Tooska Dargahi
Tooska Dargahi
Adresă de e-mail confirmată pe mmu.ac.uk
Citat de
Citat de
A systematic literature review of blockchain cyber security
PJ Taylor, T Dargahi, A Dehghantanha, RM Parizi, KKR Choo
Digital Communications and Networks 6 (2), 147-156, 2020
A survey on the security of stateful SDN data planes
T Dargahi, A Caponi, M Ambrosin, G Bianchi, M Conti
IEEE Communications Surveys & Tutorials 19 (3), 1701-1725, 2017
On the feasibility of attribute-based encryption on internet of things devices
M Ambrosin, A Anzanpour, M Conti, T Dargahi, SR Moosavi, AM Rahmani, ...
IEEE Micro 36 (6), 25-35, 2016
Cyber threat intelligence: challenges and opportunities
M Conti, T Dargahi, A Dehghantanha
Cyber Threat Intelligence, 1-6, 2018
On the Feasibility of Attribute-Based Encryption on Smartphone Devices
M Ambrosin, M Conti, T Dargahi
MobiSys'15 (IoTSys'15 Workshop), 49-54, 2015
Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures
PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ...
Journal of information processing systems 15 (4), 865-889, 2019
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
T Dargahi, A Dehghantanha, PN Bahrami, M Conti, G Bianchi, ...
Journal of Computer Virology and Hacking Techniques 15 (4), 277-305, 2019
Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications
S Belguith, N Kaaniche, M Hammoudeh, T Dargahi
Future Generation Computer Systems 111, 899-918, 2020
Application‐specific hybrid symmetric design of key pre‐distribution for wireless sensor networks
T Dargahi, H H. S. Javadi, M Hosseinzadeh
Security and Communications Networks 8 (8), 1561-1574, 2015
Blockchain-Based Privacy-Preserving Healthcare Architecture
KM Hossein, ME Esmaeili, T Dargahi, A Khonsari
2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE …, 2019
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment
DR McKinnel, T Dargahi, A Dehghantanha, KKR Choo
Computers & Electrical Engineering 75, 175-188, 2019
On the security and privacy challenges of virtual assistants
T Bolton, T Dargahi, S Belguith, MS Al-Rakhami, AH Sodhro
Sensors 21 (7), 2312, 2021
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs
T Dargahi, M Ambrosin, M Conti, N Asokan
Computer Communications 85, 1-13, 2016
Forensic investigation of cooperative storage cloud service: Symform as a case study
YY Teing, A Dehghantanha, KKR Choo, T Dargahi, M Conti
Journal of forensic sciences 62 (3), 641-654, 2017
Cyber threat intelligence
A Dehghantanha, M Conti, T Dargahi
Springer International Publishing, 2018
Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: APT28, RED October, and Regin
H Mwiki, T Dargahi, A Dehghantanha, KKR Choo
Critical infrastructure security and resilience, 221-244, 2019
BCHealth: A novel blockchain-based privacy-preserving architecture for IoT healthcare applications
KM Hossein, ME Esmaeili, T Dargahi, A Khonsari, M Conti
Computer Communications 180, 31-47, 2021
Protecting IoT and ICS platforms against advanced persistent threat actors: analysis of APT1, silent chollima and molerats
S Grooby, T Dargahi, A Dehghantanha
Handbook of big data and IoT security, 225-255, 2019
Securing underwater sensor networks against routing attacks
T Dargahi, HHS Javadi, H Shafiei
Wireless Personal Communications 96 (2), 2585-2602, 2017
Forensics Analysis of Android Mobile VoIP Apps
T Dargahi, A Dehghantanha, M Conti
Contemporary Digital Forensic Investigations of Cloud and Mobile …, 2016
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20