


default search action
Tooska Dargahi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j28]Elham Meybodian, Seyedakbar Mostafavi [j28]Elham Meybodian, Seyedakbar Mostafavi , Tooska Dargahi, Vahid Ranjbar Bafghi: , Tooska Dargahi, Vahid Ranjbar Bafghi:
 Secure and scalable trust management in IoT: A hierarchical blockchain-based approach. Comput. Electr. Eng. 127: 110631 (2025)
- 2024
 [j27]Salah Albenjasim, Tooska Dargahi, Haifa Takruri, Rabab Al-Zaidi [j27]Salah Albenjasim, Tooska Dargahi, Haifa Takruri, Rabab Al-Zaidi : :
 FinTech Cybersecurity Challenges and Regulations: Bahrain Case Study. J. Comput. Inf. Syst. 64(6): 835-851 (2024)
 [c15]Adeola Adewumi, Mohammad Hammoudeh [c15]Adeola Adewumi, Mohammad Hammoudeh , Tooska Dargahi, Olamide Jogunola , Tooska Dargahi, Olamide Jogunola : :
 Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures. ACNS Workshops (1) 2024: 265-280
 [c14]Mohammad Saberi, Mahdi Dolati, Ali Movaghar, Tooska Dargahi, Ahmad Khonsari: [c14]Mohammad Saberi, Mahdi Dolati, Ali Movaghar, Tooska Dargahi, Ahmad Khonsari:
 Efficient Collaborative Rule Caching Through Pairing of P4 Switches in SDNs. GLOBECOM 2024: 1906-1911
- 2023
 [j26]John Anih [j26]John Anih , Sarvesh Kolekar, Tooska Dargahi , Sarvesh Kolekar, Tooska Dargahi , Meisam Babaie , Meisam Babaie , Mohamad Saraee , Mohamad Saraee , Jack Wetherell , Jack Wetherell : :
 Deriving Environmental Risk Profiles for Autonomous Vehicles From Simulated Trips. IEEE Access 11: 38385-38398 (2023)
 [j25]Omego Nnamonu, Mohammad Hammoudeh [j25]Omego Nnamonu, Mohammad Hammoudeh , Tooska Dargahi: , Tooska Dargahi:
 Digital Forensic Investigation of Web-Based Virtual Reality Worlds: Decentraland as a Case Study. IEEE Commun. Mag. 61(9): 72-78 (2023)
 [j24]Tom Bolton [j24]Tom Bolton , Tooska Dargahi , Tooska Dargahi , Sana Belguith , Sana Belguith , Carsten Maple , Carsten Maple : :
 PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors. ACM Trans. Priv. Secur. 26(3): 31:1-31:29 (2023)
 [c13]Olayinka Adeboye, Ahmed Abdullahi, Tooska Dargahi, Meisam Babaie [c13]Olayinka Adeboye, Ahmed Abdullahi, Tooska Dargahi, Meisam Babaie , Mohamad Saraee: , Mohamad Saraee:
 LIFT the AV: Location InFerence aTtack on Autonomous Vehicle Camera Data. CCNC 2023: 1-6
 [c12]Omego Nnamonu, Mohammad Hammoudeh [c12]Omego Nnamonu, Mohammad Hammoudeh , Tooska Dargahi: , Tooska Dargahi:
 Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework. MetaCom 2023: 94-98
 [c11]Ahmed Danladi Abdullahi [c11]Ahmed Danladi Abdullahi , Tooska Dargahi, Mohammad Hammoudeh , Tooska Dargahi, Mohammad Hammoudeh : :
 Poster: Continuous Authentication in Highly Connected 6G-enabled Transportation Systems. VNC 2023: 171-172
- 2022
 [j23]Olayinka Adeboye [j23]Olayinka Adeboye , Tooska Dargahi , Tooska Dargahi , Meisam Babaie , Meisam Babaie , Mohamad Saraee , Mohamad Saraee , Chia-Mu Yu , Chia-Mu Yu : :
 DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy. IEEE Access 10: 124534-124544 (2022)
 [j22]Zhipeng Cai, Christian Esposito, Tooska Dargahi [j22]Zhipeng Cai, Christian Esposito, Tooska Dargahi , Chaokun Wang: , Chaokun Wang:
 Graph-powered learning for social networks. Neurocomputing 501: 244-245 (2022)
 [j21]Tooska Dargahi [j21]Tooska Dargahi , Hossein Ahmadvand , Hossein Ahmadvand , Mansour Naser Alraja , Mansour Naser Alraja , Chia-Mu Yu: , Chia-Mu Yu:
 Integration of Blockchain with Connected and Autonomous Vehicles: Vision and Challenge. ACM J. Data Inf. Qual. 14(1): 5:1-5:10 (2022)
- 2021
 [j20]Koosha Mohammad Hossein [j20]Koosha Mohammad Hossein , Mohammad Esmaeil Esmaeili, Tooska Dargahi , Mohammad Esmaeil Esmaeili, Tooska Dargahi , Ahmad Khonsari, Mauro Conti , Ahmad Khonsari, Mauro Conti : :
 BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications. Comput. Commun. 180: 31-47 (2021)
 [j19]Aliyu Gana Yisa [j19]Aliyu Gana Yisa , Tooska Dargahi , Tooska Dargahi , Sana Belguith , Sana Belguith , Mohammad Hammoudeh , Mohammad Hammoudeh : :
 Security challenges of Internet of Underwater Things: A systematic literature review. Trans. Emerg. Telecommun. Technol. 32(3) (2021)
 [j18]Tom Bolton [j18]Tom Bolton , Tooska Dargahi , Tooska Dargahi , Sana Belguith , Sana Belguith , Mabrook S. Al-Rakhami , Mabrook S. Al-Rakhami , Ali Hassan Sodhro , Ali Hassan Sodhro : :
 On the Security and Privacy Challenges of Virtual Assistants. Sensors 21(7): 2312 (2021)
 [j17]Giuseppe Bianchi [j17]Giuseppe Bianchi , Mauro Conti , Mauro Conti , Tooska Dargahi , Tooska Dargahi , Ali Dehghantanha , Ali Dehghantanha : :
 Editorial for the Special Issue on Sustainable Cyber Forensics and Threat Intelligence. IEEE Trans. Sustain. Comput. 6(2): 182-183 (2021)
 [c10]Hossein Ahmadvand [c10]Hossein Ahmadvand , Tooska Dargahi , Tooska Dargahi , Fouzhan Foroutan, Princewill Okorie, Flavio Esposito: , Fouzhan Foroutan, Princewill Okorie, Flavio Esposito:
 Big Data Processing at the Edge with Data Skew Aware Resource Allocation. NFV-SDN 2021: 81-86
- 2020
 [j16]Paul J. Taylor [j16]Paul J. Taylor , Tooska Dargahi , Tooska Dargahi , Ali Dehghantanha, Reza M. Parizi , Ali Dehghantanha, Reza M. Parizi , Kim-Kwang Raymond Choo , Kim-Kwang Raymond Choo : :
 A systematic literature review of blockchain cyber security. Digit. Commun. Networks 6(2): 147-156 (2020)
 [j15]Sana Belguith [j15]Sana Belguith , Nesrine Kaaniche , Nesrine Kaaniche , Mohammad Hammoudeh , Mohammad Hammoudeh , Tooska Dargahi , Tooska Dargahi : :
 PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications. Future Gener. Comput. Syst. 111: 899-918 (2020)
 [j14]Mohammad Hadi Alaeiyan [j14]Mohammad Hadi Alaeiyan , Ali Dehghantanha, Tooska Dargahi , Ali Dehghantanha, Tooska Dargahi , Mauro Conti , Mauro Conti , Saeed Parsa , Saeed Parsa : :
 A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks. ACM Trans. Cyber Phys. Syst. 4(3): 31:1-31:22 (2020)
 [c9]Stephen Odero, Tooska Dargahi [c9]Stephen Odero, Tooska Dargahi , Haifa Takruri: , Haifa Takruri:
 Privacy Enhanced Interface Identifiers in IPv6. CSNDSP 2020: 1-6
 [c8]Ahmed Abdullahi, Tooska Dargahi [c8]Ahmed Abdullahi, Tooska Dargahi , Meisam Babaie , Meisam Babaie : :
 Vulnerability Assessment Of Vehicle To Infrastructure Communication: A Case Study Of Unmanned Ground Vehicle. GLOBECOM (Workshops) 2020: 1-6
2010 – 2019
- 2019
 [j13]Dean Richard McKinnel, Tooska Dargahi [j13]Dean Richard McKinnel, Tooska Dargahi , Ali Dehghantanha, Kim-Kwang Raymond Choo , Ali Dehghantanha, Kim-Kwang Raymond Choo : :
 A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Comput. Electr. Eng. 75: 175-188 (2019)
 [j12]Pooneh Nikkhah Bahrami, Hamid H. S. Javadi [j12]Pooneh Nikkhah Bahrami, Hamid H. S. Javadi , Tooska Dargahi , Tooska Dargahi , Ali Dehghantanha, Kim-Kwang Raymond Choo , Ali Dehghantanha, Kim-Kwang Raymond Choo : :
 A hierarchical key pre-distribution scheme for fog networks. Concurr. Comput. Pract. Exp. 31(22) (2019)
 [j11]Giuseppe Bianchi, Tooska Dargahi [j11]Giuseppe Bianchi, Tooska Dargahi , Alberto Caponi , Alberto Caponi , Mauro Conti , Mauro Conti : :
 Intelligent conditional collaborative private data sharing. Future Gener. Comput. Syst. 96: 1-10 (2019)
 [j10]Raúl Vera, Amina F. Shehu, Tooska Dargahi, Ali Dehghantanha: [j10]Raúl Vera, Amina F. Shehu, Tooska Dargahi, Ali Dehghantanha:
 Cyber defence triage for multimedia data intelligence: Hellsing, Desert Falcons and Lotus Blossom APT campaigns as case studies. Int. J. Multim. Intell. Secur. 3(3): 221-243 (2019)
 [j9]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi: [j9]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi:
 Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures. J. Inf. Process. Syst. 15(4): 865-889 (2019)
 [j8]Tooska Dargahi [j8]Tooska Dargahi , Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti , Ali Dehghantanha, Pooneh Nikkhah Bahrami, Mauro Conti , Giuseppe Bianchi, Loris Benedetto: , Giuseppe Bianchi, Loris Benedetto:
 A Cyber-Kill-Chain based taxonomy of crypto-ransomware features. J. Comput. Virol. Hacking Tech. 15(4): 277-305 (2019)
 [c7]Koosha Mohammad Hossein [c7]Koosha Mohammad Hossein , Mohammad Esmaeil Esmaeili, Tooska Dargahi , Mohammad Esmaeil Esmaeili, Tooska Dargahi , Ahmad Khonsari: , Ahmad Khonsari:
 Blockchain-Based Privacy-Preserving Healthcare Architecture. CCECE 2019: 1-4
 [c6]Robert Marsh, Sana Belguith [c6]Robert Marsh, Sana Belguith , Tooska Dargahi , Tooska Dargahi : :
 IoT Database Forensics: An Investigation on HarperDB Security. ICFNDS 2019: 3:1-3:7
 [p9]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi [p9]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi , Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi, Lizhe Wang, Fatos Xhafa, Wei Ren: , Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi, Lizhe Wang, Fatos Xhafa, Wei Ren:
 A layered security architecture based on cyber kill chain against advanced persistent threats. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 135-155
 [p8]Samuel Grooby, Tooska Dargahi, Ali Dehghantanha: [p8]Samuel Grooby, Tooska Dargahi, Ali Dehghantanha:
 A Bibliometric Analysis of Authentication and Access Control in IoT Devices. Handbook of Big Data and IoT Security 2019: 25-51
 [p7]Samuel Grooby, Tooska Dargahi, Ali Dehghantanha: [p7]Samuel Grooby, Tooska Dargahi, Ali Dehghantanha:
 Protecting IoT and ICS Platforms Against Advanced Persistent Threat Actors: Analysis of APT1, Silent Chollima and Molerats. Handbook of Big Data and IoT Security 2019: 225-255
 [p6]Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha: [p6]Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha:
 Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as a Case Study. Handbook of Big Data and IoT Security 2019: 257-272
 [p5]Lim Sze Thiam, Tooska Dargahi, Ali Dehghantanha: [p5]Lim Sze Thiam, Tooska Dargahi, Ali Dehghantanha:
 Bibliometric Analysis on the Rise of Cloud Security. Handbook of Big Data and IoT Security 2019: 329-344
 [p4]Shehu Amina, Raúl Vera, Tooska Dargahi, Ali Dehghantanha: [p4]Shehu Amina, Raúl Vera, Tooska Dargahi, Ali Dehghantanha:
 A Bibliometric Analysis of Botnet Detection Techniques. Handbook of Big Data and IoT Security 2019: 345-365
- 2018
 [j7]Tooska Dargahi [j7]Tooska Dargahi , Hamid H. S. Javadi , Hamid H. S. Javadi , Hosein Shafiei, Payam Mousavi: , Hosein Shafiei, Payam Mousavi:
 Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks. Int. J. High Perform. Comput. Netw. 11(2): 117-128 (2018)
 [j6]Po-Yen Lee, Chia-Mu Yu [j6]Po-Yen Lee, Chia-Mu Yu , Tooska Dargahi , Tooska Dargahi , Mauro Conti , Mauro Conti , Giuseppe Bianchi: , Giuseppe Bianchi:
 MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things. IEEE Trans. Inf. Forensics Secur. 13(8): 2031-2046 (2018)
 [i5]Mauro Conti, Ali Dehghantanha, Tooska Dargahi: [i5]Mauro Conti, Ali Dehghantanha, Tooska Dargahi:
 Cyber Threat Intelligence : Challenges and Opportunities. CoRR abs/1808.01162 (2018)
- 2017
 [j5]Tooska Dargahi [j5]Tooska Dargahi , Alberto Caponi, Moreno Ambrosin , Alberto Caponi, Moreno Ambrosin , Giuseppe Bianchi, Mauro Conti: , Giuseppe Bianchi, Mauro Conti:
 A Survey on the Security of Stateful SDN Data Planes. IEEE Commun. Surv. Tutorials 19(3): 1701-1725 (2017)
 [j4]Tooska Dargahi [j4]Tooska Dargahi , Hamid H. S. Javadi , Hamid H. S. Javadi , Hosein Shafiei , Hosein Shafiei : :
 Securing Underwater Sensor Networks Against Routing Attacks. Wirel. Pers. Commun. 96(2): 2585-2602 (2017)
 [c5]Flavio Esposito [c5]Flavio Esposito , Andrej Cvetkovski, Tooska Dargahi , Andrej Cvetkovski, Tooska Dargahi , Jianli Pan: , Jianli Pan:
 Complete edge function onloading for effective backend-driven cyber foraging. WiMob 2017: 1-8
 [c4]Claudio Pisa, Tooska Dargahi [c4]Claudio Pisa, Tooska Dargahi , Alberto Caponi, Giuseppe Bianchi, Nicola Blefari-Melazzi: , Alberto Caponi, Giuseppe Bianchi, Nicola Blefari-Melazzi:
 On the feasibility of attribute-based encryption for WLAN access control. WiMob 2017: 1-8
 [p3]Tooska Dargahi [p3]Tooska Dargahi , Ali Dehghantanha, Mauro Conti , Ali Dehghantanha, Mauro Conti : :
 Forensics Analysis of Android Mobile VoIP Apps. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 7-20
 [p2]Tooska Dargahi [p2]Tooska Dargahi , Ali Dehghantanha, Mauro Conti , Ali Dehghantanha, Mauro Conti : :
 Investigating Storage as a Service Cloud Platform: pCloud as a Case Study. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 185-204
 [p1]Ali Dehghantanha, Tooska Dargahi [p1]Ali Dehghantanha, Tooska Dargahi : :
 Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017: 247-283
 [i4]Tooska Dargahi, Ali Dehghantanha, Mauro Conti: [i4]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
 Investigating Storage as a Service Cloud Platform: pCloud as a Case Study. CoRR abs/1709.04417 (2017)
 [i3]Tooska Dargahi, Ali Dehghantanha, Mauro Conti: [i3]Tooska Dargahi, Ali Dehghantanha, Mauro Conti:
 Forensics Analysis of Android Mobile VoIP Apps. CoRR abs/1709.05296 (2017)
- 2016
 [j3]Tooska Dargahi [j3]Tooska Dargahi , Moreno Ambrosin , Moreno Ambrosin , Mauro Conti , Mauro Conti , N. Asokan , N. Asokan : :
 ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs. Comput. Commun. 85: 1-13 (2016)
 [j2]Moreno Ambrosin [j2]Moreno Ambrosin , Arman Anzanpour , Arman Anzanpour , Mauro Conti , Mauro Conti , Tooska Dargahi , Tooska Dargahi , Sanaz Rahimi Moosavi , Sanaz Rahimi Moosavi , Amir-Mohammad Rahmani, Pasi Liljeberg: , Amir-Mohammad Rahmani, Pasi Liljeberg:
 On the Feasibility of Attribute-Based Encryption on Internet of Things Devices. IEEE Micro 36(6): 25-35 (2016)
 [c3]Luigi Stammati, Claudio Pisa, Tooska Dargahi [c3]Luigi Stammati, Claudio Pisa, Tooska Dargahi , Alberto Caponi, Giuseppe Bianchi: , Alberto Caponi, Giuseppe Bianchi:
 FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication. ARES 2016: 715-724
 [c2]Claudio Pisa, Alberto Caponi, Tooska Dargahi, Giuseppe Bianchi, Nicola Blefari-Melazzi: [c2]Claudio Pisa, Alberto Caponi, Tooska Dargahi, Giuseppe Bianchi, Nicola Blefari-Melazzi:
 WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures. HOTPOST@MobiHoc 2016: 31-36
 [i2]Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir-Mohammad Rahmani, Pasi Liljeberg: [i2]Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir-Mohammad Rahmani, Pasi Liljeberg:
 On the Feasibility of Attribute-Based Encryption on Internet of Things Devices. CoRR abs/1611.08098 (2016)
- 2015
 [j1]Tooska Dargahi [j1]Tooska Dargahi , Hamid H. S. Javadi , Hamid H. S. Javadi , Mehdi Hosseinzadeh , Mehdi Hosseinzadeh : :
 Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Secur. Commun. Networks 8(8): 1561-1574 (2015)
 [c1]Moreno Ambrosin [c1]Moreno Ambrosin , Mauro Conti, Tooska Dargahi , Mauro Conti, Tooska Dargahi : :
 On the Feasibility of Attribute-Based Encryption on Smartphone Devices. IoT-Sys@MobiSys 2015: 49-54
 [i1]Moreno Ambrosin, Mauro Conti, Tooska Dargahi: [i1]Moreno Ambrosin, Mauro Conti, Tooska Dargahi:
 On the Feasibility of Attribute-Based Encryption on Smartphone Devices. CoRR abs/1504.00619 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-16 00:13 CEST by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







