Ali Dehghantanha

Last updated

TheHiddenWeb

TheHiddenWiki
Born11/11/25
Usa
OccupationLinks .com
TitleLa web mas profunda y oscuras con links .com
Website https://sites.google.com/view/thehiddenweb-/p%C3%A1gina-principal

Education

After completing his Diploma in Mathematics at National Organization for Development of Exceptional Talents (NODET), Dehghantanha attended Islamic Azad University, Mashhad Branch, from which he graduated with a bachelor's degree in Software Engineering in 2005. He earned his Master's and Doctoral degrees in Security in Computing from University Putra Malaysia in 2008 and 2011, respectively. [1]

Contents

Career

Dehghantanha started his academic career as Sr. Lecturer of Computer Science and Information Technology at the University Putra Malaysia in 2011, and later on joined the University of Salford as Marie Curie International Incoming Post-Doctoral Research Fellow in 2015.[ citation needed ] From 2017 to 2018, he held appointment as Sr. Lecturer (Associate Professor) in the Department of Computer Science at the University of Sheffield. [2] Following this appointment, he joined the University of Guelph, Ontario, Canada, as an Associate Professor and Director of Master of Cybersecurity and Threat Intelligence program. [3] He became a Tier 2 NSERC[ clarification needed ] Canada Research Chair in Cybersecurity and Threat Intelligence at the University of Guelph in 2020. [4] He also holds a concurrent appointment as Adjunct Associate Professor in Schulich School of Engineering's Department of Electrical & Software Engineering at the University of Calgary since 2020. [5] He has developed two Master's programs in cybersecurity, one in the University of Guelph – Canada, [6] and another in the University of Salford.

Research

Dehghantanha is among highly cited researchers in cybersecurity. [7] He is well-recognized for his research in cyber threat intelligence, [8] and in several fields of cyber security including malware analysis, [9] Internet of Things (IoT) security, and digital forensics. [10]

Application of AI in Cyber Threat Hunting and Attribution

Dehghantanha was among the first to introduce some major security and forensics challenges within the Internet of Things (IoT) domain. He also reviewed previous studies published in this special issue targeting identified challenges. [11] In 2016, he proposed a two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. He has influenced the IoT/ICS network defense field by creating an Intrusion Detection System (IDS) for IoT networks, a secret sharing method of encryption key exchange in vehicular IoT networks, and a method for secret key sharing and distribution between IoT devices. He conducted experiments using NSL-KDD[ clarification needed ] dataset, and proved that his proposed model outperforms previous models designed to detect U2R and R2L attacks. [12] His most notable contributions were made to building AI-based methods for cyber-attack identification and analysis in IoT. [13] [14] Moreover, he developed a Deep Recurrent Neural Network structure for in-depth analysis of IoT malware. [15]

Dehghantanha introduced ensemble-based multi-filter feature selection method for DDoS detection in cloud computing, and also discussed its applications in terms of detection rate and classification accuracy when compared to other classification techniques. [16] While presenting a systematic literature review of blockchain cyber security, he conducted a systematic analysis of the most frequently adopted blockchain security applications. The systematic review also highlights the future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security. [17] Furthermore, he focused his study on machine learning aided Android malware classification, and also presented two machine learning aided approaches for static analysis of Android malware. [18]

Frameworks for Cybersecurity Technology Adoption and Organizational Risk Assessment

In 2019, Dehghantanha built a framework that models the impacts of adopting Privacy Enhancing Technologies (PETs) on the performance of SMEs in Canada. [19] He has also created several frameworks for security analysis of cloud platforms, including CloudMe, [20] OneDrive, Box, GoogleDrive, DropBox, [21] MEGA, [22] and SugarSync. [23] He also works to create frameworks for breach coaching and exposure management. In 2016, he published a book entitled Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, and explored the implications of cloud (storage) services and mobile applications on digital forensic investigations. [24]

Awards and honors

Bibliography

Books

Selected articles

References

  1. "Ali Dehghantanha - University of Guelph".
  2. "Digital Forensics Evidence Analysis via Intelligent Systems and Practices".
  3. "Master of Cybersecurity and Threat Intelligence (MCTI)".
  4. 1 2 "Canada Research Chairs".
  5. "Electrical and Computer Engineering Contacts".
  6. "University of Guelph launches one-of-a-kind cyber security program". 22 April 2019.
  7. "Ali Dehghantanha – Google Scholar Profiel".
  8. "COVID-19 causing increase in cyber attacks says U of G prof". 27 May 2020.
  9. "Apple, Google not doing enough to fight app-store malware, say security experts".
  10. "Ali Dehghantanha- ResearchGate Profile".
  11. Conti, Mauro; Dehghantanha, Ali; Franke, Katrin; Watson, Steve (2018). "Internet of Things security and forensics: Challenges and opportunities". Future Generation Computer Systems. 78: 544–546. arXiv: 1807.10438 . doi:10.1016/j.future.2017.07.060. S2CID   38283507.
  12. Pajouh, Hamed Haddad; Javidan, Reza; Khayami, Raouf; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (2019). "A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks" (PDF). IEEE Transactions on Emerging Topics in Computing. 7 (2): 314–323. Bibcode:2019ITETC...7..314P. doi:10.1109/TETC.2016.2633228. S2CID   44175270.
  13. Sakhnini, Jacob; Karimipour, Hadis; Dehghantanha, Ali (2019). "Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection". 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE). pp. 108–112. arXiv: 1907.03313 . doi:10.1109/SEGE.2019.8859946. ISBN   978-1-7281-2440-7. S2CID   195833193.
  14. Karimipour, Hadis; Dehghantanha, Ali; Parizi, Reza M.; Choo, Kim-Kwang Raymond; Leung, Henry (2019). "A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids". IEEE Access. 7: 80778–80788. Bibcode:2019IEEEA...780778K. doi: 10.1109/ACCESS.2019.2920326 . S2CID   192625335.
  15. Yazdinejad, Abbas; Haddadpajouh, Hamed; Dehghantanha, Ali; Parizi, Reza M.; Srivastava, Gautam; Chen, Mu-Yen (2020). "Cryptocurrency malware hunting: A deep Recurrent Neural Network approach" . Applied Soft Computing. 96 106630. doi:10.1016/j.asoc.2020.106630. S2CID   225407725.
  16. Osanaiye, Opeyemi; Cai, Haibin; Choo, Kim-Kwang Raymond; Dehghantanha, Ali; Xu, Zheng; Dlodlo, Mqhele (2016). "Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing". EURASIP Journal on Wireless Communications and Networking. 2016 130. doi: 10.1186/s13638-016-0623-3 . hdl: 11427/34419 . S2CID   17352259.
  17. Taylor, Paul J.; Dargahi, Tooska; Dehghantanha, Ali; Parizi, Reza M.; Choo, Kim-Kwang Raymond (2020). "A systematic literature review of blockchain cyber security". Digital Communications and Networks. 6 (2): 147–156. doi: 10.1016/j.dcan.2019.01.005 . S2CID   86808618.
  18. Milosevic, Nikola; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (2017). "Machine learning aided Android malware classification". Computers & Electrical Engineering. 61: 266–274. doi:10.1016/j.compeleceng.2017.02.013. S2CID   1039430.
  19. Parizi, Reza M.; Homayoun, Sajad; Yazdinejad, Abbas; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (2019). "Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains". 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE). pp. 1–4. arXiv: 1906.04953 . doi:10.1109/CCECE.2019.8861821. ISBN   978-1-7281-0319-8. S2CID   186206585.
  20. Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (2018). "CloudMe forensics: A case of big data forensic investigation". Concurrency and Computation: Practice and Experience. 30 (5) e4277. arXiv: 1807.10218 . doi:10.1002/cpe.4277. S2CID   3317884.
  21. Daryabar, F.; Dehghantanha, Ali; Eterovic-Soric, Brett; Choo, Kim-Kwang Raymond (3 March 2016). "Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices". Australian Journal of Forensic Sciences. 48 (6): 615–642. doi:10.1080/00450618.2015.1110620. S2CID   112520209.
  22. Daryabar, F.; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (18 April 2016). "Cloud storage forensics: MEGA as a case study" . Australian Journal of Forensic Sciences. 49 (3): 344–357. doi:10.1080/00450618.2016.1153714. S2CID   111643510.
  23. Shariatia, M.; Dehghantanha, Ali; Choo, Kim-Kwang Raymond (8 April 2015). "SugarSync forensic analysis". Australian Journal of Forensic Sciences. 48 (1): 95–117. doi:10.1080/00450618.2015.1021379. S2CID   111218734.
  24. Choo, Kim-Kwang Raymond; Dehghantanha, Ali (12 October 2016). Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Elsevier Science. ISBN   978-0-12-805303-4.
  25. "Ali Dehghantanha - infosecurity-magazine". 6 October 2017.
  26. "Dr. Ali Dehghantanha Receives Outstanding Leadership Award".