A
Amir Namavar Jahromi
Researcher at University of Guelph
Publications - 17
Citations - 233
Amir Namavar Jahromi is an academic researcher from University of Guelph. The author has contributed to research in topics: Computer science & Malware. The author has an hindex of 4, co-authored 13 publications receiving 92 citations. Previous affiliations of Amir Namavar Jahromi include Amirkabir University of Technology & University of Calgary.
Papers
More filters
Journal ArticleDOI
An improved two-hidden-layer extreme learning machine for malware hunting
Amir Namavar Jahromi,Sattar Hashemi,Ali Dehghantanha,Kim-Kwang Raymond Choo,Hadis Karimipour,David Ellis Newton,Reza M. Parizi +6 more
TL;DR: A modified Two-hidden-layered Extreme Learning Machine (TELM) is built, which uses the dependency of malware sequence elements in addition to having the advantage of avoiding backpropagation when training neural networks, to speed up the training and detection steps of malware hunting.
Journal ArticleDOI
An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems
TL;DR: A deep recurrent neural network solution as a stacked long short-term memory (LSTM) with a pre-training as a regularization method to avoid random network initialization is presented, achieving an accuracy of 99.1% in detecting IoT malware samples and outperforming standard LSTM-based methods in these key metrics.
Journal ArticleDOI
Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber–Physical Systems
TL;DR: A two-level ensemble attack detection and attribution framework designed for CPS, and more specifically in an industrial control system (ICS), which demonstrates that the proposed model outperforms other competing approaches with similar computational complexity.
Proceedings Article
A deep unsupervised representation learning approach for effective cyber-physical attack detection and identification on highly imbalanced data.
Journal ArticleDOI
Generative adversarial network to detect unseen Internet of Things malware
Zahra Moti,Sattar Hashemi,Hadis Karimipour,Ali Dehghantanha,Amir Namavar Jahromi,Lida Abdi,Fatemeh Alavi +6 more
TL;DR: MalGan as discussed by the authors is a framework for detecting and generating new malware samples based on the raw byte code at the edge layer of the Internet of Things (IoT) networks, which employs an attention-based model, a combination of CNN and Long Short Term Memory.