Shahid Alam
Titolo
Citata da
Citata da
Anno
A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore, I Sogukpinar
computers & security 48, 212-233, 2015
572015
A Framework for Metamorphic Malware Analysis and Real-Time Detection
S Alam
University of Victoria, Canada, 2014
572014
DroidNative: Automating and optimizing detection of Android native code malware variants
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
computers & security 65, 230-246, 2017
412017
MAIL: Malware Analysis Intermediate Language - A Step Towards Automating and Optimizing Malware Detection
S Alam, RN Horspool, I Traore
ACM SIGSAC Sixth International Conference on Security of Information and …, 2013
352013
Annotated Control Flow Graph for Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Computer Journal, 2608-2621, 2015
312015
MARD: A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore
2014 IEEE 28th International Conference on Advanced Information Networking …, 2014
272014
Sliding Window and Control Flow Weight for Metamorphic Malware Detection
S Alam, I Sogukpinar, I Traore, RN Horspool
Journal of Computer Virology and Hacking Techniques, 2015
242015
DroidClone: Detecting Android Malware Variants by Exposing Code Clones
S Alam, R Riley, I Sogukpinar, N Carkaci
DICTAP 2016, 79-84, 2016
162016
In-Cloud Malware Anlaysis and Detection: State of the Art
S Alam, I Sogukpinar, I Traore, Y Coady
The Seventh ACM International Conference on Security of Information and …, 2014
152014
CAL: Using constraints with action language for model evolution
S Alam
Journal of Software Engineering 2 (1), 2013
13*2013
Dydroid: Measuring dynamic code loading and its security implications in android applications
Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
122017
DroidNative: Semantic-based detection of android native code malware
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
arXiv preprint arXiv:1602.04693, 2016
112016
Current Trends and the Future of Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Seventh ACM International Conference on Security of Information and …, 2014
72014
Mining Nested Flow of Dominant APIs for Detecting Android Malware
S Alam, SA Alharbi, S Yildirim
Computer Networks 167, 1-10, 2020
5*2020
A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses
S Alam, LA Jackson
International Journal of Engineering Pedagogy (iJEP) 3 (4), pages 9-15, 2013
52013
A SURVEY: SOFTWARE-MANAGED ON-CHIP MEMORIES
S Alam, RN Horspool
Computing and Informatics 34 (5), 1168-1200, 2015
3*2015
Mining and Detection of Android Malware Based on Permissions
AA Sahal, S Alam, I Soğukpinar
2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018
22018
SUIS: An Online Graphical Signature-Based User Identification System
S Alam
DICTAP 2016, 85-89, 2016
22016
Is Fortran Still Relevant? Comparing Fortran with java and C++
S Alam
International Journal of Software Engineering & Applications 5 (3), 25-45, 2014
2*2014
Using Constraints with Action Language for Model Evolution.
S Alam, SA Ajila
Software Engineering Research and Practice, 553-559, 2007
22007
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20