Shahid Alam
Orcid: 0000-0002-4080-8042
According to our database1,
Shahid Alam
authored at least 34 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SIFT: Sifting file types - application of explainable artificial intelligence in cyber forensics.
Cybersecur., December, 2024
IfNot: An approach towards mitigating interest flooding attacks in Named Data Networking of Things.
Internet Things, April, 2024
XAI-CF - Examining the Role of Explainable Artificial Intelligence in Cyber Forensics.
CoRR, 2024
Enhancing AI-Human Collaborative Decision-Making in Industry 4.0 Management Practices.
IEEE Access, 2024
2023
Comput. J., November, 2023
Int. Arab J. Inf. Technol., 2023
2022
2021
Applying Natural Language Processing for detecting malicious patterns in Android applications.
Digit. Investig., 2021
Comput. Sci. Inf. Syst., 2021
2020
Comput. Networks, 2020
2019
2017
DroidNative: Automating and optimizing detection of Android native code malware variants.
Comput. Secur., 2017
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016
Proceedings of the Sixth International Conference on Digital Information and Communication Technology and its Applications, 2016
2015
J. Comput. Virol. Hacking Tech., 2015
Comput. Secur., 2015
2014
PhD thesis, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses?
Int. J. Eng. Pedagog., 2013
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
2009
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009
2007
Using Constraints with Action Language for Model Evolution.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007