Skip to main content

Research Repository

Advanced Search

All Outputs (24)

DeepClean : a robust deep learning technique for autonomous vehicle camera data privacy (2022)
Journal Article
Adeboye, O., Dargahi, T., Babaie, M., Saraee, M., & Yu, C. (2022). DeepClean : a robust deep learning technique for autonomous vehicle camera data privacy. IEEE Access, https://doi.org/10.1109/ACCESS.2022.3222834

Autonomous Vehicles (AVs) are equipped with several sensors which produce various forms of data, such as geo-location, distance, and camera data. The volume and utility of these data, especially camera data, have contributed to the advancement of h... Read More about DeepClean : a robust deep learning technique for autonomous vehicle camera data privacy.

Integration of blockchain with connected and autonomous vehicles : vision and challenge (2021)
Journal Article
Dargahi, T., Ahmadvand, H., Alraja, M., & Yu, C. (2022). Integration of blockchain with connected and autonomous vehicles : vision and challenge. Journal of Data and Information Quality, 14(1), 5. https://doi.org/10.1145/3460003

Connected and Autonomous Vehicles (CAVs) are introduced to improve individuals’ quality of life by offering a wide range of services. They collect a huge amount of data and exchange them with each other and the infrastructure. The collected data usu... Read More about Integration of blockchain with connected and autonomous vehicles : vision and challenge.

BCHealth : a novel blockchain-based privacy-preserving architecture for IoT healthcare applications (2021)
Journal Article
Mohammad Hossein, K., Esmaeili, M., Dargahi, T., Khonsari, A., & Conti, M. (2021). BCHealth : a novel blockchain-based privacy-preserving architecture for IoT healthcare applications. Computer Communications, 180, 31-47. https://doi.org/10.1016/j.comcom.2021.08.011

The advancements in networking technologies have introduced the Internet of Everything (IoE) and smart living concepts. The main idea behind making everything smarter is to improve individuals’ quality of life. An excellent example of such a technolo... Read More about BCHealth : a novel blockchain-based privacy-preserving architecture for IoT healthcare applications.

On the security and privacy challenges of virtual assistants (2021)
Journal Article
Bolton, T., Dargahi, T., Belguith, S., Al-Rakhami, M., & Sodhro, A. (2021). On the security and privacy challenges of virtual assistants. Sensors, 21(7), e2312. https://doi.org/10.3390/s21072312

Since the purchase of Siri by Apple, and its release with the iPhone 4S in 2011, virtual assistants (VAs) have grown in number and popularity. The sophisticated natural language processing and speech recognition employed by VAs enables users to inter... Read More about On the security and privacy challenges of virtual assistants.

Evaluating the risk of disclosure and utility in a synthetic dataset (2021)
Journal Article
Chen, K., Yu, C., & Dargahi, T. (2021). Evaluating the risk of disclosure and utility in a synthetic dataset. Computers, Materials & Continua, 68(1), 761-787. https://doi.org/10.32604/cmc.2021.014984

The advancement of information technology has improved the delivery of financial services by the introduction of Financial Technology (FinTech). To enhance their customer satisfaction, Fintech companies leverage artificial intelligence (AI) to col... Read More about Evaluating the risk of disclosure and utility in a synthetic dataset.

Security challenges of Internet of Underwater Things : a systematic literature review (2020)
Journal Article
systematic literature review. Transactions on Emerging Telecommunications Technologies, 32(3), e4203. https://doi.org/10.1002/ett.4203

Water covers approximately 71% of the earth surface, yet much of the underwater world remains unexplored due to technology limitations. Internet of Underwater Things (IoUT) is a network of underwater objects that enables monitoring subsea environmen... Read More about Security challenges of Internet of Underwater Things : a systematic literature review.

A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks (2020)
Journal Article
Alaeiyan, M., Dehghantanha, A., Dargahi, T., Conti, M., & Parsa, S. (2020). A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks. ACM transactions on cyber-physical systems, 4(3), 1-22. https://doi.org/10.1145/3351881

The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would... Read More about A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks.

PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications (2019)
Journal Article
Belguith, S., Kaaniche, N., Hammoudeh, M., & Dargahi, T. (2020). PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications. Future Generation Computer Systems, 111, 899-918. https://doi.org/10.1016/j.future.2019.11.012

The ever-growing number of Internet connected devices poses several cybersecurity risks. Most of the exchanged data between the Internet of Things (IoT) devices are not adequately secured due to resource constraints on IoT devices. Attribute Based... Read More about PROUD : verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IoT applications.

A cyber-kill-chain based taxonomy of crypto-ransomware features (2019)
Journal Article
Dargahi, T., Dehghantanha, A., Nikkhah Bahrami, P., Conti, M., Bianchi, G., & Benedetto, L. (2019). A cyber-kill-chain based taxonomy of crypto-ransomware features. Journal of Computer Virology and Hacking Techniques, 15, 277-305. https://doi.org/10.1007/s11416-019-00338-7

In spite of being just a few years old, ransomware is quickly becoming a serious threat to our digital infrastructures, data and services. Majority of ransomware families are requesting for a ransom payment to restore a custodian access or decrypt da... Read More about A cyber-kill-chain based taxonomy of crypto-ransomware features.

A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment (2019)
Journal Article
McKinnel, D., Dargahi, T., Dehghantanha, A., & Choo, K. (2019). A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Computers and Electrical Engineering, 75(May 19), 175-188. https://doi.org/10.1016/j.compeleceng.2019.02.022

Vulnerability assessment (e.g., vulnerability identification and exploitation; also referred to as penetration testing) is a relatively mature industry, although attempting to keep pace with the diversity of computing and digital devices that need to... Read More about A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.

A systematic literature review of blockchain cyber security (2019)
Journal Article
Taylor, P., Dargahi, T., Dehghantanha, A., Parizi, R., & Choo, K. (2020). A systematic literature review of blockchain cyber security. Digital Communications and Networks, 6(2), 147-156. https://doi.org/10.1016/j.dcan.2019.01.005

Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. Thi... Read More about A systematic literature review of blockchain cyber security.

Intelligent conditional collaborative private data sharing (2019)
Journal Article
Bianchi, G., Dargahi, T., Caponi, A., & Conti, M. (2019). Intelligent conditional collaborative private data sharing. Future Generation Computer Systems, 96(Jul 19), 1-10. https://doi.org/10.1016/j.future.2019.01.001

With the advent of distributed systems, secure and privacy-preserving data sharing between different entities (individuals or organizations) becomes a challenging issue. There are several real-world scenarios in which different entities are willing t... Read More about Intelligent conditional collaborative private data sharing.

Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure : APT28, RED October, and Regin (2019)
Book Chapter
Mwiki, H., Dargahi, T., Dehghantanha, A., & Choo, K. (2019). Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure : APT28, RED October, and Regin. In D. Gritzalis, M. Theocharidou, & G. Stergiopoulos (Eds.), Critical Infrastructure Security and Resilience : Theories, Methods, Tools and Technologies (221-244). Springer. https://doi.org/10.1007/978-3-030-00024-0_12

Many organizations still rely on traditional methods to protect themselves against various cyber threats. This is effective when they deal with traditional threats, but it is less effective when it comes to Advanced Persistent Threat (APT) actors. AP... Read More about Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure : APT28, RED October, and Regin.

A hierarchical key pre-distribution scheme for fog networks (2018)
Journal Article
Nikkhah Bahrami, P., Javadi, H., Dargahi, T., Dehghantanha, A., & Choo, K. (2019). A hierarchical key pre-distribution scheme for fog networks. Concurrency and Computation: Practice and Experience, 31(22), e4776. https://doi.org/10.1002/cpe.4776

Security in fog computing is multi-faceted, and one particular challenge is establishing a secure communication channel between fog nodes and end devices. This emphasizes the importance of designing efficient and secret key distribution scheme to fac... Read More about A hierarchical key pre-distribution scheme for fog networks.

Leveraging machine learning techniques for Windows ransomware network traffic detection (2018)
Book Chapter
Alhawi, O., Baldwin, J., & Dehghantanha, A. (2018). Leveraging machine learning techniques for Windows ransomware network traffic detection. In A. Dehghantanha, M. Conti, & T. Dargahi (Eds.), Cyber Threat Intelligence (93-106). Springer. https://doi.org/10.1007/978-3-319-73951-9_5

Ransomware has become a significant global threat with the ransomware-as-a-service model enabling easy availability and deployment, and the potential for high revenues creating a viable criminal business model. Individuals, private companies or publi... Read More about Leveraging machine learning techniques for Windows ransomware network traffic detection.

MDSClone : multidimensional scaling aided clone detection in Internet of Things (2018)
Journal Article
Po-Yen, L., Chia-Mu, Y., Dargahi, T., Mauro, C., & Giuseppe, B. (2018). MDSClone : multidimensional scaling aided clone detection in Internet of Things. IEEE Transactions on Information Forensics and Security, 99, https://doi.org/10.1109/TIFS.2018.2805291

Cloning is a very serious threat in the Internet of Things (IoT), owing to the simplicity for an attacker to gather configuration and authentication credentials from a non-tamper-proof node, and replicate it in the network. In this paper, we propose... Read More about MDSClone : multidimensional scaling aided clone detection in Internet of Things.

A survey on the security of stateful SDN data planes (2017)
Journal Article
Dargahi, T., Caponi, A., Ambrosin, M., Bianchi, G., & Conti, M. (2017). A survey on the security of stateful SDN data planes. Communications Surveys and Tutorials, IEEE Communications Society, 19(3), 1701-1725. https://doi.org/10.1109/COMST.2017.2689819

Software-Defined Networking (SDN) emerged as an attempt to introduce network innovations faster, and to radically simplify and automate the management of large networks. SDN traditionally leverages OpenFlow as device-level abstraction. Since OpenFlo... Read More about A survey on the security of stateful SDN data planes.

On the feasibility of attribute-based encryption on Internet of Things devices (2016)
Journal Article
AMbrosin, M., Anzanpour, A., Conti, M., Dargahi, T., Rahimi Moosavi, S., Rahmani, A., & Liljeberg, P. (2016). On the feasibility of attribute-based encryption on Internet of Things devices. IEEE Micro, 36(6), 25-35. https://doi.org/10.1109/MM.2016.101

Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far. This article explores such feasibility for... Read More about On the feasibility of attribute-based encryption on Internet of Things devices.

ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs (2016)
Journal Article
Dargahi, T., Ambrosin, M., Conti, M., & Asokan, N. (2016). ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs. Computer Communications, 85, 1-13. https://doi.org/10.1016/j.comcom.2016.03.002

The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider... Read More about ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs.

On the feasibility of attribute-based encryption on smartphone devices (2015)
Presentation / Conference
Ambrosin, M., Conti, M., & Dargahi, T. (2015, May). On the feasibility of attribute-based encryption on smartphone devices. Presented at 2015 Workshop on IoT challenges in Mobile and Industrial Systems (IoT-Sys'15), Florence, Italy

Attribute-Based Encryption (ABE) is a powerful cryptographic tool that allows fine-grained access control over data. Due to its features, ABE has been adopted in several applications, such as encrypted storage or access control systems. Recently, res... Read More about On the feasibility of attribute-based encryption on smartphone devices.