Search Results for author: Ali Dehghantanha

Found 15 papers, 2 papers with code

Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks

no code implementations26 Oct 2023 Ehsan Nowroozi, Samaneh Ghelichkhani, Imran Haider, Ali Dehghantanha

Convolutional neural networks (CNNs) models play a vital role in achieving state-of-the-art performances in various technological fields.

Deep Fake Detection, Deterrence and Response: Challenges and Opportunities

no code implementations26 Nov 2022 Amin Azmoodeh, Ali Dehghantanha

Afterward, we offer a solution that is capable of 1) making our AI systems robust against deepfakes during development and deployment phases; 2) detecting video, image, audio, and textual deepfakes; 3) identifying deepfakes that bypass detection (deepfake hunting); 4) leveraging available intelligence for timely identification of deepfake campaigns launched by state-sponsored hacking teams; 5) conducting in-depth forensic analysis of identified deepfake payloads.

Face Swapping

A Survey of Machine Learning Techniques in Adversarial Image Forensics

1 code implementation19 Oct 2020 Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo

Image forensic plays a crucial role in both criminal investigations (e. g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (e. g., defamation).

BIG-bench Machine Learning Image Forensics

An Ensemble Deep Learning-based Cyber-Attack Detection in Industrial Control System

no code implementations2 May 2020 Abdulrahman Al-Abassi, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi

The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes.

Cyber Attack Detection Intrusion Detection +1

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

1 code implementation3 Aug 2018 Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke

Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.

Cryptography and Security

Internet of Things Security and Forensics: Challenges and Opportunities

no code implementations27 Jul 2018 Mauro Conti, Ali Dehghantanha, Katrin Franke, Steve Watson

The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services.

Cryptography and Security

Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies

no code implementations27 Jul 2018 James Baldwin, Omar M. K. Alhawi, Simone Shaughnessy, Alex Akinbi, Ali Dehghantanha

The emergence of cloud computing technologies has changed the way we store, retrieve, and archive our data.

Cryptography and Security

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study

no code implementations27 Jul 2018 Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo

The pervasive nature of cloud-enabled big data storage solutions introduces new challenges in the identification, collection, analysis, preservation and archiving of digital evidences.

Cryptography and Security

Cloud Storage Forensic: hubiC as a Case-Study

no code implementations26 Jul 2018 Ben Blakeley, Chris Cooney, Ali Dehghantanha, Rob Aspin

This paper presents investigation of hubiC as one of popular cloud platforms running on Microsoft Windows 8. 1.

Cryptography and Security

CloudMe Forensics: A Case of Big-Data Investigation

no code implementations26 Jul 2018 Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo

The issue of increasing volume, variety and velocity of has been an area of concern in cloud forensics.

Cryptography and Security

Performance of Android Forensics Data Recovery Tools

no code implementations15 Sep 2017 Bernard Chukwuemeka Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo

Recovering deleted or hidden data is among most important duties of forensics investigators.

Cryptography and Security

Forensics Analysis of Android Mobile VoIP Apps

no code implementations15 Sep 2017 Tooska Dargahi, Ali Dehghantanha, Mauro Conti

Voice over Internet Protocol (VoIP) applications (apps) provide convenient and low cost means for users to communicate and share information with each other in real-time.

Cryptography and Security

An Android Cloud Storage Apps Forensic Taxonomy

no code implementations25 Jun 2017 M. Amine Chelihi, Akintunde Elutilo, Imran Ahmed, Christos Papadopoulos, Ali Dehghantanha

Many of these investigations include analysing data stored through cloud storage apps which contributes to importance of cloud apps forensics on mobile devices.

Cryptography and Security

Honeypots for employee information security awareness and education training: A conceptual EASY training model

no code implementations25 Jun 2017 Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha

This paper then examines how analysis of honeypot data can be used in employee information security awareness and education training.

Cryptography and Security Computers and Society

Cannot find the paper you are looking for? You can Submit a new open access paper.