Advanced search    

Search: authors:"Ali Dehghantanha"

3 papers found.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

Kim-Kwang Raymond Choo 1 Amin Azmoodeh 2 Ali Dehghantanha 3 Department of Information Systems and Cyber Security, The University of Texas at San Antonio , San Antonio, TX , USA 4 Department of

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

attributed to the authors. Opeyemi Osanaiye and Ali Dehghantanha acknowledged the financial support of The University of Cape Town, South Africa, and The University of Salford, UK, respectively. Haibin Cai is

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies

Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we ...