Skip to main content

Research Repository

Advanced Search

All Outputs (3)

An improved two-hidden-layer extreme learning machine for malware hunting (2019)
Journal Article
Namavar Jahromi, A., Hashemi, S., Dehghantanha, A., Choo, K., Karimipour, H., Newton, D., & Parizi, R. (2020). An improved two-hidden-layer extreme learning machine for malware hunting. Computers and Security, 89, 101655. https://doi.org/10.1016/j.cose.2019.101655

Detecting unknown malware and their variants remains both an operational challenge and a research challenge. In recent years, there have been attempts to design machine learning techniques to increase the success of existing automated malware detecti... Read More about An improved two-hidden-layer extreme learning machine for malware hunting.

Fuzzy pattern tree for edge malware detection and categorization in IoT (2019)
Journal Article
Dovom, E., Azmoodeh, A., Dehghantanha, A., Newton, D., Parizi, R., & Karimipour, H. (2019). Fuzzy pattern tree for edge malware detection and categorization in IoT. Journal of Systems Architecture, 97(Aug 19), 1-7. https://doi.org/10.1016/j.sysarc.2019.01.017

The surging pace of Internet of Things (IoT) development and its applications has resulted in significantly large amounts of data (commonly known as big data) being communicated and processed across IoT networks. While cloud computing has led to seve... Read More about Fuzzy pattern tree for edge malware detection and categorization in IoT.

Deep dive into ransomware threat hunting and intelligence at fog layer (2018)
Journal Article
Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, M., Khayami, R., Choo, K., & Newton, D. (2018). Deep dive into ransomware threat hunting and intelligence at fog layer. Future Generation Computer Systems, 90(Jan 19), 94-104. https://doi.org/10.1016/j.future.2018.07.045

Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data. The capability to efficiently hunt abnormalities relating to ransomwar... Read More about Deep dive into ransomware threat hunting and intelligence at fog layer.