Follow
Pouneh Nikkhah Bahrami
Title
Cited by
Cited by
Year
Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures
PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ...
Journal of information processing systems 15 (4), 865-889, 2019
1092019
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
T Dargahi, A Dehghantanha, PN Bahrami, M Conti, G Bianchi, ...
Journal of Computer Virology and Hacking Techniques 15, 277-305, 2019
1012019
Your echos are heard: Tracking, profiling, and ad targeting in the amazon smart speaker ecosystem
U Iqbal, PN Bahrami, R Trimananda, H Cui, A Gamero-Garrido, D Dubois, ...
arXiv preprint arXiv:2204.10920, 2022
202022
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting
PN Bahrami, U Iqbal, Z Shafiq
Proceedings on Privacy Enhancing Technologies, 557-577, 2021
192021
A hierarchical key pre‐distribution scheme for fog networks
PN Bahrami, HHS Javadi, T Dargahi, A Dehghantanha, KKR Choo
Concurrency and Computation: Practice and Experience, e4776, 2018
172018
Tracking, profiling, and ad targeting in the Alexa echo smart speaker ecosystem
U Iqbal, PN Bahrami, R Trimananda, H Cui, A Gamero-Garrido, ...
Proceedings of the 2023 ACM on Internet Measurement Conference, 569-583, 2023
52023
A layered security architecture based on cyber kill chain against advanced persistent threats.
PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ...
Security and Privacy for Big Data, Cloud Computing and Applications, 135-155, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–7