default search action
Tooska Dargahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Adeola Adewumi, Mohammad Hammoudeh, Tooska Dargahi, Olamide Jogunola:
Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures. ACNS Workshops (1) 2024: 265-280 - 2023
- [j26]John Anih, Sarvesh Kolekar, Tooska Dargahi, Meisam Babaie, Mohamad Saraee, Jack Wetherell:
Deriving Environmental Risk Profiles for Autonomous Vehicles From Simulated Trips. IEEE Access 11: 38385-38398 (2023) - [j25]Omego Nnamonu, Mohammad Hammoudeh, Tooska Dargahi:
Digital Forensic Investigation of Web-Based Virtual Reality Worlds: Decentraland as a Case Study. IEEE Commun. Mag. 61(9): 72-78 (2023) - [j24]Tom Bolton, Tooska Dargahi, Sana Belguith, Carsten Maple:
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors. ACM Trans. Priv. Secur. 26(3): 31:1-31:29 (2023) - [c13]Olayinka Adeboye, Ahmed Abdullahi, Tooska Dargahi, Meisam Babaie, Mohamad Saraee:
LIFT the AV: Location InFerence aTtack on Autonomous Vehicle Camera Data. CCNC 2023: 1-6 - [c12]Omego Nnamonu, Mohammad Hammoudeh, Tooska Dargahi:
Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework. MetaCom 2023: 94-98 - [c11]Ahmed Danladi Abdullahi, Tooska Dargahi, Mohammad Hammoudeh:
Poster: Continuous Authentication in Highly Connected 6G-enabled Transportation Systems. VNC 2023: 171-172 - 2022
- [j23]Olayinka Adeboye, Tooska Dargahi, Meisam Babaie, Mohamad Saraee, Chia-Mu Yu:
DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy. IEEE Access 10: 124534-124544 (2022) - [j22]Zhipeng Cai, Christian Esposito, Tooska Dargahi, Chaokun Wang:
Graph-powered learning for social networks. Neurocomputing 501: 244-245 (2022) - [j21]Tooska Dargahi, Hossein Ahmadvand, Mansour Naser Alraja, Chia-Mu Yu:
Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge. ACM J. Data Inf. Qual. 14(1): 5:1-5:10 (2022) - 2021
- [j20]Koosha Mohammad Hossein, Mohammad Esmaeil Esmaeili, Tooska Dargahi, Ahmad Khonsari, Mauro Conti:
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications. Comput. Commun. 180: 31-47 (2021) - [j19]Aliyu Gana Yisa, Tooska Dargahi, Sana Belguith, Mohammad Hammoudeh:
Security challenges of Internet of Underwater Things: A systematic literature review. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j18]Tom Bolton, Tooska Dargahi, Sana Belguith, Mabrook S. Al-Rakhami, Ali Hassan Sodhro:
On the Security and Privacy Challenges of Virtual Assistants. Sensors 21(7): 2312 (2021) - [j17]Giuseppe Bianchi, Mauro Conti, Tooska Dargahi, Ali Dehghantanha:
Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence. IEEE Trans. Sustain. Comput. 6(2): 182-183 (2021) - [c10]Hossein Ahmadvand, Tooska Dargahi, Fouzhan Foroutan, Princewill Okorie, Flavio Esposito:
Big Data Processing at the Edge with Data Skew Aware Resource Allocation. NFV-SDN 2021: 81-86 - 2020
- [j16]Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo:
A systematic literature review of blockchain cyber security. Digit. Commun. Networks 6(2): 147-156 (2020) - [j15]Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi:
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications. Future Gener. Comput. Syst. 111: 899-918 (2020) - [j14]Mohammad Hadi Alaeiyan, Ali Dehghantanha, Tooska Dargahi, Mauro Conti, Saeed Parsa:
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks. ACM Trans. Cyber Phys. Syst. 4(3): 31:1-31:22 (2020) - [c9]Stephen Odero, Tooska Dargahi, Haifa Takruri:
Privacy Enhanced Interface Identifiers in IPv6. CSNDSP 2020: 1-6 - [c8]Ahmed Abdullahi, Tooska Dargahi, Meisam Babaie:
Vulnerability Assessment Of Vehicle To Infrastructure Communication: A Case Study Of Unmanned Ground Vehicle. GLOBECOM (Workshops) 2020: 1-6
2010 – 2019
- 2019
- [j13]Dean Richard McKinnel, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Comput. Electr. Eng. 75: 175-188 (2019) - [j12]Pooneh Nikkhah Bahrami, Hamid H. S. Javadi, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A hierarchical key pre-distribution scheme for fog networks. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j11]Giuseppe Bianchi, Tooska Dargahi, Alberto Caponi, Mauro Conti:
Intelligent conditional collaborative private data sharing. Future Gener. Comput. Syst. 96: 1-10 (2019) - [j10]Raúl Vera, Amina F. Shehu, Tooska Dargahi, Ali Dehghantanha:
Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies. Int. J. Multim. Intell. Secur. 3(3): 221-243 (2019) - [j9]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi:
Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures. J. Inf. Process. Syst. 15(4): 865-889 (2019) - [j8]Tooska Dargahi, Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti, Giuseppe Bianchi, Loris Benedetto:
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features. J. Comput. Virol. Hacking Tech. 15(4): 277-305 (2019) - [c7]Koosha Mohammad Hossein, Mohammad Esmaeil Esmaeili, Tooska Dargahi, Ahmad Khonsari:
Blockchain-Based Privacy-Preserving Healthcare Architecture. CCECE 2019: 1-4 - [c6]Robert Marsh, Sana Belguith, Tooska Dargahi:
IoT Database Forensics: An Investigation on HarperDB Security. ICFNDS 2019: 3:1-3:7 - [p9]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi, Lizhe Wang, Fatos Xhafa, Wei Ren:
A layered security architecture based on cyber kill chain against advanced persistent threats. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 135-155 - [p8]Samuel Grooby, Tooska Dargahi, Ali Dehghantanha:
A Bibliometric Analysis of Authentication and Access Control in IoT Devices. Handbook of Big Data and IoT Security 2019: 25-51 - [p7]Samuel Grooby, Tooska Dargahi, Ali Dehghantanha:
Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats. Handbook of Big Data and IoT Security 2019: 225-255 - [p6]Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha:
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study. Handbook of Big Data and IoT Security 2019: 257-272 - [p5]Lim Sze Thiam, Tooska Dargahi, Ali Dehghantanha:
Bibliometric Analysis on the Rise of Cloud Security. Handbook of Big Data and IoT Security 2019: 329-344 - [p4]Shehu Amina, Raúl Vera, Tooska Dargahi, Ali Dehghantanha:
A Bibliometric Analysis of Botnet Detection Techniques. Handbook of Big Data and IoT Security 2019: 345-365 - 2018
- [j7]Tooska Dargahi, Hamid H. S. Javadi, Hosein Shafiei, Payam Mousavi:
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks. Int. J. High Perform. Comput. Netw. 11(2): 117-128 (2018) - [j6]Po-Yen Lee, Chia-Mu Yu, Tooska Dargahi, Mauro Conti, Giuseppe Bianchi:
MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. IEEE Trans. Inf. Forensics Secur. 13(8): 2031-2046 (2018) - [i5]Mauro Conti, Ali Dehghantanha, Tooska Dargahi:
Cyber Threat Intelligence : Challenges and Opportunities. CoRR abs/1808.01162 (2018) - 2017
- [j5]Tooska Dargahi, Alberto Caponi, Moreno Ambrosin, Giuseppe Bianchi, Mauro Conti:
A Survey on the Security of Stateful SDN Data Planes. IEEE Commun. Surv. Tutorials 19(3): 1701-1725 (2017) - [j4]Tooska Dargahi, Hamid H. S. Javadi, Hosein Shafiei:
Securing Underwater Sensor Networks Against Routing Attacks. Wirel. Pers. Commun. 96(2): 2585-2602 (2017) - [c5]Flavio Esposito, Andrej Cvetkovski, Tooska Dargahi, Jianli Pan:
Complete edge function onloading for effective backend-driven cyber foraging. WiMob 2017: 1-8 - [c4]Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi, Nicola Blefari-Melazzi:
On the feasibility of attribute-based encryption for WLAN access control. WiMob 2017: 1-8 - [p3]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Forensics Analysis of Android Mobile VoIP Apps. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 7-20 - [p2]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 185-204 - [p1]Ali Dehghantanha, Tooska Dargahi:
Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 247-283 - [i4]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Investigating Storage as a Service Cloud Platform: pCloud as a Case Study. CoRR abs/1709.04417 (2017) - [i3]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
Forensics Analysis of Android Mobile VoIP Apps. CoRR abs/1709.05296 (2017) - 2016
- [j3]Tooska Dargahi, Moreno Ambrosin, Mauro Conti, N. Asokan:
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs. Comput. Commun. 85: 1-13 (2016) - [j2]Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir-Mohammad Rahmani, Pasi Liljeberg:
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices. IEEE Micro 36(6): 25-35 (2016) - [c3]Luigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi:
FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication. ARES 2016: 715-724 - [c2]Claudio Pisa, Alberto Caponi, Tooska Dargahi, Giuseppe Bianchi, Nicola Blefari-Melazzi:
WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures. HOTPOST@MobiHoc 2016: 31-36 - [i2]Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir-Mohammad Rahmani, Pasi Liljeberg:
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices. CoRR abs/1611.08098 (2016) - 2015
- [j1]Tooska Dargahi, Hamid H. S. Javadi, Mehdi Hosseinzadeh:
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Secur. Commun. Networks 8(8): 1561-1574 (2015) - [c1]Moreno Ambrosin, Mauro Conti, Tooska Dargahi:
On the Feasibility of Attribute-Based Encryption on Smartphone Devices. IoT-Sys@MobiSys 2015: 49-54 - [i1]Moreno Ambrosin, Mauro Conti, Tooska Dargahi:
On the Feasibility of Attribute-Based Encryption on Smartphone Devices. CoRR abs/1504.00619 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint