Please see my GoogleScholar, DBLP, and Scopus profile for latest list of articles.

Books

  • Kim-Kwang Raymond Choo, Ali Dehghantanha, "Contemporary Digital Forensic Investigations of Cloud and Mobile Applications", 1st Edition, Elsevier, 2016

 Journal Papers

  • Amin Azmoodeh, Ali Dehghantanha, Mauro Conti, Raymond Choo, “Detecting Crypto-Ransomware in IoT Networks Based On Energy Consumption Footprint, Journal of Ambient Intelligence and Humanized Computing”, 2017 (IF 2015:0.835)
  • Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, and Mohd Taufik Abdullah, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” (IEEE) Transactions on Sustainable Computing (Accepted), 2017
  • Nikola Milosevic, Ali Dehghantanha, Kim-Kwang Raymond Choo, "Machine learning aided Android malware classification, Computers & Electrical Engineering", Available online 22 February 2017,  http://dx.doi.org/10.1016/j.compeleceng.2017.02.013, (JCR IF 2015= 1.084)
  • Tahereh Hasani, Jamil Bojeie, Ali Dehghantanha, “Investigating the Antecedents to the Adoption of SCRM Technologies by Start-up Companies”, (Elsevier) Journal of Telematics and Informatics (in press – DOI: http://dx.doi.org/10.1016/j.tele.2016.12.004), (JCR IF 2015: 2.261), 2016
  • Hamed Haddad Pajouh, Reza Javidan, Raouf Khaymi, Ali Dehghantanha and Kim-Kwang Raymond Choo, “A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks”, (IEEE) Transactions on Emerging Topics in Computing (in press: DOI10.1109/TETC.2016.2633228), 2016
  • Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, "Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study", (Elsevier) International Journal of Computers & Electrical Engineering (in-press: http://dx.doi.org/10.1016/j.compeleceng.2016.08.020), (JCR IF 2015: 1.084), 2016
  • Opeyemi Osanaiye, Haibin Cai,Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo, “Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing”, (EURASIP) Journal of Wireless Communications and Networking  2016:130 DOI 10.1186/s13638-016-0623-3, (JCR IF 2014:0.724)
  • Steve Watson, Ali Dehghantanha, "Digital Forensics: The Missing Piece of the Internet of Things Promise", (Elsevier) Journal of Computer Fraud & Security, 2016
  • Teing Yee Yang, Ali Dehghantanha, Raymond Choo, Mauro Conti, Tooska Dargahi, "Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study", (Wiley) Journal of Forensics Sciences (Ranks 2 in Forensics Science) , DOI: 10.1111/1556, 2016, (JCR IF 2014:1.16)
  • Farid Daryabar, Ali Dehghantanha & Kim-Kwang Raymond Choo (2016), “Cloud storage forensics: MEGA as a case study”, (tandf) Australian Journal of Forensic Sciences, DOI:10.1080/00450618.2016.1153714 (JCR IF 2014: 0.583), 2016
  • Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, "Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies", PLOSONE, Vol.11 Issue 3, 2016 (JCR IF 2014: 3.234), DOI: 10.1371/journal.pone.0150300 .
  • Farid Daryabar; Ali Dehghantanha; Brett Eterovic-Soric,Kim-Kwang Raymond Choo, "Forensic Investigation of OneDrive, Box, GoogleDrive and Dropbox Applications on Android and iOS Devices", (tandf) Australian Journal of Forensic Sciences, Vol.48, Issue 6, pp. 615-643, 2016 (JCR IF 2014: 0.583), DOI:10.1080/00450618.2015.1110620;
  • Mohammad Shariati, Ali Dehghantanha, Raymond Choo, “Sugar Sync Forensics”- (tandf) Australian Journal of Forensic Sciences, Vol 48, Issue 1, pp.95-117, 2016 (JCR IF 2014IF:0.583) – DOI:10.1080/00450618.2015.1021379
  • Mohsen Damshenasa, Ali Dehghantanha, Kim-Kwang Raymond Choo & Ramlan Mahmud, "M0Droid: An Android Behavioural-Based Malware Detection Model", (tandf) Journal of Information Privacy and Security, Volume 11, Issue 3, pp. 141-157, 2015, DOI:10.1080/15536548.2015.1073510
  • Farhood Nourozizadeh, Ali Dehghantanha, Raymond Choo, “Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms”, (tandf) Australian Journal of Forensics Science, 2014 (JCR IF 2013:0.704) – DOI:10.1080/00450618.2015.1066854
  • Kaveh Shaerpour, Ali Dehghantanha,Ramlan Mahmod, “Trends in Android Malware Detection” in Journal of Digital Forensics, Security, and Law, Volume 8, Number 3, , pp. 21-40, 2013. (URI)
  • Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmod, “A Survey on Malware Propagation, Analysis, and Detection,” in International Journal of Cyber-Security and Digital Forensics, Vol 2, No. 4, pp. 10-29, 2013. (URI)
  • Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin, "A Review on Impacts of Cloud Computing and Digital Forensics," International Journal of Cyber-Security and Digital Forensics, Vol. 2, Issue 2, pp. 77-94, 2013. (URI)
  • Ali Dehghantanha, Andy Seddon, “Investigating Privacy Issues in Forensics Investigation,” In International Journal of ComputationalIntelligence andInformation Security”, November 2011, Vol. 2, No. 11- pp.27-31. (URI).

 Book Chapters

  • Tooska Dargahi, Ali Dehghantanha, Mauro Conti, “Forensics Analysis of Android Mobile VoIP Apps”, Pages 7-20, Chapter 2, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, “Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine”, Pages 21-40, Chapter 3, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod, “Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies” Pages 41-62, Chapter 4, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod, “Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies” Pages 63-78, Chapter 5, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • Milda Petraityte, Ali Dehghantanha, Gregory Epiphaniou, “Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors” Pages 79-89, Chapter 6, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • B.C. Ogazi-Onyemaechi, Ali Dehghantanha, Kim-Kwang Raymond Choo, “Performance of Android Forensics Data Recovery Tools”, Pages 91-110, Chapter 7, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • L. Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha, “Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model”, Pages 111-130, Chapter 8, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • Tooska Dargahi, Ali Dehghantanha, Mauro Conti, “Investigating Storage as a Service Cloud Platform: pCloud as a Case Study”, Pages 185-204, Chapter 12, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • S.H.Mohtasebi, Ali Dehghantanha, Kim-Kwang Raymond Choo, “Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud”, Pages 205-246, Chapter 13, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • Ali Dehghantanha, Tooska Dargahi, “Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies”, Pages 247-283, Chapter 14, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, A. Dehghantanha, “An Android Cloud Storage Apps Forensic Taxonomy”, Pages 285-305, Chapter 15, (Elsevier) Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications
  • Book Review: “Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, Github, and More, by Matthew A. Russell”, Journal of Information Privacy and Security, pp. 137-138, Volume 11, Issue 2, 2015, DOI:10.1080/15536548.2015.1046287
  • Mohammad Shariati, Ali Dehghantanha, Raymond Choo, “Ubuntu One Investigation: Detecting Evidences on Client Machines”, Pages 429-446, Chapter 19, (Elsevier) the Cloud Security Eco-System - DOI:10.1016/B978-0-12-801595-7.00019-7.
  • ·Al Dehghantanha, Nur Izura Udzir, Ramlan Mahmod, “Evaluating User-centered Privacy Model (UPM) in Pervasive Computing Systems,” in Lecture Notes in Computer Science (LNCS), vol. 6694, pp. 272-284, 2011 (DoI: 10.1007/978-3-642-21323-6_35).

Conference Papers

  • Gregory Epiphaniou, Tim French, Haider Al-Khateeb, Ali Dehghantanha, Hamid Jahankhani, "A Novel Anonymity Quantification and Preservation Model for UnderNet Relay Networks", pp 371-384, Proceedings of Global Security, Safety and Sustainability - The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017.
  • A. A. Mohallel, J. M. Bass and A. Dehghantaha, "Experimenting with docker: Linux container and base OS attack surfaces," 2016 International Conference on Information Society (i-Society), Dublin, Ireland, 2016, pp. 17-21. doi: 10.1109/i-Society.2016.7854163
  • Yee-Yang Teing , Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah, Wee-Chiat Chai, “A Closer Look at Syncany Windows and Ubuntu Clients’ Residual Artefacts”, pp 342-357, Proceedings of International Workshops on TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, (SpaCCS 2016) Zhangjiajie, China, November 16-18, 2016.
  • Ben Blakeley, Chris Cooney, Ali Dehghantanha, Rob Aspin, “Cloud Storage Forensic: hubiC as a Case-Study”, proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom2015), pp.536-541, 30Nov-3Dec 2015, Vancouver, Canada. DOI: 10.1109/CloudCom.2015.24
  • Michael Hopkins, Ali Dehghantanha, "Exploit Kits: The production line of the Cybercrime Economy?", the Second International Conference on Information Security and Cyber Forensics (InfoSec2015), pp. 23-27, 15-17 Nov 2015, Capetown, South Africa. DOI: 10.1109/InfoSec.2015.7435501
  • Javad Talebi, Ali Dehghantanha, Ramlan Mahmoud, "Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes", Computational Forensics, Lecture Notes in Computer Science Volume 8915, 2015, pp 145-162.
  • Ali Dehghantanha, Katrin Franke, “Privacy Respecting Digital Investigation,” pp. 129 – 138, Twelfth Annual International Conference on Privacy, Security and Trust (PST), 23-24 July 2014, Toronto, ON, Canada, DOI: 10.1109/PST.2014.6890932
  • Mohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah, "An Approach for Forensic Investigation in Firefox OS," the Third International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec2014), pp. 22-26, (2014)
  • Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida binti Mohd Sani, and Solahuddin bin Shamsuddin, "Volatile Memory Acquisition Using Backup for Forensic Investigation," in the International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, pp.186-189, 26-28 Jun 2012, Kuala Lumpor, Malaysia, DOI: 10.1109/CyberSec.2012.6246108 .
  • Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida binti Mohd Sani, and Solahuddin bin Shamsuddin, "Towards Secure Model for SCADA Systems," in the International Conference on Cyber Security, Cyber Warfare, and Digital Forensics, pp.60-64, 26-28 Jun 2012, Kuala Lumpor, Malaysia, IEEE index- DOI: 10.1109/CyberSec.2012.6246111 .
  • Ali  Dehghantanha, Nur Izura Udzir, Ramlan Mahmod, “Towards Data Centric Mobile Security,” in the 2011 7th International Conference on Information Assurance and Security (IAS)- pp. 62-67, 5-8 Dec 2011- Malacca- Malaysia- DOI: 10.1109/ISIAS.2011.6122796 .
  • Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, “Investigation of Bypassing Malware Defences and Malware Detections,” in the 2011 7th International Conference on Information Assurance and Security (IAS)- pp. 173-178, 5-8 Dec 2011- Malacca- Malaysia, DOI: 10.1109/ISIAS.2011.6122815 .
  • Ali Dehghantanha, Ramlan.B.Mahmod, Nur Izura Udzir- “Towards a Pervasive Formal Privacy Language,” in 2010 IEEE 24thInternational Conference on Advanced Information Networking and Applications- pp.1085-1091, 20-23 Apr 2010, Perth, Australia- http://doi.ieeecomputersociety.org/10.1109/WAINA.2010.26.
  • Camarasen a/l Sagaran, Ali Dehghantanha, Rohaini Ramli- “A User-Centred Context-sensitive Privacy Model in Pervasive Systems,” in International Conference on Communication Software and Networks, pp.78-83, 26-28 Feb 2010, Singapore- http://doi.ieeecomputersociety.org/10.1109/ICCSN.2010.43.
  • Ali Dehghantanha, Ramlan.B.Mahmod, Nur Izura Udzir- “UPM: User- centred Privacy Model in Pervasive Computing Systems,” in International Conference on Future Computer andCommunication (ICFCC 2009), pp. 65-71, 3-5 April 2009, Kualu Lumpor- Malaysia. http://doi.ieeecomputersociety.org/10.1109/ICFCC.2009.50.