Ali Dehghantanha focuses on Computer security, Android, Cloud computing, Digital forensics and Malware. Ali Dehghantanha has researched Computer security in several fields, including Event, Multitier architecture and Damages. His work deals with themes such as Cloud storage, Support vector machine, Embedded system, Mobile device forensics and Mobile device, which intersect with Android.
Ali Dehghantanha works mostly in the field of Cloud computing, limiting it down to topics relating to Intrusion detection system and, in certain cases, Public service, Classifier, Linear discriminant analysis, Resilience and Dimensionality reduction. His Digital forensics research is multidisciplinary, relying on both Watson and Internet privacy. His Malware research incorporates elements of Data mining, Identification, Cryptography, Opcode and Artificial intelligence.
Ali Dehghantanha spends much of his time researching Computer security, Malware, Artificial intelligence, Digital forensics and Cloud computing. His study focuses on the intersection of Computer security and fields such as Mobile device with connections in the field of Android. His studies deal with areas such as Computer network, Data mining, Support vector machine and Opcode as well as Malware.
The various areas that he examines in his Artificial intelligence study include Machine learning and Ransomware. His research investigates the connection with Digital forensics and areas like Field which intersect with concerns in Data science. His work carried out in the field of Cloud computing brings together such families of science as World Wide Web and OS X.
His primary scientific interests are in Computer security, Artificial intelligence, Malware, Machine learning and Blockchain. His study in the field of Personally identifiable information is also linked to topics like Attribution. His work in Artificial intelligence tackles topics such as Information technology which are related to areas like Internet privacy, Cyberwarfare and Espionage.
His work deals with themes such as Random forest, The Internet, Opcode and Identification, which intersect with Malware. His work in the fields of Machine learning, such as Convolutional neural network, intersects with other areas such as Static analysis. His Blockchain research includes themes of Domain, Network security and Data science.
Ali Dehghantanha mainly focuses on Computer security, Malware, Blockchain, Machine learning and Artificial intelligence. His biological study spans a wide range of topics, including Smart city and Cyber-physical system. His study in Malware focuses on Ransomware in particular.
His work carried out in the field of Ransomware brings together such families of science as Artificial neural network and Robustness. His Blockchain research is multidisciplinary, relying on both Domain, Data science, Public-key cryptography, Web application and Personally identifiable information. His is doing research in Deep learning and Convolutional neural network, both of which are found in Machine learning.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Internet of Things security and forensics: Challenges and opportunities
Mauro Conti;Ali Dehghantanha;Katrin Franke;Steve Watson.
Future Generation Computer Systems (2018)
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing
Opeyemi Osanaiye;Kim-Kwang Raymond Choo;Ali Dehghantanha;Zheng Xu.
arXiv: Cryptography and Security (2018)
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
Opeyemi A. Osanaiye;Opeyemi A. Osanaiye;Haibin Cai;Kim-Kwang Raymond Choo;Ali Dehghantanha.
Eurasip Journal on Wireless Communications and Networking (2016)
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
Amin Azmoodeh;Ali Dehghantanha;Kim-Kwang Raymond Choo.
IEEE Transactions on Sustainable Computing (2019)
A systematic literature review of blockchain cyber security
Paul J. Taylor;Tooska Dargahi;Ali Dehghantanha;Reza M. Parizi.
Digital Communications and Networks (2020)
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
Hamed Haddad Pajouh;Reza Javidan;Raouf Khayami;Ali Dehghantanha.
IEEE Transactions on Emerging Topics in Computing (2019)
Machine learning aided Android malware classification
Nikola Milosevic;Ali Dehghantanha;Kim-Kwang Raymond Choo.
Computers & Electrical Engineering (2017)
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
Amin Azmoodeh;Ali Dehghantanha;Mauro Conti;Kim-Kwang Raymond Choo.
Journal of Ambient Intelligence and Humanized Computing (2018)
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
Hamed HaddadPajouh;Ali Dehghantanha;Raouf Khayami;Kim-Kwang Raymond Choo;Kim-Kwang Raymond Choo.
Future Generation Computer Systems (2018)
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
Sajad Homayoun;Ali Dehghantanha;Marzieh Ahmadzadeh;Sattar Hashemi.
IEEE Transactions on Emerging Topics in Computing (2020)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
The University of Texas at San Antonio
Brandon University
University of Padua
University of Calgary
University of Rome Tor Vergata
University of Guelph
St. Francis Xavier University
China University of Geosciences
Universitat Politècnica de Catalunya
Shaanxi Normal University
American College of Greece
University of Queensland
University of British Columbia
Cisco Systems (China)
Boston Scientific (United States)
National and Kapodistrian University of Athens
University of Houston
Georgia Institute of Technology
University College London
Erasmus University Rotterdam
University of Leeds
University of Minnesota
University of Southern California
Harvard University
University of Pittsburgh
University of Pennsylvania