Follow
Amin Azmoodeh
Amin Azmoodeh
Ph.D. of Computational Science, University of Guelph
Verified email at uoguelph.ca
Title
Cited by
Cited by
Year
Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning
A Azmoodeh, A Dehghantanha, KKR Choo
IEEE Transactions on Sustainable Computing, 2018
3822018
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KK Raymond Choo
Journal of Ambient Intelligence and Humanized Computing, 2017
3112017
Fuzzy pattern tree for edge malware detection and categorization in IoT
EM Dovom, A Azmoodeh, A Dehghantanha, DE Newton, RM Parizi, ...
Journal of Systems Architecture 97, 1-7, 2019
2022019
An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic
M Saharkhizan, A Azmoodeh, A Dehghantanha, KKR Choo, RM Parizi
IEEE Internet of Things Journal 7 (9), 8852-8859, 2020
1452020
Graph embedding as a new approach for unknown malware detection
H Hashemi, A Azmoodeh, A Hamzeh, S Hashemi
Journal of Computer Virology, 1-14, 2016
1062016
A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures
A Yazdinejad, B Zolfaghari, A Azmoodeh, A Dehghantanha, H Karimipour, ...
Applied Sciences 11 (16), 7518, 2021
712021
Big data and internet of things security and forensics: Challenges and opportunities
A Azmoodeh, A Dehghantanha, KKR Choo
Handbook of Big Data and IoT Security, 1-4, 2019
482019
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
H Darabian, A Dehghantanha, S Hashemi, M Taheri, A Azmoodeh, ...
World Wide Web 23, 1241-1260, 2020
402020
MVFCC: A multi-view fuzzy consensus clustering model for malware threat attribution
H Haddadpajouh, A Azmoodeh, A Dehghantanha, RM Parizi
IEEE Access 8, 139188-139198, 2020
322020
A hybrid deep generative local metric learning method for intrusion detection
M Saharkhizan, A Azmoodeh, H HaddadPajouh, A Dehghantanha, ...
Handbook of Big Data Privacy, 343-357, 2020
192020
Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform
K Bolouri, A Azmoodeh, A Dehghantanha, M Firouzmand
Handbook of Big Data and IoT Security, 211-223, 2019
152019
IIoT deep malware threat hunting: from adversarial example detection to adversarial scenario detection
B Esmaeili, A Azmoodeh, A Dehghantanha, H Karimipour, B Zolfaghari, ...
IEEE Transactions on Industrial Informatics 18 (12), 8477-8486, 2022
142022
Big data and privacy: Challenges and opportunities
A Azmoodeh, A Dehghantanha
Handbook of Big Data Privacy, 1-5, 2020
112020
Active spectral botnet detection based on eigenvalue weighting
A Azmoodeh, A Dehghantanha, RM Parizi, S Hashemi, B Gharabaghi, ...
Handbook of Big Data Privacy, 385-397, 2020
112020
Blockchain in cybersecurity realm: an overview
RM Parizi, A Dehghantanha, A Azmoodeh, KKR Choo
Blockchain Cybersecurity, Trust and Privacy, 1-5, 2020
112020
CyberPDF: smart and secure coordinate-based automated health PDF data batch extraction
RM Parizi, L Guo, Y Bian, A Dehghantanha, A Azmoodeh, KKR Choo
Proceedings of the 2018 IEEE/ACM International Conference on Connected …, 2018
62018
Cybersecurity in smart farming: canada market research
A Dehghantanha, H Karimipour, A Azmoodeh
arXiv preprint arXiv:2104.05183, 2021
52021
RAT hunter: Building robust models for detecting remote access trojans based on optimum hybrid features
MM BehradFar, H HaddadPajouh, A Dehghantanha, A Azmoodeh, ...
Handbook of Big Data Privacy, 371-383, 2020
42020
Proactive Detection of Query-based Adversarial Scenarios in NLP Systems
M Maghsoudimehrabani, A Azmoodeh, A Dehghantanha, B Zolfaghari, ...
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security …, 2022
32022
Deep Fake Detection, Deterrence and Response: Challenges and Opportunities
A Azmoodeh, A Dehghantanha
arXiv preprint arXiv:2211.14667, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20