Author of the publication

DroidGraph: discovering Android malware by analyzing semantic behavior.

, , , and . CNS, page 498-499. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PsyBoG: Power spectral density analysis for detecting botnet groups., , , , and . MALWARE, page 85-92. IEEE Computer Society, (2014)SIERRA: Ranking Anomalous Activities in Enterprise Networks., , , , , and . EuroS&P, page 44-59. IEEE, (2022)A Step Towards On-Path Security Function Outsourcing., , , , , and . ICDCN, page 175-187. ACM, (2022)D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System., , , , , and . EuroS&P, page 578-597. IEEE, (2021)On Return Oriented Programming Threats in Android Runtime., , and . PST, page 259-267. IEEE Computer Society, (2017)SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission., , , and . MUE, page 60-65. IEEE Computer Society, (2007)DroidGraph: discovering Android malware by analyzing semantic behavior., , , and . CNS, page 498-499. IEEE, (2014)Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 343-361. Springer, (2011)PsyBoG: A scalable botnet detection method for large-scale DNS traffic., , , and . Comput. Networks, (2016)Screening Smartphone Applications Using Behavioral Signatures., , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 14-27. Springer, (2013)