Shahid Alam
Title
Cited by
Cited by
Year
A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore, I Sogukpinar
computers & security 48, 212-233, 2015
672015
A Framework for Metamorphic Malware Analysis and Real-Time Detection
S Alam
University of Victoria, Canada, 2014
672014
DroidNative: Automating and optimizing detection of Android native code malware variants
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
computers & security 65, 230-246, 2017
662017
MAIL: Malware Analysis Intermediate Language - A Step Towards Automating and Optimizing Malware Detection
S Alam, RN Horspool, I Traore
ACM SIGSAC Sixth International Conference on Security of Information and …, 2013
382013
Annotated Control Flow Graph for Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Computer Journal, 2608-2621, 2015
352015
MARD: A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore
2014 IEEE 28th International Conference on Advanced Information Networking …, 2014
322014
Sliding Window and Control Flow Weight for Metamorphic Malware Detection
S Alam, I Sogukpinar, I Traore, RN Horspool
Journal of Computer Virology and Hacking Techniques, 2015
252015
DroidClone: Attack of the android malware clones-a step towards stopping them
S Alam, I Sogukpinar
Computer Science and Information Systems 18 (1), 67-91, 2021
23*2021
Dydroid: Measuring dynamic code loading and its security implications in android applications
Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
202017
In-Cloud Malware Anlaysis and Detection: State of the Art
S Alam, I Sogukpinar, I Traore, Y Coady
The Seventh ACM International Conference on Security of Information and …, 2014
162014
CAL: Using constraints with action language for model evolution
S Alam
Journal of Software Engineering 2 (1), 2013
13*2013
DroidNative: Semantic-based detection of android native code malware
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
arXiv preprint arXiv:1602.04693, 2016
122016
Mining Nested Flow of Dominant APIs for Detecting Android Malware
S Alam, SA Alharbi, S Yildirim
Computer Networks 167, 1-10, 2020
10*2020
Current Trends and the Future of Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Seventh ACM International Conference on Security of Information and …, 2014
82014
A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses
S Alam, LA Jackson
International Journal of Engineering Pedagogy (iJEP) 3 (4), pages 9-15, 2013
72013
A SURVEY: SOFTWARE-MANAGED ON-CHIP MEMORIES
S Alam, RN Horspool
Computing and Informatics 34 (5), 1168-1200, 2015
4*2015
Sieving Fake News From Genuine: A Synopsis
S Alam, A Ravshanbekov
International Conference on All Aspects of Cyber Security 2019 (A2CS'19), 67-71, 2019
32019
Mining and Detection of Android Malware Based on Permissions
AA Sahal, S Alam, I Soğukpinar
2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018
32018
Is Fortran Still Relevant? Comparing Fortran with java and C++
S Alam
International Journal of Software Engineering & Applications 5 (3), 25-45, 2014
3*2014
SUIS: An Online Graphical Signature-Based User Identification System
S Alam
DICTAP 2016, 85-89, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20