Yasir Malik
Cited by
Cited by
Evaluation of PhonAge: an adapted smartphone interface for elderly people
F Arab, Y Malik, B Abdulrazak
IFIP Conference on Human-Computer Interaction, 547-554, 2013
Behavioral-based classification and identification of ransomware variants using machine learning
H Daku, P Zavarsky, Y Malik
2018 17th IEEE international conference on trust, security and privacy in …, 2018
Collaborative peer to peer defense mechanism for ddos attacks
U Tariq, Y Malik, B Abdulrazak, MP Hong
Procedia Computer Science 5, 157-164, 2011
PhonAge: adapted smartphone for aging population
B Abdulrazak, Y Malik, F Arab, S Reid
International Conference on Smart Homes and Health Telematics, 27-35, 2013
Low-rate DoS attack detection using PSD based entropy and machine learning
N Zhang, F Jaafar, Y Malik
2019 6th IEEE International Conference on Cyber Security and Cloud Computing …, 2019
Review of challenges, requirements, and approaches of pervasive computing system evaluation
B Abdulrazak, Y Malik
IETE Technical Review 29 (6), 506-522, 2012
Is predicting software security bugs using deep learning better than the traditional machine learning algorithms?
CJ Clemente, F Jaafar, Y Malik
2018 IEEE International Conference on Software Quality, Reliability and …, 2018
Android gaming malware detection using system call analysis
M Jaiswal, Y Malik, F Jaafar
2018 6th International Symposium on Digital Forensic and Security (ISDFS), 1-5, 2018
Mobile node localization in cellular networks
Y Malik, KA Khaliq, B Abdulrazak, U Tariq
arXiv preprint arXiv:1201.2102, 2012
A taxonomy driven approach towards evaluating pervasive computing system
B Abdualrazak, Y Malik, HI Yang
International Conference on Smart Homes and Health Telematics, 32-42, 2010
Detecting blind cross-site scripting attacks using machine learning
G Kaur, Y Malik, H Samuel, F Jaafar
Proceedings of the 2018 International Conference on Signal Processing and …, 2018
A peer-to-peer architecture for remote service discovery
SD Bruda, F Salehi, Y Malik, B Abdulrazak
Procedia Computer Science 10, 976-983, 2012
Detecting android security vulnerabilities using machine learning and system calls analysis
Y Malik, CRS Campos, F Jaafar
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
Non-linguistic features for cyberbullying detection on a social media platform using machine learning
YY Liu, P Zavarsky, Y Malik
International Symposium on Cyberspace Safety and Security, 391-406, 2019
Security evaluation methodology for Software Defined Network solutions
JC Nikoue, S Butakov, Y Malik
2019 International Conference on Platform Technology and Service (PlatCon), 1-6, 2019
Improving Android application security for intent based attacks
B Khadiranaikar, P Zavarsky, Y Malik
2017 8th IEEE Annual Information Technology, Electronics and Mobile …, 2017
Model based testing: an evaluation
YM Malik
Master of Science, Thesis, Blekinge Institute of Technology, 2010
Towards an Evaluation Framework for Pervasive Computing System
Y Malik, M Soliman, B Abdualrazak
Proceedings of the International Conference on Modeling, Simulation and …, 2011
Speaker Localization, tracking and remote speech pickup in a conference room.
YM Malik
Analysing data security requirements of android mobile banking application
S Bhatnagar, Y Malik, S Butakov
International Conference on Intelligent, Secure, and Dependable Systems in …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20