Your selections:
Digital forensic techniques for static analysis of NTFS images
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Effective digital forensic analysis of the NTFS disk image
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Towards understanding malware behaviour by the extraction of API calls
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Zero-day malware detection based on supervised learning algorithms of API call signatures
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz
Information security governance: The art of detecting hidden malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
Malware detection based on structural and behavioural features of API calls
- Alazab, Mamoun, Layton, Robert, Venkatraman, Sitalakshmi, Watters, Paul
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Skype Traffic Classification Using Cost Sensitive Algorithms
- Azab, Azab, Layton, Robert, Alazab, Mamoun, Watters, Paul
Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
- Jan, Mian, Cai, Jinjin, Gao, Xiang-Chuan, Khan, Fazlullah, Mastorakis, Spyridon, Usman, Muhammad, Alazab, Mamoun, Watters, Paul
Are you sure you would like to clear your session, including search history and login status?