Up a level |
Group by: Item Type | Date
Jump to: Article | Book Section
Number of items: 13.
Article
- Montasari, R., Hill, R., Parkinson, S., Peltola, P., Hosseinian-Far, A. and Daneshkhah, A. (2020) Digital Forensics : Challenges and Opportunities for Future Studies. International Journal of Organizational and Collective Intelligence (IJOCI). 10(2), pp. 37-53. 1947-9344.
- Esmaeilbeigi, M., Chatrabgoun, O., Hosseinian-Far, A., Montasari, R. and Daneshkhah, A. (2020) A Low Cost and Highly Accurate Technique for Big Data Spatial-Temporal Interpolation. Applied Numerical Mathematics. 153, pp. 492-502. 0168-9274.
- Montasari, R., Hill, R., Hosseinian-Far, A. and Montaseri, F. (2018) Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. International Journal of Electronic Security and Digital Forensics. 1751-911X. (Accepted)
- Montasari, R., Hosseinian-Far, A., Hill, R., Montaseri, F., Sharma, M. and Shabbir, S. (2018) Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? International Journal of Organizational and Collective Intelligence (IJOCI). 8(2) 1947-9344.
- Montasari, R., Hosseinian-Far, A., Hill, R., Montaseri, F., Sharma, M. and Shabbir, S. (2018) Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? International Journal of Organizational and Collective Intelligence (IJOCI). 8(2) 1947-9344.
Book Section
- Ogunro, B., Hosseinian Far, A. and Sarwar, D. (2022) Are We in Trouble? An exploration on Crime during Natural Disasters and Pandemics. In: Jahankhani, H., Kendzierskyj, S., Montasari, R. and Chelvachandran, N. (eds.) Social Media Analytics, Strategies and Governance :. CRC Press. pp. 172-190.
- Sedighi, T., Montasari, R. and Hosseinian Far, A. (2022) The Application of Machine Learning Algorithms in Classification of Malicious Websites. In: Montasari, R., Carroll, F., Mitchell, I., Hara, S. and Bolton-King, R. (eds.) Privacy, Security And Forensics in The Internet of Things (IoT) :. Cham: Springer. pp. 131-147.
- Montasari, R., Carroll, F., Macdonald, S., Jahankhani, H., Hosseinian Far, A. and Daneshkhah, A. (2020) Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence. In: Digital Forensic Investigation of Internet of Things (IoT) Devices :. Cham: Springer. pp. 47-64.
- Montasari, R., Daneshkhah, A., Jahankhani, H. and Hosseinian-Far, A. (2020) Cloud Computing Security: Hardware-Based Attacks and Countermeasures. In: Digital Forensic Investigation of Internet of Things (IoT) Devices :. Cham: Springer. pp. 155-167.
- Hosseinian-Far, A., Montasari, R., Hill, R. and Carpenter, V. (2019) The Standardised Digital Forensic Investigation Process Model (SDFIPM). In: Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. and Al-Khateeb, H. (eds.) Blockchain and Clinical Trial : Securing Patient Data. Springer. pp. 169-209.
- Montasari, R., Hosseinian-Far, A. and Hill, R. (2018) Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments. In: Masys, A. J. S., Panagiotis, K. and Morse, E. C. (eds.) Advanced Sciences and Technologies for Security Applications :. Springer.
- Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Chatrabgoun, O. and Montasari, R. (2018) Crime data mining, threat analysis and prediction. In: Jahankhani, H. (ed.) Cyber Criminology. Springer. (Accepted)
- Montasari, R., Hosseinian-Far, A. and Hill, R. (2018) Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments. In: Jahankhani, H. (ed.) Cyber Criminology. Springer. (Accepted)