividya, M Mohseni… - Security and …, 2022 - Wiley Online Library
Using cloud computing, businesses can adopt IT without incurring a significant upfront cost.
The Internet has numerous benefits, but model security remains a concern, which affects …
The Internet has numerous benefits, but model security remains a concern, which affects …
Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices
F Daryabar, A Dehghantanha… - Australian Journal of …, 2016 - Taylor & Francis
In today's Internet-connected world, mobile devices are increasingly used to access cloud
storage services, which allow users to access data anywhere, anytime. Mobile devices have …
storage services, which allow users to access data anywhere, anytime. Mobile devices have …
Cloud storage forensics: MEGA as a case study
F Daryabar, A Dehghantanha… - Australian Journal of …, 2017 - Taylor & Francis
The increasing use of smartphones and cloud storage apps allows users to access their
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …
data anywhere, anytime. Due to the potential of mobile devices being used and/or targeted …
A survey on privacy issues in digital forensics
A Aminnezhad, A Dehghantanha… - International Journal of …, 2012 - go.gale.com
Privacy issues have always been a major concern in computer forensics and security and in
case of any investigation whether it is pertaining to computer or not always privacy issues …
case of any investigation whether it is pertaining to computer or not always privacy issues …