Follow
Mojtaba Eskandari
Mojtaba Eskandari
void(0)
No verified email
Title
Cited by
Cited by
Year
Passban IDS: An Intelligent Anomaly Based Intrusion Detection System for IoT Edge Devices
M Eskandari, ZH Janjua, M Vecchio, F Antonelli
IEEE Internet of Things Journal 7 (8), 6882 - 6897, 2020
3012020
A graph mining approach for detecting unknown malwares
M Eskandari, S Hashemi
Journal of Visual Languages & Computing 23 (3), 154-162, 2012
962012
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
M Eskandari, Z Khorshidpour, S Hashemi
Journal of Computer Virology and Hacking Techniques 9 (2), 77-93, 2013
792013
Metamorphic malware detection using control flow graph mining
M Eskandari, S Hashemi
International Journal of Computer Science and Network Security 11 (12), 1-6, 2011
502011
SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme
A Buriro, B Crispo, M Eskandari, S Gupta, A Mahboob, R Van Acker
Emerging Technologies for Authorization and Authentication, 2018
292018
To Incorporate Sequential Dynamic Features in Malware Detection Engines
M Eskandari, Z Khorshidpur, S Hashemi
Intelligence and Security Informatics Conference (EISIC), 2012 European, 46--52, 2012
292012
Frequent sub‐graph mining for intelligent malware detection
M Eskandari, H Raesi
Security and Communication Networks 7 (11), 1872-1886, 2014
192014
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps
M Eskandari, M Ahmad, AS de Oliveira, B Crispo
Proceedings on Privacy Enhancing Technologies 1, 118-131, 2017
172017
VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud
M Eskandari, ASD Oliveira, B Crispo
Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6thá…, 2014
172014
ECFGM: enriched control flow graph miner for unknown vicious infected code detection
M Eskandari, S Hashemi
Journal in Computer Virology 8 (3), 99-108, 2012
152012
ANALYSIS OF MOBILE APPLICATIONS
M Eskandari, M Ahmad, ASD Oliveira, B Crispo
US Patent App. 15/823,570, 2019
62019
DLoc: Distributed auditing for data location compliance in cloud
M Eskandari, B Crispo, AS De Oliveira
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICSá…, 2017
32017
Smartphone Data Transfer Protection According to Jurisdiction Regulations
M Eskandari
UniversitÓ degli studi di Trento, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–13