Related references
Note: Only part of the references are listed.An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols
B. B. Gupta et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)
An opportunistic resource management model to overcome resource-constraint in the Internet of Things
Nader Sohrabi Safa et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)
A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence
Dennis Kiwia et al.
JOURNAL OF COMPUTATIONAL SCIENCE (2018)
Internet of Things security and forensics: Challenges and opportunities
Mauro Conti et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
Hamed HaddadPajouh et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Intelligent OS X malware threat detection with code inspection
Hamed Haddad Pajouh et al.
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2018)
A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression
Shamsul Huda et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2017)
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices
Hao Sun et al.
SOFTWARE-PRACTICE & EXPERIENCE (2017)
Detection of malicious behavior in android apps through API calls and permission uses analysis
Ming Yang et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2017)
A Survey on Malware Detection Using Data Mining Techniques
Yanfang Ye et al.
ACM COMPUTING SURVEYS (2017)
Machine learning aided Android malware classification
Nikola Milosevic et al.
COMPUTERS & ELECTRICAL ENGINEERING (2017)
Twenty Security Considerations for Cloud-Supported Internet of Things
Jatinder Singh et al.
IEEE INTERNET OF THINGS JOURNAL (2016)
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware
Gerardo Canfora et al.
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 (2015)
Denial of service mitigation approach for IPv6-enabled smart object networks
Luis M. L. Oliveira et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2013)
Parallel Sequential Pattern Mining of Massive Trajectory Data
Shaojie Qiao et al.
International Journal of Computational Intelligence Systems (2013)