Please see my GoogleScholar, DBLP, and Scopus profile for latest list of articles. Following is the list of selected publications

  • Kim-Kwang Raymond Choo, Ali Dehghantanha, "Contemporary Digital Forensic Investigations of Cloud and Mobile Applications", 1st Edition, Elsevier, 2016
  • Mauro Conti, Ali Dehghantanha,  Katrin Franke, Steve Watson, “Internet of Things Security and Forensics: Challenges and Opportunities”, (Elsevier) Future Generation Computer Systems Journal, DoI: https://doi.org/10.1016/j.future.2017.07.060, 2018 )
  • Samantha Newbery, Ali Dehghantanha, "Torture-free cyberspace–a human right", (Elsevier) Journal of Computer Fraud & Security, Nov 2017, DOI: https://doi.org/10.1016/S1361-3723(17)30083-0
  • Hamed HaddadPajouh, Ali Dehghantanha, Raouf Khayami, and Kim-Kwang Raymond Choo, “Intelligent OS X Malware Threat Detection”, (Springer) Journal of Computer Virology and Hacking Techniques, 2017 – https://doi.org/10.1007/s11416-017-0307-5.  
  • Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami, "Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence", (IEEE) Transactions on Emerging Topics in Computing, 2017 - DOI: 10.1109/TETC.2017.2756908.
  • Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider Al-Khateeb, Ali Dehghantanha, and Kim-Kwang Raymond Choo, "Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks", (IEEE) Internet of Things Journal, 2017 - DOI: http://ieeexplore.ieee.org/document/8070945/
  • Dennis Kiwia, Ali Dehghantanha, Kim-Kwang Raymond Choo, Jim Slaughter, "A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence", (Elsevier) Journal of Computational Science, 2017, https://doi.org/10.1016/j.jocs.2017.10.020
  • Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, “CloudMe Forensics: A Case of Big-Data Investigation,” (Wiley) Concurrency and Computation: Practice and Experience, http://onlinelibrary.wiley.com/doi/10.1002/cpe.4277, 2017
  • Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Raymond Choo, “Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint”, (Springer) Journal of Ambient Intelligence and Humanized Computing, DOI: 10.1007/s12652-017-0558-5, 2017
  • Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, and Mohd Taufik Abdullah, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” (IEEE) Transactions on Sustainable Computing, DOI: 10.1109/TSUSC.2017.2687103, 2017. 
  • Nikola Milosevic, Ali Dehghantanha, Kim-Kwang Raymond Choo, "Machine learning aided Android malware classification”, (Elsevier) Journal of Computers & Electrical Engineering, 2017, DOI:http://dx.doi.org/10.1016/j.compeleceng.2017.02.013