Your selections:
Zero-day malware detection based on supervised learning algorithms of API call signatures
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz
Analysis of firewall log-based detection scenarios for evidence in digital forensics
- Mukhtar, Rubiu, Al-Nemrat, Ameer, Alazab, Mamoun, Venkatraman, Sitalakshmi, Jahankhani, Hamid
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Malicious Spam Emails Developments and Authorship Attribution
- Alazab, Mamoun, Layton, Robert, Broadhurst, Roderic, Bouhours, Brigitte
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Mining malware to detect variants
- Azab, Ahmad, Layton, Robert, Alazab, Mamoun, Oliver, Jonathan
Are you sure you would like to clear your session, including search history and login status?