Skip to main content

Research Repository

Advanced Search

Privacy4Forensics

People Involved

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence (2017)
Journal Article
Kiwia, D., Dehghantanha, A., Choo, K., & Slaughter, J. (2017). A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. Journal of Computational Science, 27, 394-409

Malware such as banking Trojans are popular with financially-motivated cybercriminals. Detection of banking Trojans remains a challenging task, due to the constant evolution of techniques used to obfuscate and circumvent existing detection and securi... Read More about A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.

Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks (2017)
Journal Article
Epiphaniou, G., Karadimas, P., Dhouha Kbaier Ben, I., Al-Khateeb, H., Dehghantanha, A., & Choo, K. (2018). Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks. IEEE Internet of Things, 5(4), 2496-2505. https://doi.org/10.1109/JIOT.2017.2764384

The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in a physical-layer key agreement scheme, non-reciprocity due to inhere... Read More about Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks.

Know abnormal, find evil : frequent pattern mining for ransomware threat hunting and intelligence (2017)
Journal Article
Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., & Khayami, R. (2020). Know abnormal, find evil : frequent pattern mining for ransomware threat hunting and intelligence. IEEE Transactions on Emerging Topics in Computing, 8(2), 341-351. https://doi.org/10.1109/TETC.2017.2756908

Emergence of crypto-ransomware has significantly
changed the cyber threat landscape. A crypto ransomware
removes data custodian access by encrypting valuable data
on victims’ computers and requests a ransom payment to reinstantiate custodian acces... Read More about Know abnormal, find evil : frequent pattern mining for ransomware threat hunting and intelligence.

Exploit kits : the production line of the cybercrime economy? (2016)
Book Chapter
economy?. In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) 15-17 Nov. 2015 (23-27). IEEE. https://doi.org/10.1109/InfoSec.2015.7435501

The annual cost of Cybercrime to the global economy is estimated to be around $400 billion, in support of which Exploit Kits have been providing enabling technology since 2006. This paper reviews the recent developments in Exploit Kit capability and... Read More about Exploit kits : the production line of the cybercrime economy?.