Æȷοì
Amin Azmoodeh
Amin Azmoodeh
Ph.D. of Computational Science, University of Guelph
uoguelph.caÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning
A Azmoodeh, A Dehghantanha, KKR Choo
IEEE Transactions on Sustainable Computing, 2018
3842018
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KK Raymond Choo
Journal of Ambient Intelligence and Humanized Computing, 2017
3112017
Fuzzy pattern tree for edge malware detection and categorization in IoT
EM Dovom, A Azmoodeh, A Dehghantanha, DE Newton, RM Parizi, ...
Journal of Systems Architecture 97, 1-7, 2019
2092019
An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic
M Saharkhizan, A Azmoodeh, A Dehghantanha, KKR Choo, RM Parizi
IEEE Internet of Things Journal 7 (9), 8852-8859, 2020
1502020
Graph embedding as a new approach for unknown malware detection
H Hashemi, A Azmoodeh, A Hamzeh, S Hashemi
Journal of Computer Virology, 1-14, 2016
1042016
A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures
A Yazdinejad, B Zolfaghari, A Azmoodeh, A Dehghantanha, H Karimipour, ...
Applied Sciences 11 (16), 7518, 2021
732021
Big data and internet of things security and forensics: Challenges and opportunities
A Azmoodeh, A Dehghantanha, KKR Choo
Handbook of Big Data and IoT Security, 1-4, 2019
502019
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
H Darabian, A Dehghantanha, S Hashemi, M Taheri, A Azmoodeh, ...
World Wide Web 23, 1241-1260, 2020
412020
MVFCC: A multi-view fuzzy consensus clustering model for malware threat attribution
H Haddadpajouh, A Azmoodeh, A Dehghantanha, RM Parizi
IEEE Access 8, 139188-139198, 2020
362020
A hybrid deep generative local metric learning method for intrusion detection
M Saharkhizan, A Azmoodeh, H HaddadPajouh, A Dehghantanha, ...
Handbook of Big Data Privacy, 343-357, 2020
192020
Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform
K Bolouri, A Azmoodeh, A Dehghantanha, M Firouzmand
Handbook of Big Data and IoT Security, 211-223, 2019
152019
IIoT deep malware threat hunting: from adversarial example detection to adversarial scenario detection
B Esmaeili, A Azmoodeh, A Dehghantanha, H Karimipour, B Zolfaghari, ...
IEEE Transactions on Industrial Informatics 18 (12), 8477-8486, 2022
142022
Big data and privacy: Challenges and opportunities
A Azmoodeh, A Dehghantanha
Handbook of Big Data Privacy, 1-5, 2020
112020
Active spectral botnet detection based on eigenvalue weighting
A Azmoodeh, A Dehghantanha, RM Parizi, S Hashemi, B Gharabaghi, ...
Handbook of Big Data Privacy, 385-397, 2020
112020
Blockchain in cybersecurity realm: an overview
RM Parizi, A Dehghantanha, A Azmoodeh, KKR Choo
Blockchain Cybersecurity, Trust and Privacy, 1-5, 2020
112020
CyberPDF: smart and secure coordinate-based automated health PDF data batch extraction
RM Parizi, L Guo, Y Bian, A Dehghantanha, A Azmoodeh, KKR Choo
Proceedings of the 2018 IEEE/ACM International Conference on Connected ¡¦, 2018
62018
Cybersecurity in smart farming: canada market research
A Dehghantanha, H Karimipour, A Azmoodeh
arXiv preprint arXiv:2104.05183, 2021
52021
RAT hunter: Building robust models for detecting remote access trojans based on optimum hybrid features
MM BehradFar, H HaddadPajouh, A Dehghantanha, A Azmoodeh, ...
Handbook of Big Data Privacy, 371-383, 2020
42020
Proactive detection of query-based adversarial scenarios in NLP systems
M Maghsoudimehrabani, A Azmoodeh, A Dehghantanha, B Zolfaghari, ...
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security ¡¦, 2022
32022
Deep fake detection, deterrence and response: Challenges and opportunities
A Azmoodeh, A Dehghantanha
arXiv preprint arXiv:2211.14667, 2022
22022
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20