Follow
Sajad Homayoun
Sajad Homayoun
Postdoc Researcher, Denmark Technical University (DTU)
Verified email at dtu.dk - Homepage
Title
Cited by
Cited by
Year
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE Transactions on Emerging Topics in Computing (In Press) 99, 11, 2017
2022017
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ...
Future Generation Computer Systems 90, 11, 2019
1412019
An OpCode-Based Technique for Polymorphic Internet of Things Malware Detection
H Darabian, A Dehghantanha, S Hashemi, S Homayoun, KKR Choo
Concurrency and Computation: Practice and Experience, 2019
972019
BoTShark: A deep learning approach for botnet traffic detection
S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami
Cyber Threat Intelligence, 137-153, 2018
962018
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
H Darabian, S Homayoun, A Dehghantanha, S Hashemi, H Karimipour, ...
Journal of Grid Computing, 2020
942020
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains
R M. Parizi, S Homayoun, A Yazdinejad, A Dehghantanha, ...
IEEE 32nd Canadian Conference of Electrical and Computer Engineering (IEEE …, 2019
582019
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores
S Homayoun, A Dehghantanha, R M Parizi, KK Raymond Choo
IEEE 32nd Canadian Conference of Electrical and Computer Engineering (IEEE …, 2019
492019
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
H Darabian, A Dehghantanha, S Hashemi, M Taheri, A Azmoodeh, ...
World Wide Web 23, 1241-1260, 2020
402020
Forensics investigation of openflow-based SDN platforms
MK Pandya, S Homayoun, A Dehghantanha
Cyber Threat Intelligence, 281-296, 2018
252018
A website evaluation of travel agencies in Iran: An adoption level and value creation approach
R Sadeghein, F Khoshalhan, S Homayoun
International Journal of Advanced Information Technology 2 (6), 1, 2012
142012
Private cloud storage forensics: Seafile as a case study
YY Teing, S Homayoun, A Dehghantanha, KKR Choo, RM Parizi, ...
Handbook of Big Data and IoT Security, 73-127, 2019
132019
A review on data stream classification approaches
S Homayoun, M Ahmadzadeh
Journal of Advanced Computer Science & Technology 5 (1), 8-13, 2016
132016
Efficient intrusion detection using weighted k-means clustering and naļve bayes classification
Y Emami, M Ahmadzadeh, M Salehi, S Homayoun
Journal of Emerging Trends in Computing and Information Sciences 5 (8), 620-623, 2014
82014
Using machine learning algorithms to predict failure on the PCB surface under corrosive conditions
S Bahrebar, S Homayoun, R Ambat
Corrosion Science 206, 110500, 2022
42022
Deep dive into ransomware threat hunting and intelligence at fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, M Hashemi, R Khayami, ...
Future Generation Computer Systems 90 (Jan 19), 2018
42018
Fault Tolerant Approach for WSN Chain Based Routing Protocols
SH Ahmad Jalili, M Keshtgary
International Journal of Computer Networks and Communications Security 3 (2), 2015
42015
Detecting ambiguous phishing certificates using machine learning
S Homayoun, K Hageman, S Afzal-Houshmand, CD Jensen, ...
2022 International Conference on Information Networking (ICOIN), 1-6, 2022
22022
A Perfect Match: Deep Learning Towards Enhanced Data Trustworthiness in Crowd-Sensing Systems
S Afzal-Houshmand, S Homayoun, T Giannetsos
2021 IEEE International Mediterranean Conference on Communications and …, 2021
22021
Performance analysis of multiple virtualized servers
S Homayoun, A Jalili, M Keshtgari
Computer Engineering and Applications Journal 4 (3), 183-188, 2015
22015
Grid Computing: Strategic Decision Making in Resource Selection
S Mohammadi, S Homayoun, ET Zadeh
International Journal of Computer Science, Engineering and Applications …, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20