default search action
Hamed Haddad Pajouh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Meysam Ghahramani, Hamed HaddadPajouh, Reza Javidan, Saru Kumari:
VQR: vulnerability analysis in quadratic residues-based authentication protocols. J. Ambient Intell. Humaniz. Comput. 14(6): 7559-7574 (2023) - 2021
- [j9]Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Mohammed Aledhari, Hadis Karimipour:
A survey on internet of things security: Requirements, challenges, and solutions. Internet Things 14: 100129 (2021) - [j8]Hamed HaddadPajouh, Alireza Mohtadi, Ali Dehghantanha, Hadis Karimipour, Xiaodong Lin, Kim-Kwang Raymond Choo:
A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer. IEEE Internet Things J. 8(6): 4540-4547 (2021) - 2020
- [j7]Hamed Haddad Pajouh, Amin Azmoodeh, Ali Dehghantanha, Reza M. Parizi:
MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution. IEEE Access 8: 139188-139198 (2020) - [j6]Abbas Yazdinejad, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava, Mu-Yen Chen:
Cryptocurrency malware hunting: A deep Recurrent Neural Network approach. Appl. Soft Comput. 96: 106630 (2020) - [j5]Hamed HaddadPajouh, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi:
AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things. Neural Comput. Appl. 32(20): 16119-16133 (2020) - [p6]Abdulrahman Al-Abassi, Hadis Karimipour, Hamed Haddad Pajouh, Ali Dehghantanha, Reza M. Parizi:
Industrial Big Data Analytics: Challenges and Opportunities. Handbook of Big Data Privacy 2020: 37-61 - [p5]Suby Singh, Hadis Karimipour, Hamed HaddadPajouh, Ali Dehghantanha:
Artificial Intelligence and Security of Industrial Control Systems. Handbook of Big Data Privacy 2020: 121-164 - [p4]Mahdis Saharkhizan, Amin Azmoodeh, Hamed HaddadPajouh, Ali Dehghantanha, Reza M. Parizi, Gautam Srivastava:
A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection. Handbook of Big Data Privacy 2020: 343-357 - [p3]Mohammad Nassiri, Hamed HaddadPajouh, Ali Dehghantanha, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava:
Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach. Handbook of Big Data Privacy 2020: 359-370 - [p2]Mohammad Mehdi BehradFar, Hamed HaddadPajouh, Ali Dehghantanha, Amin Azmoodeh, Hadis Karimipour, Reza M. Parizi, Gautam Srivastava:
RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features. Handbook of Big Data Privacy 2020: 371-383
2010 – 2019
- 2019
- [j4]Hamed Haddad Pajouh, Reza Javidan, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 7(2): 314-323 (2019) - [p1]Reyhaneh HosseiniNejad, Hamed Haddad Pajouh, Ali Dehghantanha, Reza M. Parizi:
A Cyber Kill Chain Based Analysis of Remote Access Trojans. Handbook of Big Data and IoT Security 2019: 273-299 - 2018
- [j3]Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener. Comput. Syst. 85: 88-96 (2018) - [j2]Hamed Haddad Pajouh, Ali Dehghantanha, Raouf Khayami, Kim-Kwang Raymond Choo:
Intelligent OS X malware threat detection with code inspection. J. Comput. Virol. Hacking Tech. 14(3): 213-223 (2018) - 2017
- [j1]Hamed Haddad Pajouh, Gholamhossein Dastghaibyfard, Sattar Hashemi:
Two-tier network anomaly detection model: a machine learning approach. J. Intell. Inf. Syst. 48(1): 61-74 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint