DroidNative: Automating and optimizing detection of Android native code malware variants S Alam, Z Qu, R Riley, Y Chen, V Rastogi computers & security 65, 230-246, 2017 | 111 | 2017 |
A framework for metamorphic malware analysis and real-time detection S Alam, RN Horspool, I Traore, I Sogukpinar computers & security 48, 212-233, 2015 | 94 | 2015 |
A Framework for Metamorphic Malware Analysis and Real-Time Detection S Alam University of Victoria, Canada, 2014 | 94 | 2014 |
MAIL: Malware Analysis Intermediate Language S Alam arXiv.2211.03068, 2022 | 54* | 2022 |
Annotated Control Flow Graph for Metamorphic Malware Detection S Alam, I Traore, I Sogukpinar The Computer Journal, 2608-2621, 2015 | 54 | 2015 |
MARD: A framework for metamorphic malware analysis and real-time detection S Alam, RN Horspool, I Traore 2014 IEEE 28th International Conference on Advanced Information Networking …, 2014 | 37 | 2014 |
Mining Nested Flow of Dominant APIs for Detecting Android Malware S Alam, SA Alharbi, S Yildirim Computer Networks 167, 1-10, 2020 | 36 | 2020 |
Dydroid: Measuring dynamic code loading and its security implications in android applications Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 36 | 2017 |
DroidClone: Detecting Android Malware Variants by Exposing Code Clones S Alam, R Riley, I Sogukpinar, N Carkaci The Sixth International Conference on Digital Information & Communication …, 2016 | 35 | 2016 |
Sliding Window and Control Flow Weight for Metamorphic Malware Detection S Alam, I Sogukpinar, I Traore, RN Horspool Journal of Computer Virology and Hacking Techniques, 2015 | 29 | 2015 |
In-Cloud Malware Anlaysis and Detection: State of the Art S Alam, I Sogukpinar, I Traore, Y Coady The Seventh ACM International Conference on Security of Information and …, 2014 | 21 | 2014 |
A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses S Alam, LA Jackson International Journal of Engineering Pedagogy (iJEP) 3 (4), pages 9-15, 2013 | 16 | 2013 |
DroidNative: Semantic-based detection of android native code malware S Alam, Z Qu, R Riley, Y Chen, V Rastogi arXiv preprint arXiv:1602.04693, 2016 | 15 | 2016 |
Mining and Detection of Android Malware Based on Permissions AA Sahal, S Alam, I Soğukpinar 3rd International Conference on Computer Science and Engineering (UBMK), 264 …, 2018 | 14 | 2018 |
CAL: Using constraints with action language for model evolution S Alam Journal of Software Engineering 2 (1), 2013 | 13* | 2013 |
Cybersecurity: Past, Present and Future S Alam Lambert Academic Publishing - ISBN: 9786204744216, 2022 | 10 | 2022 |
Current Trends and the Future of Metamorphic Malware Detection S Alam, I Traore, I Sogukpinar The Seventh ACM International Conference on Security of Information and …, 2014 | 10 | 2014 |
Applying Natural Language Processing for detecting malicious patterns in Android applications S Alam Forensic Science International: Digital Investigation 39, 1-12, 2021 | 7 | 2021 |
DroidClone: Attack of the android malware clones-a step towards stopping them S Alam, I Sogukpinar Computer Science and Information Systems 18 (1), 67-91, 2021 | 7 | 2021 |
Sieving Fake News From Genuine: A Synopsis S Alam, A Ravshanbekov International Conference on All Aspects of Cyber Security 2019 (A2CS'19), 67-71, 2019 | 5 | 2019 |