Northampton Electronic Collection of Theses and Research

Browse by Author or Creator

Group by: Item Type | Date
Jump to: 2022 | 2020 | 2019 | 2018
Number of items: 13.

2022

  1. Ogunro, B., Hosseinian Far, A. and Sarwar, D. (2022) Are We in Trouble? An exploration on Crime during Natural Disasters and Pandemics. In: Jahankhani, H., Kendzierskyj, S., Montasari, R. and Chelvachandran, N. (eds.) Social Media Analytics, Strategies and Governance :. CRC Press. pp. 172-190.
  2. Sedighi, T., Montasari, R. and Hosseinian Far, A. (2022) The Application of Machine Learning Algorithms in Classification of Malicious Websites. In: Montasari, R., Carroll, F., Mitchell, I., Hara, S. and Bolton-King, R. (eds.) Privacy, Security And Forensics in The Internet of Things (IoT) :. Cham: Springer. pp. 131-147.

2020

  1. Montasari, R., Carroll, F., Macdonald, S., Jahankhani, H., Hosseinian Far, A. and Daneshkhah, A. (2020) Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence. In: Digital Forensic Investigation of Internet of Things (IoT) Devices :. Cham: Springer. pp. 47-64.
  2. Montasari, R., Daneshkhah, A., Jahankhani, H. and Hosseinian-Far, A. (2020) Cloud Computing Security: Hardware-Based Attacks and Countermeasures. In: Digital Forensic Investigation of Internet of Things (IoT) Devices :. Cham: Springer. pp. 155-167.
  3. Montasari, R., Hill, R., Parkinson, S., Peltola, P., Hosseinian-Far, A. and Daneshkhah, A. (2020) Digital Forensics : Challenges and Opportunities for Future Studies. International Journal of Organizational and Collective Intelligence (IJOCI). 10(2), pp. 37-53. 1947-9344.
  4. Esmaeilbeigi, M., Chatrabgoun, O., Hosseinian-Far, A., Montasari, R. and Daneshkhah, A. (2020) A Low Cost and Highly Accurate Technique for Big Data Spatial-Temporal Interpolation. Applied Numerical Mathematics. 153, pp. 492-502. 0168-9274.

2019

  1. Hosseinian-Far, A., Montasari, R., Hill, R. and Carpenter, V. (2019) The Standardised Digital Forensic Investigation Process Model (SDFIPM). In: Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. and Al-Khateeb, H. (eds.) Blockchain and Clinical Trial : Securing Patient Data. Springer. pp. 169-209.

2018

  1. Montasari, R., Hosseinian-Far, A. and Hill, R. (2018) Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments. In: Masys, A. J. S., Panagiotis, K. and Morse, E. C. (eds.) Advanced Sciences and Technologies for Security Applications :. Springer.
  2. Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Chatrabgoun, O. and Montasari, R. (2018) Crime data mining, threat analysis and prediction. In: Jahankhani, H. (ed.) Cyber Criminology. Springer. (Accepted)
  3. Montasari, R., Hosseinian-Far, A. and Hill, R. (2018) Policies and innovative self-adaptive techniques to counter adversarial attacks in network and cyber environments. In: Jahankhani, H. (ed.) Cyber Criminology. Springer. (Accepted)
  4. Montasari, R., Hill, R., Hosseinian-Far, A. and Montaseri, F. (2018) Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. International Journal of Electronic Security and Digital Forensics. 1751-911X. (Accepted)
  5. Montasari, R., Hosseinian-Far, A., Hill, R., Montaseri, F., Sharma, M. and Shabbir, S. (2018) Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? International Journal of Organizational and Collective Intelligence (IJOCI). 8(2) 1947-9344.
  6. Montasari, R., Hosseinian-Far, A., Hill, R., Montaseri, F., Sharma, M. and Shabbir, S. (2018) Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? International Journal of Organizational and Collective Intelligence (IJOCI). 8(2) 1947-9344.
This list was generated from NECTAR on Wed Oct 8 09:54:54 2025 BST.