4.4 Article Proceedings Paper

An opcode-based technique for polymorphic Internet of Things malware detection

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols

B. B. Gupta et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Software Engineering

An opportunistic resource management model to overcome resource-constraint in the Internet of Things

Nader Sohrabi Safa et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)

Article Computer Science, Interdisciplinary Applications

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence

Dennis Kiwia et al.

JOURNAL OF COMPUTATIONAL SCIENCE (2018)

Editorial Material Computer Science, Theory & Methods

Internet of Things security and forensics: Challenges and opportunities

Mauro Conti et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting

Hamed HaddadPajouh et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Intelligent OS X malware threat detection with code inspection

Hamed Haddad Pajouh et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2018)

Article Computer Science, Software Engineering

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression

Shamsul Huda et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2017)

Article Computer Science, Software Engineering

CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices

Hao Sun et al.

SOFTWARE-PRACTICE & EXPERIENCE (2017)

Article Computer Science, Software Engineering

Detection of malicious behavior in android apps through API calls and permission uses analysis

Ming Yang et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2017)

Article Computer Science, Theory & Methods

A Survey on Malware Detection Using Data Mining Techniques

Yanfang Ye et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Hardware & Architecture

Machine learning aided Android malware classification

Nikola Milosevic et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Information Systems

Twenty Security Considerations for Cloud-Supported Internet of Things

Jatinder Singh et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Proceedings Paper Computer Science, Information Systems

Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware

Gerardo Canfora et al.

PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 (2015)

Article Computer Science, Software Engineering

Denial of service mitigation approach for IPv6-enabled smart object networks

Luis M. L. Oliveira et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2013)

Article Computer Science, Artificial Intelligence

Parallel Sequential Pattern Mining of Massive Trajectory Data

Shaojie Qiao et al.

International Journal of Computational Intelligence Systems (2013)