Follow
Shahid Alam
Title
Cited by
Cited by
Year
DroidNative: Automating and optimizing detection of Android native code malware variants
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
computers & security 65, 230-246, 2017
1002017
A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore, I Sogukpinar
computers & security 48, 212-233, 2015
842015
A Framework for Metamorphic Malware Analysis and Real-Time Detection
S Alam
University of Victoria, Canada, 2014
842014
Annotated Control Flow Graph for Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Computer Journal, 2608-2621, 2015
522015
MAIL: Malware Analysis Intermediate Language
S Alam
10.48550/arXiv.2211.03068, 2022
50*2022
DroidClone: Attack of the android malware clones-a step towards stopping them
S Alam, I Sogukpinar
Computer Science and Information Systems 18 (1), 67-91, 2021
37*2021
MARD: A framework for metamorphic malware analysis and real-time detection
S Alam, RN Horspool, I Traore
2014 IEEE 28th International Conference on Advanced Information Networking …, 2014
342014
Mining Nested Flow of Dominant APIs for Detecting Android Malware
S Alam, SA Alharbi, S Yildirim
Computer Networks 167, 1-10, 2020
33*2020
Sliding Window and Control Flow Weight for Metamorphic Malware Detection
S Alam, I Sogukpinar, I Traore, RN Horspool
Journal of Computer Virology and Hacking Techniques, 2015
292015
Dydroid: Measuring dynamic code loading and its security implications in android applications
Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
282017
In-Cloud Malware Anlaysis and Detection: State of the Art
S Alam, I Sogukpinar, I Traore, Y Coady
The Seventh ACM International Conference on Security of Information and …, 2014
202014
DroidNative: Semantic-based detection of android native code malware
S Alam, Z Qu, R Riley, Y Chen, V Rastogi
arXiv preprint arXiv:1602.04693, 2016
142016
CAL: Using constraints with action language for model evolution
S Alam
Journal of Software Engineering 2 (1), 2013
13*2013
A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses
S Alam, LA Jackson
International Journal of Engineering Pedagogy (iJEP) 3 (4), pages 9-15, 2013
122013
Current Trends and the Future of Metamorphic Malware Detection
S Alam, I Traore, I Sogukpinar
The Seventh ACM International Conference on Security of Information and …, 2014
102014
Mining and Detection of Android Malware Based on Permissions
AA Sahal, S Alam, I Soğukpinar
2018 3rd International Conference on Computer Science and Engineering (UBMK …, 2018
82018
Sieving Fake News From Genuine: A Synopsis
S Alam, A Ravshanbekov
International Conference on All Aspects of Cyber Security 2019 (A2CS'19), 67-71, 2019
62019
Is Fortran Still Relevant? Comparing Fortran with java and C++
S Alam
International Journal of Software Engineering & Applications 5 (3), 25-45, 2014
5*2014
A SURVEY: SOFTWARE-MANAGED ON-CHIP MEMORIES
S Alam, RN Horspool
Computing and Informatics 34 (5), 1168-1200, 2015
4*2015
Cybersecurity: Past, Present And Future
S Alam
Lambert Academic Publishing - ISBN: 9786204744216, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20