-
1Academic JournalArtificial Intelligence-based cybersecurity for the Metaverse: research challenges and opportunities
المؤلفون: Awadallah, A., Eledlebi, K., Zemerly, J., Puthal, P., Damiani, E., Taha, K., Kim, T.-Y., Yoo, Paul, Choo, K.-K.R., Yim, M.-S., Yeun, C.Y.
مصطلحات موضوعية: School of Computing and Mathematical Sciences
وصف الملف: text
Relation: https://eprints.bbk.ac.uk/id/eprint/54402/1/Artificial_Intelligence-Based_Cybersecurity_for_the_Metaverse_Research_Challenges_and_Opportunities.pdf; Awadallah, A. and Eledlebi, K. and Zemerly, J. and Puthal, P. and Damiani, E. and Taha, K. and Kim, T.-Y. and Yoo, Paul and Choo, K.-K.R. and Yim, M.-S. and Yeun, C.Y. (2024) Artificial Intelligence-based cybersecurity for the Metaverse: research challenges and opportunities. IEEE Communications Surveys & Tutorials , ISSN 1553-877X.
-
2Academic Journal
المؤلفون: Korać, Dragan, Damjanović, Boris, Simić, Dejan, Choo, K.-K.R.
المصدر: Journal of King Saud University - Computer and Information Sciences
مصطلحات موضوعية: Work from home, Hybrid XSS attack (HYXSSA), Fusion, Cybersecurity, Cross-site scripting (XSS), Attack vector
Relation: https://rfos.fon.bg.ac.rs/handle/123456789/2399; conv_3741; 000999620800024
-
3Academic Journal
المؤلفون: Choo, K. K.R., Yan, Z., Meng, W.
المساهمون: University of Texas at San Antonio, Network Security and Trust, Danmarks Tekniske Universitet, Department of Communications and Networking, Aalto-yliopisto, Aalto University
مصطلحات موضوعية: Blockchain Privacy, Blockchain Security, Industrial Internet of Things Privacy, Industrial Internet of Things Security
وصف الملف: application/pdf
Relation: IEEE Transactions on Industrial Informatics; Volume 16, issue 6; Choo , K K R , Yan , Z & Meng , W 2020 , ' Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities ' , IEEE Transactions on Industrial Informatics , vol. 16 , no. 6 , 8957273 , pp. 4119-4121 . https://doi.org/10.1109/TII.2020.2966068; PURE UUID: e60ec5b7-d0bb-4e0b-9269-a9a15be507ed; PURE ITEMURL: https://research.aalto.fi/en/publications/e60ec5b7-d0bb-4e0b-9269-a9a15be507ed; PURE LINK: http://www.scopus.com/inward/record.url?scp=85082014624&partnerID=8YFLogxK; PURE FILEURL: https://research.aalto.fi/files/43715350/Choo_Blockchain_in_industrial_IoT.pdf; https://aaltodoc.aalto.fi/handle/123456789/45233; URN:NBN:fi:aalto-202006254190
-
4Academic Journal
المؤلفون: Azmoodeh, A., Dehghantanha, A., Conti, M., Choo, K.-K.R.
وصف الملف: text
Relation: https://eprints.whiterose.ac.uk/128367/7/10.1007%252Fs12652-017-0558-5.pdf; Azmoodeh, A., Dehghantanha, A. orcid.org/0000-0002-9294-7554 , Conti, M. et al. (1 more author) (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. Journal of Ambient Intelligence and Humanized Computing, 9 (4). pp. 1141-1152. ISSN 1868-5137
-
5Academic Journal
المؤلفون: Pajouh, H.H., Dehghantanha, A., Khayami, R., Choo, K.-K.R.
وصف الملف: text
Relation: https://eprints.whiterose.ac.uk/128371/7/10.1007%252Fs11416-017-0307-5.pdf; Pajouh, H.H., Dehghantanha, A. orcid.org/0000-0002-9294-7554 , Khayami, R. et al. (1 more author) (2018) Intelligent OS X malware threat detection with code inspection. Journal of Computer Virology and Hacking Techniques, 14 (3). pp. 213-223. ISSN 2274-2042
-
6Academic Journal
المؤلفون: Milosevic, N., Dehghantanha, A., Choo, K.-K.R.
وصف الملف: text
Relation: https://eprints.whiterose.ac.uk/128366/1/MalwareAnalysis.pdf; Milosevic, N., Dehghantanha, A. and Choo, K.-K.R. (2017) Machine learning aided Android malware classification. Computers & Electrical Engineering, 61. pp. 266-274. ISSN 0045-7906
-
7Book
المؤلفون: Christopher, L., Choo, K.-K.R., Dehghantanha, A.
المساهمون: Choo, K.-K.R., Dehghantanha, A.
Relation: http://eprints.whiterose.ac.uk/128359/
الاتاحة: http://eprints.whiterose.ac.uk/128359/
-
8Book
المؤلفون: Ogazi-Onyemaechi, B.C., Dehghantanha, A., Choo, K.-K.R.
المساهمون: Choo, K.-K.R., Dehghantanha, A.
Relation: Ogazi-Onyemaechi, B.C., Dehghantanha, A. and Choo, K.-K.R. (2017) Performance of android forensics data recovery tools. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Syngress , pp. 91-110. ISBN 9780128053034
الاتاحة: https://eprints.whiterose.ac.uk/130564/
-
9Book
المؤلفون: Mohtasebi, S., Dehghantanha, A., Choo, K.-K.R.
المساهمون: Choo, K.-K.R., Dehghantanha, A.
Relation: Mohtasebi, S., Dehghantanha, A. and Choo, K.-K.R. (2017) Cloud storage forensics: analysis of data remnants on SpiderOak, JustCloud, and pCloud. In: Choo, K.-K.R. and Dehghantanha, A., (eds.) Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier , pp. 205-246. ISBN 978-0-12-805303-4
-
10Academic Journal
المؤلفون: Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., Khayami, R., Choo, K.-K.R., Newton, D.E.
المصدر: Homayoun , S , Dehghantanha , A , Ahmadzadeh , M , Hashemi , S , Khayami , R , Choo , K-KR & Newton , D E 2019 , ' DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer ' , Future Generation Computer Systems . https://doi.org/10.1016/j.future.2018.07.045
-
11Academic JournalRobust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning
المؤلفون: Dehghantanha, A., Azmoodeh , A., Choo, K.-K.R.
وصف الملف: text
Relation: https://eprints.whiterose.ac.uk/128429/1/Internet%20Of%20Thing%20Malware%20Detection%20Based%20on%20Deep%20Eigenspace%20Learning.pdf; Dehghantanha, A., Azmoodeh , A. and Choo, K.-K.R. (2019) Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning. IEEE Transactions on Sustainable Computing, 4 (1). pp. 88-95. ISSN 2377-3782
-
12Book
المؤلفون: Schiliro, F., Choo, K.-K.R.
المصدر: Mobile Security and Privacy ; page 85-99 ; ISBN 9780128046296
-
13Book
المؤلفون: Ariffin, A., Choo, K.-K.R., Yunos, Z.
المصدر: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications ; page 147-162 ; ISBN 9780128053034
-
14Book
المؤلفون: Au, M.H., Choo, K.-K.R.
المصدر: Mobile Security and Privacy ; page 1-4 ; ISBN 9780128046296
-
15Book
المؤلفون: Chia, C., Choo, K.-K.R., Fehrenbacher, D.
المصدر: Mobile Security and Privacy ; page 67-83 ; ISBN 9780128046296
-
16Book
المؤلفون: Tassone, C., Martini, B., Choo, K.-K.R.
المصدر: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications ; page 163-184 ; ISBN 9780128053034
-
17Book
المؤلفون: Choo, K.-K.R., Dehghantanha, A.
المصدر: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications ; page 1-6 ; ISBN 9780128053034
-
18Book
المؤلفون: Au, M.H., Chia, C., Choo, K.-K.R., Chow, K.-P., Fang, J., Fehrenbacher, D., Hayata, F., Hui, L.C.K., Jiang, Z.L., Lau, L., Li, X., Li, S., Liu, D.Y.W., Lo Iacono, L., Lu, X., Luo, X.P., Mohanraj, Y., Nguyen, H.V., Schiliro, F., Tchakounté, F., Tully, S., Walls, J., Xie, Y., Xue, G.Z., Yiu, S.-M., Yu, L.
المصدر: Mobile Security and Privacy ; page vii ; ISBN 9780128046296
-
19Book
المؤلفون: Yang, T.Y., Dehghantanha, A., Choo, K.-K.R., Muda, Z.
المصدر: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications ; page 21-39 ; ISBN 9780128053034
-
20Book
المؤلفون: Christopher, L., Choo, K.-K.R., Dehghantanha, A.
المصدر: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications ; page 111-129 ; ISBN 9780128053034