UPM Institutional Repository

Items where Author is "Dehghantanha, Ali "

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 34.

Teing, Yee-Yang and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Muda, Zaiton and Abdullah, Mohd Taufik (2019) Greening cloud-enabled big data storage forensics: syncany as a case study. IEEE Transactions on Sustainable Computing, 4 (2). pp. 204-216. ISSN 2377-3782

Teing, Yee Yang and Dehghantanha, Ali and Choo, Raymond Kim Kwang and Yang, Laurence T. (2017) Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study. Computers and Electrical Engineering, 58. 350 - 363. ISSN 0045-7906; ESSN: 1879-0755

Mat Isa, Mohd Anuar and Mahmod, Ramlan and Udzir, Nur Izura and Ab Manan, Jamalul-lail and Dehghantanha, Ali and Shamsuddin, Solahuddin (2017) A formal verification and simulation of Common Criteria Recognition Arrangement (CCRA). World Journal of Modelling and Simulation, 13 (3). 173 - 182. ISSN 1746-7233; ESSN: 2515-1754

Teing, Yee Yang and Dehghantanha, Ali and Choo, Kim-Kwang Raymond and Muda, Zaiton (2016) Investigating America online instant messaging application: data remnants on windows 8.1 client machine. In: Contemporary Digital Forensic Investigations of Cloud and Mobile Application. Syngress Media, Rockland, MA, United States, 21 - 39. ISBN 9780128053034

Daryabar, Farid and Dehghantanha, Ali and Eterovic-Soric, Brett and Choo, Raymond Kim-Kwang (2016) Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices. Australian Journal of Forensic Sciences, 48 (6). pp. 615-642. ISSN 0045-0618; ESSN: 1834-562X

Teing, Yee Yang and Dehghantanha, Ali and Kim-Kwang, Raymond Choo and Muda, Zaiton (2016) Windows instant messaging app forensics: facebook and skype as case studies. PLOS ONE, 11 (3). pp. 1-29. ISSN 1932-6203

Yusoof, Mohd Najwadi and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik and Dehghantanha, Ali (2014) Performance measurement for mobile forensic data acquisition in Firefox OS. International Journal of Cyber-Security and Digital Forensics, 3 (3). pp. 130-140. ISSN 2305-0012

Yusoff, Mohd Najwadi and Mahmod, Ramlan and Dehghantanha, Ali and Abdullah @ Selimun, Mohd Taufik (2014) Advances of mobile forensic procedures in Firefox OS. International Journal of Cyber-Security and Digital Forensics, 3 (4). pp. 183-199. ISSN 2305-0012

Yusoff, Mohd Najwadi and Mahmod, Ramlan and Abdullah @ Selimun, Mohd Taufik and Dehghantanha, Ali (2014) Mobile forensic data acquisition in Firefox OS. In: 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 29 Apr.-1 May 2014, Lebanese University Campus of Hadath, Beirut, Lebanon. (pp. 27-31).

Dehghantanha, Ali and Franke, Katrin (2014) Privacy-respecting digital investigation. In: 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST), 23-24 July 2014, Ryerson University, Toronto, Canada. (pp. 129-138).

Yusoff, Mohd Najwadi and Mahmod, Ramlan and Dehghantanha, Ali and Abdullah @ Selimun, Mohd Taufik (2014) An approach for forensic investigation in Firefox OS. In: 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 29 Apr.-1 May 2014, Lebanese University Campus of Hadath, Beirut, Lebanon. (pp. 22-26).

Dehghantanha, Ali and Damshenas, Mohsen and Mahmod, Ramlan (2014) A survey on digital forensics trends. International Journal of Cyber-Security and Digital Forensics, 3 (4). pp. 209-234. ISSN 2305-0012

Shaerpour, Kaveh and Dehghantanha, Ali and Mahmod, Ramlan (2013) A survey on cyber-crime prediction techniques. International Journal of Advancements in Computing Technology, 5 (14). pp. 52-61. ISSN 2005-8039; ESSN: 2233-9337

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) A survey on privacy impacts of digital investigation. Journal of Next Generation Information Technology, 4 (8). pp. 57-68. ISSN 2092-8637; ESSN: 2233-9388

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) Analysis of known and unknown malware bypassing techniques. International Journal of Information Processing and Management, 4 (6). pp. 50-59. ISSN 2093-4009; ESSN: 2233-940X

Aminnezhad, Asou and Dehghantanha, Ali and Abdullah@Selimun, Mohd Taufik and Damshenas, Mohsen (2013) Cloud forensics issues and oppurtunities. International Journal of Information Processing and Management, 4 (4). pp. 76-85. ISSN 2093-4009; ESSN: 2233-940X

Damshenas, Mohsen and Dehghantanha, Ali and Mahmoud, Ramlan and Shamsuddin, Solahuddin (2013) Cloud computing and conflicts with digital forensic investigation. International Journal of Digital Content Technology and its Applications, 7 (9). pp. 543-553. ISSN 1975-9339; ESSN: 2233-9310

Dezfouli, Farhood Norouzizadeh and Dehghantanha, Ali and Mahmod, Ramlan and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin (2013) A data-centric model for smartphone security. International Journal of Advancements in Computing Technology, 5 (9). pp. 9-17. ISSN 2005-8039; ESSN: 2233-9337

Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura (2013) Towards green frameworks for digital forensics investigation. Journal of Convergence Information Technology, 8 (2). pp. 669-678. ISSN 1975-9320; ESSN: 2233-9299

Ganji, Majid and Dehghantanha, Ali and Udzir, Nur Izura and Damshenas, Mohsen (2013) Cyber warfare trends and future. Advances in Information Sciences and Service Sciences, 5 (13). pp. 1-10. ISSN 1976-3700; ESSN: 2233-9345

Dezfoli, Farhood Norouzizadeh and Dehghantanha, Ali and Mahmoud, Ramlan and Mohd Sani, Nor Fazlida and Daryabar, Farid (2013) Digital forensics trends and future. International Journal of Cyber-Security and Digital Forensics, 2 (2). pp. 48-76. ISSN 2305-0012

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) A survey about impacts of cloud computing on digital forensics. International Journal of Cyber-Security and Digital Forensics, 2 (2). pp. 77-94. ISSN 2305-0012

Damshenas, Mohsen and Dehghantanha, Ali and Mahmod, Ramlan (2013) A survey on malware propagation, analysis, and detection. International Journal of Cyber-Security and Digital Forensics, 2 (4). pp. 10-29. ISSN 2305-0012

Udzir, Nur Izura and Wood, Alan and Muda, Zaiton and Dehghantanha, Ali and Abdullah @ Selimun, Mohd Taufik and Abdullah, Azizol (2012) Access control in open distributed systems. In: Workshop on Information Technology and Applications (WIT-A 2012), 4-5 June 2012, Istanbul, Turkey. (pp. 1-5).

Damshenas, Mohsen and Dehghantanha, Ali and Mahmod, Ramlan and Shamsuddin, Solahuddin (2012) Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 190-194).

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin (2012) Towards secure model for SCADA systems. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 60-64).

Ibrahim, Mohammed and Abdullah @ Selimun, Mohd Taufik and Dehghantanha, Ali (2012) VoIP evidence model: a new forensic method for investigating VoIP malicious attacks. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 201-206).

Dezfouli, Farhood Norouzizadeh and Dehghantanha, Ali and Mahmod, Ramlan and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin (2012) Volatile memory acquisition using backup for forensic investigation. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 186-189).

Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura (2011) Investigation of bypassing malware defences and malware detections. In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec. 2011, Melaka, Malaysia. (pp. 173-178).

Dehghantanha, Ali and Udzir, Nur Izura and Mahmod, Ramlan (2011) Towards data centric mobile security. In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec. 2011, Melaka, Malaysia. (pp. 62-67).

Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura and Ahmad Zulkarnain, Zuriati (2009) UPEM : user-centered privacy evaluation model in pervasive computing system. Ubiquitous Computing and Communication Journal, 4 (4). pp. 50-57. ISSN 1992-8424; ESSN: 1992-8424‎

Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura and Ahmad Zulkarnain, Zuriati (2009) UPEM : user-centered privacy evaluation model in pervasive computing systems. Ubiquitous Computing and Communication Journal, 4 (4). pp. 50-57. ISSN 1992-8424

Dehghantanha, Ali and Mahmod, Ramlan and Udzir, Nur Izura (2009) A XML based, user-centered privacy model in pervasive computing systems. International Journal of Computer Science and Network Security, 9 (10). pp. 167-173. ISSN 1738-7906

Dehghantanha, Ali (2008) Xml-Based Privacy Model in Pervasive Computing. Masters thesis, Universiti Putra Malaysia.

This list was generated on Fri Nov 29 18:09:20 2024 +08.