D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 41 Citations 6,601 203 World Ranking 4360 National Ranking 192

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer security

Ali Dehghantanha focuses on Computer security, Android, Cloud computing, Digital forensics and Malware. Ali Dehghantanha has researched Computer security in several fields, including Event, Multitier architecture and Damages. His work deals with themes such as Cloud storage, Support vector machine, Embedded system, Mobile device forensics and Mobile device, which intersect with Android.

Ali Dehghantanha works mostly in the field of Cloud computing, limiting it down to topics relating to Intrusion detection system and, in certain cases, Public service, Classifier, Linear discriminant analysis, Resilience and Dimensionality reduction. His Digital forensics research is multidisciplinary, relying on both Watson and Internet privacy. His Malware research incorporates elements of Data mining, Identification, Cryptography, Opcode and Artificial intelligence.

His most cited work include:

  • Internet of Things security and forensics: Challenges and opportunities (252 citations)
  • Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing (161 citations)
  • A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks (152 citations)

What are the main themes of his work throughout his whole career to date?

Ali Dehghantanha spends much of his time researching Computer security, Malware, Artificial intelligence, Digital forensics and Cloud computing. His study focuses on the intersection of Computer security and fields such as Mobile device with connections in the field of Android. His studies deal with areas such as Computer network, Data mining, Support vector machine and Opcode as well as Malware.

The various areas that he examines in his Artificial intelligence study include Machine learning and Ransomware. His research investigates the connection with Digital forensics and areas like Field which intersect with concerns in Data science. His work carried out in the field of Cloud computing brings together such families of science as World Wide Web and OS X.

He most often published in these fields:

  • Computer security (43.78%)
  • Malware (19.90%)
  • Artificial intelligence (17.91%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (43.78%)
  • Artificial intelligence (17.91%)
  • Malware (19.90%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Computer security, Artificial intelligence, Malware, Machine learning and Blockchain. His study in the field of Personally identifiable information is also linked to topics like Attribution. His work in Artificial intelligence tackles topics such as Information technology which are related to areas like Internet privacy, Cyberwarfare and Espionage.

His work deals with themes such as Random forest, The Internet, Opcode and Identification, which intersect with Malware. His work in the fields of Machine learning, such as Convolutional neural network, intersects with other areas such as Static analysis. His Blockchain research includes themes of Domain, Network security and Data science.

Between 2019 and 2021, his most popular works were:

  • A systematic literature review of blockchain cyber security (101 citations)
  • Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence (74 citations)
  • An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security (29 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Law

Ali Dehghantanha mainly focuses on Computer security, Malware, Blockchain, Machine learning and Artificial intelligence. His biological study spans a wide range of topics, including Smart city and Cyber-physical system. His study in Malware focuses on Ransomware in particular.

His work carried out in the field of Ransomware brings together such families of science as Artificial neural network and Robustness. His Blockchain research is multidisciplinary, relying on both Domain, Data science, Public-key cryptography, Web application and Personally identifiable information. His is doing research in Deep learning and Convolutional neural network, both of which are found in Machine learning.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Internet of Things security and forensics: Challenges and opportunities

Mauro Conti;Ali Dehghantanha;Katrin Franke;Steve Watson.
Future Generation Computer Systems (2018)

379 Citations

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing

Opeyemi Osanaiye;Kim-Kwang Raymond Choo;Ali Dehghantanha;Zheng Xu.
arXiv: Cryptography and Security (2018)

181 Citations

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

Opeyemi A. Osanaiye;Opeyemi A. Osanaiye;Haibin Cai;Kim-Kwang Raymond Choo;Ali Dehghantanha.
Eurasip Journal on Wireless Communications and Networking (2016)

173 Citations

Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning

Amin Azmoodeh;Ali Dehghantanha;Kim-Kwang Raymond Choo.
IEEE Transactions on Sustainable Computing (2019)

172 Citations

A systematic literature review of blockchain cyber security

Paul J. Taylor;Tooska Dargahi;Ali Dehghantanha;Reza M. Parizi.
Digital Communications and Networks (2020)

167 Citations

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks

Hamed Haddad Pajouh;Reza Javidan;Raouf Khayami;Ali Dehghantanha.
IEEE Transactions on Emerging Topics in Computing (2019)

153 Citations

Machine learning aided Android malware classification

Nikola Milosevic;Ali Dehghantanha;Kim-Kwang Raymond Choo.
Computers & Electrical Engineering (2017)

142 Citations

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

Amin Azmoodeh;Ali Dehghantanha;Mauro Conti;Kim-Kwang Raymond Choo.
Journal of Ambient Intelligence and Humanized Computing (2018)

115 Citations

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting

Hamed HaddadPajouh;Ali Dehghantanha;Raouf Khayami;Kim-Kwang Raymond Choo;Kim-Kwang Raymond Choo.
Future Generation Computer Systems (2018)

110 Citations

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence

Sajad Homayoun;Ali Dehghantanha;Marzieh Ahmadzadeh;Sattar Hashemi.
IEEE Transactions on Emerging Topics in Computing (2020)

106 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Ali Dehghantanha

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 82

Gautam Srivastava

Gautam Srivastava

Brandon University

Publications: 42

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 17

Mauro Conti

Mauro Conti

University of Padua

Publications: 12

Sudeep Tanwar

Sudeep Tanwar

Nirma University

Publications: 10

Jong Hyuk Park

Jong Hyuk Park

Seoul National University of Science and Technology

Publications: 9

Abdullah Gani

Abdullah Gani

University of Malaya

Publications: 9

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 8

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 8

Mamoun Alazab

Mamoun Alazab

Charles Darwin University

Publications: 8

Jerry Chun-Wei Lin

Jerry Chun-Wei Lin

Western Norway University of Applied Sciences

Publications: 7

Muhammad Imran

Muhammad Imran

University of Cagliari

Publications: 7

Deepak Gupta

Deepak Gupta

Maharaja Agrasen Institute of Technology (MAIT)

Publications: 7

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 7

Gary Wills

Gary Wills

University of Southampton

Publications: 6

Teng Joon Lim

Teng Joon Lim

University of Sydney

Publications: 6

Trending Scientists

Constantinos B. Papadias

Constantinos B. Papadias

American College of Greece

Iris Vessey

Iris Vessey

University of Queensland

Harry Joe

Harry Joe

University of British Columbia

Gregory G. Raleigh

Gregory G. Raleigh

Cisco Systems (China)

Sidney D. Fleischman

Sidney D. Fleischman

Boston Scientific (United States)

Anastasios Economou

Anastasios Economou

National and Kapodistrian University of Athens

Michael P. Harold

Michael P. Harold

University of Houston

Veaceslav Coropceanu

Veaceslav Coropceanu

Georgia Institute of Technology

Javier Herrero

Javier Herrero

University College London

Henri A. Verbrugh

Henri A. Verbrugh

Erasmus University Rotterdam

David J. Rowlands

David J. Rowlands

University of Leeds

Frits R. Mooi

Frits R. Mooi

University of Minnesota

Michael E. Dawson

Michael E. Dawson

University of Southern California

Patricia K. Donahoe

Patricia K. Donahoe

Harvard University

Marilyn M. Wagener

Marilyn M. Wagener

University of Pittsburgh

James J. Leyden

James J. Leyden

University of Pennsylvania

Something went wrong. Please try again later.