Follow
Shahid Alam
Title
Cited by
Cited by
Year
DroidNative: Automating and optimizing detection of Android native code malware variants
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
computers & security 65, 230-246, 2017
1192017
A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore, I Sogukpinar
computers & security 48, 212-233, 2015
992015
A Framework for Metamorphic Malware Analysis and Real-Time Detection
S Alam
University of Victoria, Canada, 2014
992014
Annotated Control Flow Graph for Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Computer Journal, 2608-2621, 2015
602015
MAIL: Malware Analysis Intermediate Language
S Alam
arXiv.2211.03068, 2022
54*2022
Mining Nested Flow of Dominant APIs for Detecting Android Malware
S Alam, SA Alharbi, S Yildirim
Computer Networks 167, 1-10, 2020
382020
Dydroid: Measuring dynamic code loading and its security implications in android applications
Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
382017
MARD: A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore
2014 IEEE 28th International Conference on Advanced Information Networking …, 2014
372014
DroidClone: Detecting Android Malware Variants by Exposing Code Clones
S Alam, R Riley, I Sogukpinar, N Carkaci
The Sixth International Conference on Digital Information & Communication …, 2016
362016
Sliding Window and Control Flow Weight for Metamorphic Malware Detection
S Alam, I Sogukpinar, I Traore, RN Horspool
Journal of Computer Virology and Hacking Techniques, 2015
302015
In-Cloud Malware Anlaysis and Detection: State of the Art
S Alam, I Sogukpinar, I Traore, Y Coady
The Seventh ACM International Conference on Security of Information and …, 2014
222014
Cybersecurity: Past, Present and Future
S Alam
Lambert Academic Publishing - ISBN: 9786204744216, 2022
182022
A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses
S Alam, LA Jackson
International Journal of Engineering Pedagogy (iJEP) 3 (4), pages 9-15, 2013
172013
CAL: Using constraints with action language for model evolution
S Alam
Journal of Software Engineering 2 (1), 2013
17*2013
DroidNative: Semantic-based detection of android native code malware
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
arXiv preprint arXiv:1602.04693, 2016
152016
Mining and Detection of Android Malware Based on Permissions
AA Sahal, S Alam, I Soğukpinar
3rd International Conference on Computer Science and Engineering (UBMK), 264 …, 2018
142018
Current Trends and the Future of Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Seventh ACM International Conference on Security of Information and …, 2014
122014
DroidClone: Attack of the android malware clones-a step towards stopping them
S Alam, I Sogukpinar
Computer Science and Information Systems 18 (1), 67-91, 2021
92021
Sieving Fake News From Genuine: A Synopsis
S Alam, A Ravshanbekov
International Conference on All Aspects of Cyber Security 2019 (A2CS'19), 67-71, 2019
82019
Applying Natural Language Processing for detecting malicious patterns in Android applications
S Alam
Forensic Science International: Digital Investigation 39, 1-12, 2021
72021
The system can't perform the operation now. Try again later.
Articles 1–20