• Publications
  • Influence
“Andromaly”: a behavioral malware detection framework for android devices
This article presents Andromaly—a framework for detecting malware on Android mobile devices. The proposed framework realizes a Host-based Malware Detection System that continuously monitors variousExpand
  • 645
  • 47
  • PDF
N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders
The proliferation of IoT devices that can be more easily compromised than desktop computers has led to an increase in IoT-based botnet attacks. To mitigate this threat, there is a need for newExpand
  • 167
  • 33
  • PDF
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
Neural networks have become an increasingly popular solution for network intrusion detection systems (NIDS). Their capability of learning complex patterns and behaviors make them a suitable solutionExpand
  • 136
  • 25
  • PDF
Google Android: A Comprehensive Security Assessment
This research provides a security assessment of the Android framework-Google's software stack for mobile devices. The authors identify high-risk threats to the framework and suggest several securityExpand
  • 398
  • 17
  • PDF
Online Social Networks: Threats and Solutions
Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name aExpand
  • 174
  • 15
  • PDF
Detecting unknown malicious code by applying classification techniques on OpCode patterns
In previous studies classification algorithms were employed successfully for the detection of unknown malicious code. Most of these studies extracted features based on byte n-gram patterns in orderExpand
  • 186
  • 13
  • PDF
Unknown Malcode Detection Using OPCODE Representation
The recent growth in network usage has motivated the creation of new malicious code for various purposes, including economic ones. Today's signature-based anti-viruses are very accurate, but cannotExpand
  • 159
  • 11
  • PDF
Securing Android-Powered Mobile Devices Using SELinux
Google's Android framework incorporates an operating system and software stack for mobile devices. Using a general-purpose operating system such as Linux in mobile devices has advantages but alsoExpand
  • 165
  • 11
Link Prediction in Social Networks Using Computationally Efficient Topological Features
Online social networking sites have become increasingly popular over the last few years. As a result, new interdisciplinary research directions have emerged in which social network analysis methodsExpand
  • 159
  • 11
  • PDF
Unknown malcode detection via text categorization and the imbalance problem
Todaypsilas signature-based anti-viruses are very accurate, but are limited in detecting new malicious code. Currently, dozens of new malicious codes are created every day, and this number isExpand
  • 86
  • 11
  • PDF