Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Dargahi, Tooska
add a person with the name Dargahi, Tooska
 

Other publications of authors with the same name

A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment., , , and . Computers & Electrical Engineering, (2019)Intelligent conditional collaborative private data sharing., , , and . Future Generation Comp. Syst., (2019)Bibliometric Analysis on the Rise of Cloud Security., , and . Handbook of Big Data and IoT Security, Springer, (2019)Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats., , and . Handbook of Big Data and IoT Security, Springer, (2019)ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs., , , and . Computer Communications, (2016)On the Feasibility of Attribute-Based Encryption on Internet of Things Devices., , , , , , and . CoRR, (2016)Securing Underwater Sensor Networks Against Routing Attacks., , and . Wireless Personal Communications, 96 (2): 2585-2602 (2017)FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication., , , , and . ARES, page 715-724. IEEE Computer Society, (2016)A Cyber-Kill-Chain based taxonomy of crypto-ransomware features., , , , , and . J. Computer Virology and Hacking Techniques, 15 (4): 277-305 (2019)Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures., , , , , and . JIPS, 15 (4): 865-889 (2019)