CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment ECP Neto, S Dadkhah, R Ferreira, A Zohourian, R Lu, AA Ghorbani Preprints, 2023 | 346 | 2023 |
An effective SVD-based image tampering detection and self-recovery using active watermarking S Dadkhah, A Abd Manaf, Y Hori, AE Hassanien, S Sadeghi Signal Processing: Image Communication 29 (10), 1197-1210, 2014 | 155 | 2014 |
Towards the development of a realistic multidimensional IoT profiling dataset S Dadkhah, H Mahdikhani, PK Danso, A Zohourian, KA Truong, ... 2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022 | 133 | 2022 |
Internet of things (IoT) security dataset evolution: Challenges and future directions B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong, S Iqbal, ... Internet of Things 22, 100780, 2023 | 110 | 2023 |
State of the art in passive digital image forgery detection: copy-move image forgery S Sadeghi, S Dadkhah, HA Jalab, G Mazzola, D Uliyan Pattern Analysis and Applications 21, 291-306, 2018 | 74 | 2018 |
Security issues in Internet of Vehicles (IoV): A comprehensive survey H Taslimasa, S Dadkhah, ECP Neto, P Xiong, S Ray, AA Ghorbani Internet of Things 22, 100809, 2023 | 67 | 2023 |
IoT Zigbee device security: A comprehensive review A Zohourian, S Dadkhah, ECP Neto, H Mahdikhani, PK Danso, ... Internet of Things 22, 100791, 2023 | 44 | 2023 |
A survey on IoT profiling, fingerprinting, and identification M Safi, S Dadkhah, F Shoeleh, H Mahdikhani, H Molyneaux, AA Ghorbani ACM Transactions on Internet of Things 3 (4), 1-39, 2022 | 42 | 2022 |
Data breach: analysis, countermeasures and challenges X Zhang, MM Yadollahi, S Dadkhah, H Isah, DP Le, AA Ghorbani International Journal of Information and Computer Security 19 (3-4), 402-442, 2022 | 30 | 2022 |
CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT S Dadkhah, ECP Neto, R Ferreira, RC Molokwu, S Sadeghi, AA Ghorbani Internet of Things 28, 101351, 2024 | 29* | 2024 |
Efficient copy-move forgery detection for digital images S Sadeghi, HA Jalab, S Dadkhah International Journal of Computer and Information Engineering 6 (11), 1339-1342, 2012 | 28 | 2012 |
CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus ECP Neto, H Taslimasa, S Dadkhah, S Iqbal, P Xiong, T Rahman, ... Internet of Things 26, 101209, 2024 | 25 | 2024 |
Keypoint based authentication and localization of copy-move forgery in digital image S Sadeghi, HA Jalab, KS Wong, D Uliyan, S Dadkhah Malaysian Journal of Computer Science 30 (2), 117-133, 2017 | 23 | 2017 |
A real-time hostile activities analyses and detection system S Dadkhah, F Shoeleh, MM Yadollahi, X Zhang, AA Ghorbani Applied Soft Computing, 107175, 2021 | 22 | 2021 |
Collaborative DDoS detection in distributed multi-tenant IoT using federated learning ECP Neto, S Dadkhah, AA Ghorbani 2022 19th Annual International Conference on Privacy, Security & Trust (PST …, 2022 | 21 | 2022 |
Federated reinforcement learning in IoT: applications, opportunities and open challenges EC Pinto Neto, S Sadeghi, X Zhang, S Dadkhah Applied Sciences 13 (11), 6497, 2023 | 20 | 2023 |
Blockchain scheme based on evolutionary proof of work WA Syafruddin, S Dadkhah, M Köppen 2019 IEEE Congress on Evolutionary Computation (CEC), 771-776, 2019 | 20 | 2019 |
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux, AA Ghorbani Computer Communications 213, 61-77, 2024 | 19 | 2024 |
Multimodal fake news analysis based on image–text similarity X Zhang, S Dadkhah, AG Weismann, MA Kanaani, AA Ghorbani IEEE Transactions on Computational Social Systems 11 (1), 959-972, 2023 | 18 | 2023 |
Efficient digital image authentication and tamper localization technique using 3lsb watermarking S Dadkhah, A Abd Manaf, S Sadeghi International Journal of Computer Science Issues (IJCSI) 9 (1), 1, 2012 | 18 | 2012 |