Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ... Journal of information processing systems 15 (4), 865-889, 2019 | 124 | 2019 |
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features T Dargahi, A Dehghantanha, PN Bahrami, M Conti, G Bianchi, ... Journal of Computer Virology and Hacking Techniques 15, 277-305, 2019 | 119 | 2019 |
Tracking, profiling, and ad targeting in the Alexa echo smart speaker ecosystem U Iqbal, PN Bahrami, R Trimananda, H Cui, A Gamero-Garrido, ... Proceedings of the 2023 ACM on Internet Measurement Conference, 569-583, 2023 | 35 | 2023 |
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting PN Bahrami, U Iqbal, Z Shafiq Proceedings on Privacy Enhancing Technologies, 557-577, 2021 | 27 | 2021 |
A hierarchical key pre‐distribution scheme for fog networks PN Bahrami, HHS Javadi, T Dargahi, A Dehghantanha, KKR Choo Concurrency and Computation: Practice and Experience, e4776, 2018 | 19 | 2018 |
A layered security architecture based on cyber kill chain against advanced persistent threats. PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ... Security and Privacy for Big Data, Cloud Computing and Applications, 135-155, 2019 | 1 | 2019 |
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar PN Bahrami, A Fass, Z Shafiq arXiv preprint arXiv:2406.05310, 2024 | | 2024 |
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar P Nikkhah Bahrami, A Fass, Z Shafiq | | 2024 |