Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? C Esposito, A De Santis, G Tortora, H Chang, KKR Choo IEEE Cloud Computing 5 (1), 31-37, 2018 | 704 | 2018 |
The cyber threat landscape: Challenges and future research directions KKR Choo Computers & Security 30 (8), 719–731, 2011 | 632 | 2011 |
Blockchain in healthcare applications: Research challenges and opportunities T McGhin, KKR Choo, CZ Liu, D He Journal of Network and Computer Applications 135, 62-75, 2019 | 568 | 2019 |
A blockchain future for internet of things security: a position paper M Banerjee, J Lee, KKR Choo Digital Communications and Networks 4 (3), 149-160, 2018 | 525 | 2018 |
A systematic literature review of blockchain cyber security PJ Taylor, T Dargahi, A Dehghantanha, RM Parizi, KKR Choo Digital Communications and Networks 6 (2), 147-156, 2020 | 421 | 2020 |
A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks HH Pajouh, R Javidan, R Khayami, D Ali, KKR Choo IEEE Transactions on Emerging Topics in Computing 7 (2), 314-323, 2019 | 402 | 2019 |
A robust and energy efficient authentication protocol for industrial internet of things X Li, J Peng, J Niu, F Wu, J Liao, KKR Choo IEEE Internet of Things Journal 5 (3), 1606-1615, 2018 | 394* | 2018 |
An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things N Moustafa, B Turnbull, KKR Choo IEEE Internet of Things Journal 6 (3), 4815-4830, 2019 | 348 | 2019 |
Machine learning aided Android malware classification N Milosevic, A Dehghantanha, KKR Choo Computers & Electrical Engineering 61, 266-274, 2017 | 345 | 2017 |
Blockchain based searchable encryption for electronic health record sharing L Chen, WK Lee, CC Chang, KKR Choo, N Zhang Future Generation Computer Systems 95, 490-429, 2019 | 343 | 2019 |
Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework O Osanaiye, KKR Choo, M Dlodlo Journal of Network and Computer Applications 67, 147-165, 2016 | 342 | 2016 |
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 C Lin, D He, X Huang, KKR Choo, AV Vasilakos Journal of Network and Computer Applications 116, 42-52, 2018 | 335 | 2018 |
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo Future Generation Computer Systems 85, 88-96, 2018 | 332 | 2018 |
Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning A Azmoodeh, A Dehghantanha, KKR Choo IEEE Transactions on Sustainable Computing 4 (1), 88-95, 2019 | 321 | 2019 |
From cloud to fog computing: A review and a conceptual live VM migration framework O Osanaiye, S Chen, Z Yan, R Lu, K Choo, M Dlodlo IEEE Access 5, 8284-8300, 2017 | 317 | 2017 |
A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo Journal of Network and Computer Applications 103, 194-204, 2018 | 315 | 2018 |
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing O Osanaiye, H Cai, KKR Choo, A Dehghantanha, Z Xu, M Dlodlo EURASIP Journal on Wireless Communications and Networking 2016 (1), 1-10, 2016 | 313 | 2016 |
An integrated conceptual digital forensic framework for cloud computing B Martini, KKR Choo Digital Investigation 9 (2), 71-80, 2012 | 312 | 2012 |
Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges C Huang, R Lu, KKR Choo IEEE Communications Magazine 55 (11), 105-111, 2017 | 295 | 2017 |
Detecting crypto-ransomware in IoT networks based on energy consumption footprint A Azmoodeh, A Dehghantanha, M Conti, KKR Choo Journal of Ambient Intelligence and Humanized Computing 9 (4), 1141–1152, 2018 | 267 | 2018 |