Amin Azmoodeh
Amin Azmoodeh
PhD Student of Computational Science, University of Guelph
Verified email at
Cited by
Cited by
Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning
A Azmoodeh, A Dehghantanha, KKR Choo
IEEE Transactions on Sustainable Computing, 2018
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
A Azmoodeh, A Dehghantanha, M Conti, KK Raymond Choo
Journal of Ambient Intelligence and Humanized Computing, 2017
Fuzzy pattern tree for edge malware detection and categorization in IoT
EM Dovom, A Azmoodeh, A Dehghantanha, DE Newton, RM Parizi, ...
Journal of Systems Architecture 97, 1-7, 2019
Graph embedding as a new approach for unknown malware detection
H Hashemi, A Azmoodeh, A Hamzeh, S Hashemi
Journal of Computer Virology, 1-14, 2016
Big data and internet of things security and forensics: challenges and opportunities
A Azmoodeh, A Dehghantanha, KKR Choo
Handbook of Big Data and IoT Security, 1-4, 2019
An ensemble of deep recurrent neural networks for detecting iot cyber attacks using network traffic
M Saharkhizan, A Azmoodeh, A Dehghantanha, KKR Choo, RM Parizi
IEEE Internet of Things Journal 7 (9), 8852-8859, 2020
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
H Darabian, A Dehghantanha, S Hashemi, M Taheri, A Azmoodeh, ...
World Wide Web 23 (2), 1241-1260, 2020
A hybrid deep generative local metric learning method for intrusion detection
M Saharkhizan, A Azmoodeh, H HaddadPajouh, A Dehghantanha, ...
Handbook of Big Data Privacy, 343-357, 2020
Internet of things camera identification algorithm based on sensor pattern noise using color filter array and wavelet transform
K Bolouri, A Azmoodeh, A Dehghantanha, M Firouzmand
Handbook of Big Data and IoT Security, 211-223, 2019
CyberPDF: smart and secure coordinate-based automated health PDF data batch extraction
RM Parizi, L Guo, Y Bian, A Azmoodeh, A Dehghantanha, KKR Choo
2018 IEEE/ACM International Conference on Connected Health: Applications …, 2018
Mvfcc: A multi-view fuzzy consensus clustering model for malware threat attribution
H Haddadpajouh, A Azmoodeh, A Dehghantanha, RM Parizi
IEEE Access 8, 139188-139198, 2020
Blockchain in Cybersecurity Realm: An Overview
RM Parizi, A Dehghantanha, A Azmoodeh, KKR Choo
Blockchain Cybersecurity, Trust and Privacy, 1-5, 2020
Cybersecurity in Smart Farming: Canada Market Research
A Dehghantanha, H Karimipour, A Azmoodeh
arXiv preprint arXiv:2104.05183, 2021
Active spectral botnet detection based on eigenvalue weighting
A Azmoodeh, A Dehghantanha, RM Parizi, S Hashemi, B Gharabaghi, ...
Handbook of Big Data Privacy, 385-397, 2020
Privacy preserving abnormality detection: a deep learning approach
W Han, A Azmoodeh, H Karimipour, S Yang
Handbook of Big Data Privacy, 285-303, 2020
Big data and privacy: Challenges and opportunities
A Azmoodeh, A Dehghantanha
Handbook of Big Data Privacy, 1-5, 2020
To boost graph clustering based on power iteration by removing outliers
A Azmoodeh, S Hashemi
Proceedings of the First International Conference on Advanced Data and …, 2014
RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features
MM BehradFar, H HaddadPajouh, A Dehghantanha, A Azmoodeh, ...
Handbook of Big Data Privacy, 371-383, 2020
2019 Index IEEE Transactions on Sustainable Computing Vol. 4
MT Abdullah, I Ahmad, A Azmoodeh
The system can't perform the operation now. Try again later.
Articles 1–19