default search action
Shahid Alam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2014
- [b1]Shahid Alam:
A Framework for Metamorphic Malware Analysis and Real-Time Detection. University of Victoria, Canada, 2014
Journal Articles
- 2024
- [j14]Shahid Alam, Mohammad Faisal Khan:
Enhancing AI-Human Collaborative Decision-Making in Industry 4.0 Management Practices. IEEE Access 12: 119433-119444 (2024) - [j13]Shahid Alam, Alper Kamil Demir:
SIFT: Sifting file types - application of explainable artificial intelligence in cyber forensics. Cybersecur. 7(1): 52 (2024) - [j12]Sedat Bilgili, Alper Kamil Demir, Shahid Alam:
IfNot: An approach towards mitigating interest flooding attacks in Named Data Networking of Things. Internet Things 25: 101076 (2024) - 2023
- [j11]Shahid Alam:
LAM: Scrutinizing Leading APIs For Detecting Suspicious Call Sequences. Comput. J. 66(11): 2638-2655 (2023) - [j10]Shahid Alam, Alper Kamil Demir:
Mining android bytecodes through the eyes of gabor filters for detecting malware. Int. Arab J. Inf. Technol. 20(2): 180-189 (2023) - 2021
- [j9]Shahid Alam, Ibrahim Sogukpinar:
DroidClone: Attack of the android malware clones - a step towards stopping them. Comput. Sci. Inf. Syst. 18(1): 67-91 (2021) - [j8]Shahid Alam:
Applying Natural Language Processing for detecting malicious patterns in Android applications. Digit. Investig. 39: 301270 (2021) - 2020
- [j7]Shahid Alam, Soltan Abed Alharbi, Serdar Yildirim:
Mining nested flow of dominant APIs for detecting android malware. Comput. Networks 167 (2020) - 2017
- [j6]Shahid Alam, Zhengyang Qu, Ryan D. Riley, Yan Chen, Vaibhav Rastogi:
DroidNative: Automating and optimizing detection of Android native code malware variants. Comput. Secur. 65: 230-246 (2017) - 2015
- [j5]Shahid Alam, R. Nigel Horspool:
A Survey: Software-Managed On-Chip Memories. Comput. Informatics 34(5): 1168-1200 (2015) - [j4]Shahid Alam, Issa Traoré, Ibrahim Sogukpinar:
Annotated Control Flow Graph for Metamorphic Malware Detection. Comput. J. 58(10): 2608-2621 (2015) - [j3]Shahid Alam, R. Nigel Horspool, Issa Traoré, Ibrahim Sogukpinar:
A framework for metamorphic malware analysis and real-time detection. Comput. Secur. 48: 212-233 (2015) - [j2]Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, R. Nigel Horspool:
Sliding window and control flow weight for metamorphic malware detection. J. Comput. Virol. Hacking Tech. 11(2): 75-88 (2015) - 2013
- [j1]Shahid Alam, LillAnne Jackson:
A Case Study: Are Traditional Face-To-Face Lectures Still Relevant When Teaching Engineering Courses? Int. J. Eng. Pedagog. 3(S4): 9-15 (2013)
Conference and Workshop Papers
- 2017
- [c10]Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Ryan D. Riley:
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications. DSN 2017: 415-426 - [c9]Yukiko Sasaki Alam, Shahid Alam:
Seeing Trees in a Forest for Improving Syntactic and Semantic Parsing. ICSC 2017: 282-283 - 2016
- [c8]Shahid Alam, Ryan D. Riley, Ibrahim Sogukpinar, Necmeddin Carkaci:
DroidClone: Detecting android malware variants by exposing code clones. DICTAP 2016: 79-84 - [c7]Shahid Alam:
SUIS: An online graphical Signature-Based User Identification System. DICTAP 2016: 85-89 - 2014
- [c6]Shahid Alam, R. Nigel Horspool, Issa Traoré:
MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection. AINA 2014: 480-489 - [c5]Shahid Alam, Issa Traoré, Ibrahim Sogukpinar:
Current Trends and the Future of Metamorphic Malware Detection. SIN 2014: 411 - [c4]Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady:
In-Cloud Malware Analysis and Detection: State of the Art. SIN 2014: 473 - 2013
- [c3]Shahid Alam, R. Nigel Horspool, Issa Traoré:
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. SIN 2013: 233-240 - 2009
- [c2]Samuel A. Ajila, Shahid Alam:
Using a Formal Language Constructs for Software Model Evolution. ICSC 2009: 390-395 - 2007
- [c1]Shahid Alam, Samuel A. Ajila:
Using Constraints with Action Language for Model Evolution. Software Engineering Research and Practice 2007: 553-559
Informal and Other Publications
- 2024
- [i10]Shahid Alam, Zeynep Altiparmak:
XAI-CF - Examining the Role of Explainable Artificial Intelligence in Cyber Forensics. CoRR abs/2402.02452 (2024) - 2023
- [i9]Shahid Alam:
SIFT - File Fragment Classification Without Metadata. CoRR abs/2310.03831 (2023) - 2022
- [i8]Shahid Alam:
Cybersecurity: Past, Present and Future. CoRR abs/2207.01227 (2022) - [i7]Shahid Alam:
MAIL: Malware Analysis Intermediate Language. CoRR abs/2211.03068 (2022) - 2021
- [i6]Shahid Alam, Juvariya Khan:
A Recipe for Social Media Analysis. CoRR abs/2106.07307 (2021) - [i5]Shahid Alam, Muhammad Zain ul Abideen, Shahzad Saleem:
DroidMorph: Are We Ready to Stop the Attack of Android Malware Clones? CoRR abs/2106.09218 (2021) - 2019
- [i4]Shahid Alam, Abdulaziz Ravshanbekov:
Sieving Fake News From Genuine: A Synopsis. CoRR abs/1911.08516 (2019) - 2016
- [i3]Shahid Alam, Zhengyang Qu, Ryan D. Riley, Yan Chen, Vaibhav Rastogi:
DroidNative: Semantic-Based Detection of Android Native Code Malware. CoRR abs/1602.04693 (2016) - [i2]Shahid Alam:
SUIS: An Online Graphical Signature-Based User Identification System. CoRR abs/1605.09034 (2016) - 2014
- [i1]Shahid Alam:
Is Fortran Still Relevant? Comparing Fortran with Java and C++. CoRR abs/1407.2190 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint