Author of the publication

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.

, , , and . Comput. Electr. Eng., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards data centric mobile security., , and . IAS, page 62-67. IEEE, (2011)A survey on internet of things security: Requirements, challenges, and solutions., , , , and . Internet Things, (2021)Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence., , , , and . IEEE Trans. Emerg. Top. Comput., 8 (2): 341-351 (2020)A multiview learning method for malware threat hunting: windows, IoT and android as case studies., , , , , , , and . World Wide Web, 23 (2): 1241-1260 (2020)Cryptocurrency malware hunting: A deep Recurrent Neural Network approach., , , , , and . Appl. Soft Comput., (2020)Security Aspects of Internet of Things aided Smart Grids: a Bibliometric Survey., , , , and . CoRR, (2020)Sidechain technologies in blockchain networks: An examination and state-of-the-art review., , , , , and . J. Netw. Comput. Appl., (2020)A Cyber-Kill-Chain based taxonomy of crypto-ransomware features., , , , , and . J. Comput. Virol. Hacking Tech., 15 (4): 277-305 (2019)Federated-Learning-Based Anomaly Detection for IoT Security Attacks., , , , , and . IEEE Internet Things J., 9 (4): 2545-2554 (2022)IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection., , , , , and . IEEE Trans. Ind. Informatics, 18 (12): 8477-8486 (2022)