Follow
Mourad Leslous
Mourad Leslous
Verified email at edf.fr
Title
Cited by
Cited by
Year
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The LASER Workshop: Learning from Authoritative Security Experiment Results …, 2016
552016
Gpfinder: tracking the invisible in android malware
M Leslous, VVT Tong, JF Lalande, T Genet
2017 12th International Conference on Malicious and Unwanted Software …, 2017
132017
Challenges for reliable and large scale evaluation of android malware analysis
JF Lalande, VVT Tong, M Leslous, P Graux
2018 International Conference on High Performance Computing & Simulation …, 2018
112018
Inferring a distributed application behavior model for anomaly based intrusion detection
E Totel, M Hkimi, M Hurfin, M Leslous, Y Labiche
2016 12th European Dependable Computing Conference (EDCC), 53-64, 2016
102016
Information flows at OS level unmask sophisticated Android malware
VVT Tong, A Trulla, M Leslous, JF Lalande
14th International Conference on Security and Cryptography 6, 578-585, 2017
52017
Challenges in Android Malware Analysis
VVT Tong, JF Lalande, M Leslous
ERCIM News, 42-43, 2016
32016
Highlight and execute suspicious paths in Android malware
M Leslous
Université de Rennes, 2018
12018
Using Implicit Calls to Improve Malware Dynamic Execution
M Leslous, JF Lalande, VVT Tong
37th IEEE Symposium on Security and Privacy, 2016
12016
Anomaly Based Intrusion Detection in Distributed Applications without global clock
E Totel, M Hkimi, M Hurfin, M Leslous, Y Labiche
SEC2 2016-Deuxième atelier sur la Sécurité dans les Clouds, 2016
2016
Poster: Using Implicit Calls to Improve Malware Dynamic Execution
M Leslous, VVT Tong, JF Lalande
The system can't perform the operation now. Try again later.
Articles 1–10