2016 conference paper
AppShell: Making data protection practical for lost or stolen Android devices
Noms 2016 - 2016 ieee/ifip network operations and management symposium, 502–508.
2014 journal article
Data-Centric OS Kernel Malware Characterization
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 72–87.
2014 journal article
Profiling user-trigger dependence for Android malware detection
COMPUTERS & SECURITY, 49, 255–273.
2014 journal article
Protecting communications infrastructure against cyber attacks
China Communications, 11(8), I-.
2013 book
Android malware
2013 journal article
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 99–108.
2013 conference paper
Fast, scalable detection of "piggybacked" mobile applications
ACM Conference on Data and Application Security and Privacy, 185–195.
2012 article
Dissecting Android Malware: Characterization and Evolution
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 95–109.
2012 journal article
IntroLib: Efficient and transparent library call introspection for malware forensics
DIGITAL INVESTIGATION, 9, S13–S23.
2012 journal article
Intrusion Detection Models Based on Data Mining
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 5(1), 30–38.
2010 journal article
An Architectural Approach to Preventing Code Injection Attacks
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 7(4), 351–365.
2010 conference paper
DKSM: Subverting virtual machine introspection for fun and profit
2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.
2010 journal article
On the billing vulnerabilities of SIP-based VoIP systems
COMPUTER NETWORKS, 54(11), 1837–1847.
2010 journal article
Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 13(2).
2010 conference paper
hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
2010 IEEE symposium on security and privacy, 380–395.
2009 conference paper
ReFormat: Automatic reverse engineering of encrypted messages
Computer security - esorics 2009, proceedings, 5789, 200–215.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.