Follow
Pouneh Nikkhah Bahrami
Title
Cited by
Cited by
Year
Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures
PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ...
Journal of information processing systems 15 (4), 865-889, 2019
1182019
A Cyber-Kill-Chain based taxonomy of crypto-ransomware features
T Dargahi, A Dehghantanha, PN Bahrami, M Conti, G Bianchi, ...
Journal of Computer Virology and Hacking Techniques 15, 277-305, 2019
1152019
Tracking, profiling, and ad targeting in the Alexa echo smart speaker ecosystem
U Iqbal, PN Bahrami, R Trimananda, H Cui, A Gamero-Garrido, ...
Proceedings of the 2023 ACM on Internet Measurement Conference, 569-583, 2023
322023
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting
PN Bahrami, U Iqbal, Z Shafiq
Proceedings on Privacy Enhancing Technologies, 557-577, 2021
252021
A hierarchical key pre‐distribution scheme for fog networks
PN Bahrami, HHS Javadi, T Dargahi, A Dehghantanha, KKR Choo
Concurrency and Computation: Practice and Experience, e4776, 2018
192018
A layered security architecture based on cyber kill chain against advanced persistent threats.
PN Bahrami, A Dehghantanha, T Dargahi, RM Parizi, KKR Choo, ...
Security and Privacy for Big Data, Cloud Computing and Applications, 135-155, 2019
12019
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
PN Bahrami, A Fass, Z Shafiq
arXiv preprint arXiv:2406.05310, 2024
2024
COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
P Nikkhah Bahrami, A Fass, Z Shafiq
2024
The system can't perform the operation now. Try again later.
Articles 1–8