2025
Explainable Android Malware Detection and Malicious Code Localization Using Graph Attention.
CoRR, March, 2025
Distributed Intrusion Detection in Dynamic Networks of UAVs using Few-Shot Federated Learning.
CoRR, January, 2025
A novel federated learning-based IDS for enhancing UAVs privacy and security.
Internet Things, 2025
2024
A Semi-Decentralized PKI Based on Blockchain With a Stake-Based Reward-Punishment Mechanism.
IEEE Access, 2024
Android Authorship Attribution Using Source Code-Based Features.
IEEE Access, 2024
CoCoIDS: A Collaborative Intrusion Detection System for IoT based on Co-evolution.
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
2023
A dynamic trust management model for vehicular ad hoc networks.
Veh. Commun., 2023
A Novel Federated Learning-based Intrusion Detection System for Flying Ad Hoc Networks.
CoRR, 2023
A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions.
CoRR, 2023
Exploring placement of intrusion detection systems in rpl-based internet of things.
CoRR, 2023
Assessing the Impact of Mobile Attackers on RPL-based Internet of Things.
CoRR, 2023
Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning.
Proceedings of the International Conference on Smart Applications, 2023
Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things.
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023
2022
Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries.
Int. J. Inf. Sec., 2022
Deep reinforcement learning based flexible preamble allocation for RAN slicing in 5G networks.
Comput. Networks, 2022
Analysis of RPL Objective Functions with Security Perspective.
Proceedings of the 11th International Conference on Sensor Networks, 2022
2021
A Transfer Learning Approach for Securing Resource-Constrained IoT Devices.
IEEE Trans. Inf. Forensics Secur., 2021
Attention: there is an inconsistency between android permissions and application metadata!
Int. J. Inf. Sec., 2021
Android Security using NLP Techniques: A Review.
CoRR, 2021
Load balancing for RPL-based Internet of Things: A review.
Ad Hoc Networks, 2021
Analysis of Routing Attacks in FANETs.
Proceedings of the Ad Hoc Networks and Tools for IT - 13th EAI International Conference, 2021
2020
Electric fish optimization: a new heuristic algorithm inspired by electrolocation.
Neural Comput. Appl., 2020
A Cross-Layer Intrusion Detection System for RPL-Based Internet of Things.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020
2019
Analysis of dynamic code updating in Android with security perspective.
IET Inf. Secur., 2019
A novel multi-featured metric for adaptive routing in mobile ad hoc networks.
Appl. Intell., 2019
A Central Intrusion Detection System for RPL-Based Industrial Internet of Things.
Proceedings of the 15th IEEE International Workshop on Factory Communication Systems, 2019
Efficient Evolutionary Fuzzing for Android Application Installation Process.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Early Detection of Botnet Activities Using Grammatical Evolution.
Proceedings of the Applications of Evolutionary Computation, 2019
Evolving Trust Formula to Evaluate Data Trustworthiness in VANETs Using Genetic Programming.
Proceedings of the Applications of Evolutionary Computation, 2019
2018
Coevolution of Mobile Malware and Anti-Malware.
IEEE Trans. Inf. Forensics Secur., 2018
Android malware detection based on runtime behaviour.
Proceedings of the 26th Signal Processing and Communications Applications Conference, 2018
UpDroid: Updated Android Malware and Its Familial Classification.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
2017
A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV.
Ad Hoc Networks, 2017
SAFEDroid: Using Structural Features for Detecting Android Malwares.
Proceedings of the Security and Privacy in Communication Networks, 2017
2015
Sequence-based masquerade detection for different user groups.
Secur. Commun. Networks, 2015
GenTrust: A genetic trust management model for peer-to-peer systems.
Appl. Soft Comput., 2015
Internet of Things security and privacy: Design methods and optimization.
Ad Hoc Networks, 2015
API call and permission based mobile malware detection (in english).
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015
Automatic Generation of Mobile Malwares Using Genetic Programming.
Proceedings of the Applications of Evolutionary Computation - 18th European Conference, 2015
"Do You Want to Install an Update of This Application?" A Rigorous Analysis of Updated Android Applications.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains.
ACM Trans. Inf. Syst. Secur., 2014
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection.
Int. J. Inf. Sec., 2014
Analysis of machine learning methods on malware detection.
Proceedings of the 2014 22nd Signal Processing and Communications Applications Conference (SIU), 2014
Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming.
Proceedings of the Applications of Evolutionary Computation - 17th European Conference, 2014
2013
A new approach for detection of insider attacks.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013
A Lightweight Threshold-Based Improvement on DSDV.
Proceedings of the Ad Hoc Networks - 5th International ICST Conference, 2013
2012
On sampling strategies for small and continuous data with the modeling of genetic programming and adaptive neuro-fuzzy inference system.
J. Intell. Fuzzy Syst., 2012
SVM-based detection of ad hoc flooding attacks.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012
Feature Selection for Detection of Ad Hoc Flooding Attacks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
2011
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks.
Comput. Networks, 2011
2009
Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009
A grammatical evolution approach to intrusion detection on mobile ad hoc networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008