Folgen
Sajjad Dadkhah
Sajjad Dadkhah
Assistant Professor | Cybersecurity Team Leader | Canada Mastercard IoT Research Chair at CIC,UNB
Bestätigte E-Mail-Adresse bei unb.ca - Startseite
Titel
Zitiert von
Zitiert von
Jahr
CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment
ECP Neto, S Dadkhah, R Ferreira, A Zohourian, R Lu, AA Ghorbani
Preprints, 2023
3462023
An effective SVD-based image tampering detection and self-recovery using active watermarking
S Dadkhah, A Abd Manaf, Y Hori, AE Hassanien, S Sadeghi
Signal Processing: Image Communication 29 (10), 1197-1210, 2014
1552014
Towards the development of a realistic multidimensional IoT profiling dataset
S Dadkhah, H Mahdikhani, PK Danso, A Zohourian, KA Truong, ...
2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022
1332022
Internet of things (IoT) security dataset evolution: Challenges and future directions
B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong, S Iqbal, ...
Internet of Things 22, 100780, 2023
1102023
State of the art in passive digital image forgery detection: copy-move image forgery
S Sadeghi, S Dadkhah, HA Jalab, G Mazzola, D Uliyan
Pattern Analysis and Applications 21, 291-306, 2018
742018
Security issues in Internet of Vehicles (IoV): A comprehensive survey
H Taslimasa, S Dadkhah, ECP Neto, P Xiong, S Ray, AA Ghorbani
Internet of Things 22, 100809, 2023
672023
IoT Zigbee device security: A comprehensive review
A Zohourian, S Dadkhah, ECP Neto, H Mahdikhani, PK Danso, ...
Internet of Things 22, 100791, 2023
442023
A survey on IoT profiling, fingerprinting, and identification
M Safi, S Dadkhah, F Shoeleh, H Mahdikhani, H Molyneaux, AA Ghorbani
ACM Transactions on Internet of Things 3 (4), 1-39, 2022
422022
Data breach: analysis, countermeasures and challenges
X Zhang, MM Yadollahi, S Dadkhah, H Isah, DP Le, AA Ghorbani
International Journal of Information and Computer Security 19 (3-4), 402-442, 2022
302022
CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT
S Dadkhah, ECP Neto, R Ferreira, RC Molokwu, S Sadeghi, AA Ghorbani
Internet of Things 28, 101351, 2024
29*2024
Efficient copy-move forgery detection for digital images
S Sadeghi, HA Jalab, S Dadkhah
International Journal of Computer and Information Engineering 6 (11), 1339-1342, 2012
282012
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus
ECP Neto, H Taslimasa, S Dadkhah, S Iqbal, P Xiong, T Rahman, ...
Internet of Things 26, 101209, 2024
252024
Keypoint based authentication and localization of copy-move forgery in digital image
S Sadeghi, HA Jalab, KS Wong, D Uliyan, S Dadkhah
Malaysian Journal of Computer Science 30 (2), 117-133, 2017
232017
A real-time hostile activities analyses and detection system
S Dadkhah, F Shoeleh, MM Yadollahi, X Zhang, AA Ghorbani
Applied Soft Computing, 107175, 2021
222021
Collaborative DDoS detection in distributed multi-tenant IoT using federated learning
ECP Neto, S Dadkhah, AA Ghorbani
2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022
212022
Federated reinforcement learning in IoT: applications, opportunities and open challenges
EC Pinto Neto, S Sadeghi, X Zhang, S Dadkhah
Applied Sciences 13 (11), 6497, 2023
202023
Blockchain scheme based on evolutionary proof of work
WA Syafruddin, S Dadkhah, M Köppen
2019 IEEE Congress on Evolutionary Computation (CEC), 771-776, 2019
202019
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective
ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux, AA Ghorbani
Computer Communications 213, 61-77, 2024
192024
Multimodal fake news analysis based on image–text similarity
X Zhang, S Dadkhah, AG Weismann, MA Kanaani, AA Ghorbani
IEEE Transactions on Computational Social Systems 11 (1), 959-972, 2023
182023
Efficient digital image authentication and tamper localization technique using 3lsb watermarking
S Dadkhah, A Abd Manaf, S Sadeghi
International Journal of Computer Science Issues (IJCSI) 9 (1), 1, 2012
182012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20