scispace - formally typeset
H

Hamed HaddadPajouh

Researcher at University of Guelph

Publications -  16
Citations -  786

Hamed HaddadPajouh is an academic researcher from University of Guelph. The author has contributed to research in topics: Malware & Computer science. The author has an hindex of 7, co-authored 14 publications receiving 379 citations. Previous affiliations of Hamed HaddadPajouh include Shiraz University of Technology.

Papers
More filters
Journal ArticleDOI

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting

TL;DR: The potential of using Recurrent Neural Network (RNN) deep learning in detecting IoT malware by using RNN to analyze ARM-based IoT applications’ execution operation codes (OpCodes) is explored.
Journal ArticleDOI

A survey on internet of things security: Requirements, challenges, and solutions

TL;DR: A taxonomy that taps into the three-layer IoT architecture as a reference to identify security properties and requirements for each layer is built upon, classifying the potential IoT security threat and challenges by an architectural view.
Journal ArticleDOI

Cryptocurrency malware hunting: A deep Recurrent Neural Network approach

TL;DR: This paper proposes a novel deep Recurrent Neural Network ( RNN) learning model that utilizes the RNN to analyze Windows applications’ operation codes (Opcodes) as a case study and applies traditional machine learning classifiers to show the applicability of deep learners ( LSTM ) versus traditional models in dealing with cryptocurrency malware.
Journal ArticleDOI

AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things

TL;DR: This paper proposes a secure architecture for IoT edge layer infrastructure, called AI4SAFE-IoT, built upon AI-powered security modules at the edge layer for protecting IoT infrastructure, and evaluated the proposed architecture based on the IoT service management score.
Journal ArticleDOI

A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer

TL;DR: The proposed multikernel support vector machine (SVM) approach outperforms DNNs and fuzzy-based IoT malware hunting techniques, in terms of accuracy, while significantly reducing the computational cost and the training time.