Shahid Alam

Orcid: 0000-0002-4080-8042

According to our database1, Shahid Alam authored at least 34 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SIFT: Sifting file types - application of explainable artificial intelligence in cyber forensics.
Cybersecur., December, 2024

IfNot: An approach towards mitigating interest flooding attacks in Named Data Networking of Things.
Internet Things, April, 2024

XAI-CF - Examining the Role of Explainable Artificial Intelligence in Cyber Forensics.
CoRR, 2024

Enhancing AI-Human Collaborative Decision-Making in Industry 4.0 Management Practices.
IEEE Access, 2024

2023
LAM: Scrutinizing Leading APIs For Detecting Suspicious Call Sequences.
Comput. J., November, 2023

Mining android bytecodes through the eyes of gabor filters for detecting malware.
Int. Arab J. Inf. Technol., 2023

SIFT - File Fragment Classification Without Metadata.
CoRR, 2023

2022
MAIL: Malware Analysis Intermediate Language.
CoRR, 2022

Cybersecurity: Past, Present and Future.
CoRR, 2022

2021
Applying Natural Language Processing for detecting malicious patterns in Android applications.
Digit. Investig., 2021

DroidMorph: Are We Ready to Stop the Attack of Android Malware Clones?
CoRR, 2021

A Recipe for Social Media Analysis.
CoRR, 2021

DroidClone: Attack of the android malware clones - a step towards stopping them.
Comput. Sci. Inf. Syst., 2021

2020
Mining nested flow of dominant APIs for detecting android malware.
Comput. Networks, 2020

2019
Sieving Fake News From Genuine: A Synopsis.
CoRR, 2019

2017
DroidNative: Automating and optimizing detection of Android native code malware variants.
Comput. Secur., 2017

Seeing Trees in a Forest for Improving Syntactic and Semantic Parsing.
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017

DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
DroidNative: Semantic-Based Detection of Android Native Code Malware.
CoRR, 2016

DroidClone: Detecting android malware variants by exposing code clones.
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016

SUIS: An online graphical Signature-Based User Identification System.
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016

2015
Sliding window and control flow weight for metamorphic malware detection.
J. Comput. Virol. Hacking Tech., 2015

A framework for metamorphic malware analysis and real-time detection.
Comput. Secur., 2015

Annotated Control Flow Graph for Metamorphic Malware Detection.
Comput. J., 2015

A Survey: Software-Managed On-Chip Memories.
Comput. Informatics, 2015

2014
A Framework for Metamorphic Malware Analysis and Real-Time Detection.
PhD thesis, 2014

Is Fortran Still Relevant? Comparing Fortran with Java and C++.
CoRR, 2014

Current Trends and the Future of Metamorphic Malware Detection.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

In-Cloud Malware Analysis and Detection: State of the Art.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses?
Int. J. Eng. Pedagog., 2013

MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2009
Using a Formal Language Constructs for Software Model Evolution.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

2007
Using Constraints with Action Language for Model Evolution.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007


  Loading...