Peer-Reviewed Journal Articles
Montasari, R., Hill, R., Montaseri, F., Jahankhani, H. and Hosseinian-Far, A. (Accepted/In press). Internet of Things Devices: Digital Forensic Process and Data Reduction. International Journal of Electronic Security and Digital Forensics.
Montasari, R., Hill, R., Parkinson, S., Daneshkhah, A. and Hosseinian-Far, A. (Accepted/In press). Hardware-Based Cyber Threats: Attack Vectors and Defence Techniques. International Journal of Electronic Security and Digital Forensics.
Esmaeilbeigia, M., Chatrabgounb, O., Hosseinian-Far, A., Montasari, R. and Daneshkhahe, A. (2020). Low Cost and Highly Accurate Technique for Big Data Spatial-Temporal Interpolation. Applied Numerical Mathematics. 153, pp. 492-502.
Montasari, R., Hill, R., Parkinson, S., Peltola, P., Hosseinian-Far, A. and Daneshkhah, A. (2020). Digital Forensics: Challenges and Opportunities for Future Studies. International Journal of Organizational and Collective Intelligence. 10(2), pp. 37-53.
Adjei, P. and Montasari, R. (2020). A Critical Overview of Digital Twins. International Journal of Strategic Engineering (IJoSE). 3(1), pp. 51-61.
Montasari, R., Carpenter, V. and Hill, R. (2019). A road map for digital forensics research: a novel approach for establishing the design science research process in digital forensics. International Journal of Electronic Security and Digital Forensics. 11(2), pp. 194-224.
Montasari, R., Hill, R., Carpenter, V. and Montaseri, F. (2019). Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence. International Journal of Strategic Engineering (IJoSE). 2(1), pp. 52-60.
Montasari, R., Hill, R., Hosseinian-Far, A. and Montaseri, F. (2019). Countermeasures for timing-based side-channel attacks against shared, modern computing hardware. International Journal of Electronic Security and Digital Forensics. 11(3), pp. 294-320.
Montasari, R., Hosseinian-Far, A., Hill, R., Montaseri, F., Sharma, M. and Shabbir, S. (2018). Are timing-based side-channel attacks feasible in shared, modern computing hardware?. International Journal of Organizational and Collective Intelligence. 8(2), pp. 32-59.
Montasari, R. (2017). A Standardised data acquisition process model for digital forensic investigations. International Journal of Information and Computer Security. 9(3), pp. 229-249.
Montasari, R. (2016). A comprehensive digital forensic investigation process model. International Journal of Electronic Security and Digital Forensics. In International Journal of Information and Computer Security. 8(4), pp. 285-302.
Montasari, R. (2016). Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice. International Journal of Computer Science and Electronic Security. 10(2), pp. 69-87.
Montasari, R. (2016). Review and Assessment of the Existing Digital Forensic Investigation Process Models. International Journal of Computer Applications. 147(7), pp. 41-49.
Montasari, R. (2016). An Ad Hoc Detailed Review of Digital Forensic Investigation Process Models. International Journal of Computer Science and Electronic Security. 8(3), pp. 205-223.
Conference Papers
Peltola, P. Montasari, R., Seco, F. Jimenez, A.R and Hill, R., (2019). Multi-Platform Architecture for Cooperative Pedestrian Navigation Applications. 10th International Conference on Indoor Positioning and Indoor Navigation (IPIN). Pisa, Italy. pp. 1-8. IEEE.
Montasari, R. and Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms. 12th International Conference on Global Security, Safety and Sustainability (ICGS3). London, United Kingdom. pp. 205-212. IEEE.
Montasari, R. (2017). Digital Evidence: Disclosure and Admissibility in the United Kingdom Jurisdiction. 11th International Conference on Global Security, Safety, and Sustainability (ICGS3). London, United Kingdom. pp. 42-52. Springer, Cham.
Montasari, R., Peltola, P. and Carpenter, V. (2016). Gauging the effectiveness of computer misuse act in dealing with cybercrimes. International Conference on Cyber Security and Protection of Digital Services (Cyber Security). London, United Kingdom. pp. 1-5. IEEE.
Montasari, R. and Peltola, P. (2015). Computer Forensic Analysis of Private Browsing Modes. 10th International Conference on Global Security, Safety, and Sustainability (ICGS3). London, United Kingdom. pp. 94-109. Springer, Cham.
Montasari, R., Peltola, P. and Evans, D. (2015). Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. 10th International Conference on Global Security, Safety, and Sustainability (ICGS3). London, United Kingdom. pp. 83-95. Springer, Cham.
Book Chapters
Montasari, R. Fiona, C., Jahankhani, H., Hosseinian-Far, A. and Daneshkhah, A. (Accepted). Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence. In Montasari, R., Jahankhani, H. Hill, R. and Parkinson, S. (eds.) Digital Forensic Investigation of Internet of Things (IoT) Devices. Springer. Forthcoming.
Montasari, R. Fiona, C., Jahankhani, H., Hosseinian-Far, A. and Daneshkhah, A. (Accepted). Cloud Computing Security: Hardware-Based Attacks and Countermeasures. In Montasari, R., Jahankhani, H. Hill, R. and Parkinson, S. (eds.) Digital Forensic Investigation of Internet of Things (IoT) Devices. Springer. Forthcoming.
Daneshkhah, A., Jahankhani, H., Forouzan, H., Montasari, R. and Hosseinian-Far, A. (Accepted). Behavioural Analytics: A Preventative Means for the Future of Policing. In Jahankhani, H. (eds.). Springer. Forthcoming.
Mitchell, I., Hara, S., Ibarra Jimenez, J., Jahankhani, H. and Montasari, R. (Accepted). IoT and cloud forensic investigation guidelines. In Montasari, R., Jahankhani, H. Hill, R. and Parkinson, S. (eds.) Digital Forensic Investigation of Internet of Things (IoT) Devices. Springer. Forthcoming.
Montasari, R., Hill, R., Carpenter, V. Hosseinian-Far, A. (2019). Evaluation of the Standardised Digital Forensic Investigation Process Model (ESDFIPM). In Jahankhani, H. (eds.) Cyber Security Practitioner's Guide. World Scientific c.
Montasari, R., Hill, R., Carpenter, V. Hosseinian-Far, A. (2019). The Standardised Digital Forensic Investigation Process Model (SDFIPM). In Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. and Al-Khateeb, H. (eds.) Blockchain and Clinical Trial - Securing Patient Data. Springer, pp. 169-209.
Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Montasari, R. and Chatrabgoun, O. (2018). Criminal Data Mining, Threat Analysis and Prediction. In Jahankhani, H. (eds.) Cybercriminology and Psychology. Springer, pp. 183-202.
Montasari, R., Hosseinian-Far, A. and Hill, R. (2018). Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments. In Jahankhani, H. (eds.) Cybercriminology. Springer, pp. 71-93.
Montasari, R. (2018). Testing the Comprehensive Digital Forensic Investigation Process Model (the CDFIPM). In Dastbaz M., Arabnia H. and Akhgar B. (eds.) Technology for Smart Futures. Springer, pp. 303-327.
Montasari, R. (2017). An Overview of Cloud Forensics Strategy: Capabilities, Challenges, and Opportunities. In Hosseinian-Far, A., Ramachandran, M. and Sarwar, D. (eds.) Strategic Engineering for Cloud Computing and Big Data Analytics. Springer, pp. 189-205.
Edited Books
Montasari, R. Jahankhani, H. Hill, R. and Parkinson, S. (2020). Digital Forensic Investigation of Internet of Things (IoT) Devices. Springer. Forthcoming.
Press / Media (Other Research Outputs)
Montasari, R. (2020). `Obsolete Windows 7 and Associated Security Implications'. Today's Legal Cyber Risk. [Online]. Available at: https://www.todayslegalcyberrisk.co.uk/guest-writers/obsolete-windows-7-and-associated-security-implications/.
Montasari, R. (2019). `What Steps Should Your Organisation Take To Prevent Cyber Attacks?'. Today's Legal Cyber Risk. [Online]. Available at: https://www.todayslegalcyberrisk.co.uk/guest-writers/what-steps-should-your-organisation-take-to-prevent-cyber-attacks/.
Montasari, R. (2019). `Challenges Posed by Internet of Things'. Today's Legal Cyber Risk. [Online]. Available at: https://www.todayslegalcyberrisk.co.uk/guest-writers/challenges-posed-by-internet-of-things/.
Montasari, R. (2019). `AI in Cyber Security: A Technology for Good And Evil'. Today's Legal Cyber Risk. [Online]. Available at: https://www.todayslegalcyberrisk.co.uk/guest-writers/ai-in-