Skip to main content

Research Repository

Advanced Search

Privacy4Forensics

People Involved

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence (2017)
Journal Article
Kiwia, D., Dehghantanha, A., Choo, K., & Slaughter, J. (2017). A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. Journal of Computational Science, 27, 394-409

Malware such as banking Trojans are popular with financially-motivated cybercriminals. Detection of banking Trojans remains a challenging task, due to the constant evolution of techniques used to obfuscate and circumvent existing detection and securi... Read More about A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.

Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks (2017)
Journal Article
Epiphaniou, G., Karadimas, P., Dhouha Kbaier Ben, I., Al-Khateeb, H., Dehghantanha, A., & Choo, K. (2018). Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks. IEEE Internet of Things, 5(4), 2496-2505. https://doi.org/10.1109/JIOT.2017.2764384

The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in a physical-layer key agreement scheme, non-reciprocity due to inhere... Read More about Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks.

Know abnormal, find evil : frequent pattern mining for ransomware threat hunting and intelligence (2017)
Journal Article
Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., & Khayami, R. (2020). Know abnormal, find evil : frequent pattern mining for ransomware threat hunting and intelligence. IEEE Transactions on Emerging Topics in Computing, 8(2), 341-351. https://doi.org/10.1109/TETC.2017.2756908

Emergence of crypto-ransomware has significantly
changed the cyber threat landscape. A crypto ransomware
removes data custodian access by encrypting valuable data
on victims’ computers and requests a ransom payment to reinstantiate custodian acces... Read More about Know abnormal, find evil : frequent pattern mining for ransomware threat hunting and intelligence.