Suleiman Y. Yerima

Orcid: 0000-0003-0346-1219

According to our database1, Suleiman Y. Yerima authored at least 45 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN.
IEEE Syst. J., June, 2023

2022
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network.
J. Netw. Syst. Manag., 2022

Semi-supervised novelty detection with one class SVM for SMS spam detection.
Proceedings of the 29th International Conference on Systems, Signals and Image Processing, 2022

A deep learning-enhanced botnet detection system based on Android manifest text mining.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022

2021
A Transdisciplinary Framework for AI-driven Disaster Risk Reduction for Low-income Housing Communities in Kenya.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Bot-IMG: A framework for image-based detection of Android botnets using machine learning.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

2020
High Accuracy Phishing Detection Based on Convolutional Neural Networks.
CoRR, 2020

DL-Droid: Deep learning based android malware detection using real devices.
Comput. Secur., 2020

Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks.
Proceedings of the 2020 International Conference on Cyber Situational Awareness, 2020

Detection of Tor Traffic using Deep Learning.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection.
IEEE Trans. Cybern., 2019

Machine learning-based dynamic analysis of Android apps with improved code coverage.
EURASIP J. Inf. Secur., 2019

Longitudinal performance analysis of machine learning based Android malware detectors.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

2018
MobiQ: A modular Android application for collecting social interaction, repeated survey, GPS and photographic data.
SoftwareX, 2018

Class Balanced Similarity-Based Instance Transfer Learning for Botnet Family Classification.
Proceedings of the Discovery Science - 21st International Conference, 2018

2017
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

Improving dynamic analysis of android apps using hybrid test input generation.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

Deep Android Malware Detection.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

2016
N-gram Opcode Analysis for Android Malware Detection.
Int. J. Cyber Situational Aware., 2016

Android Malware Detection: an Eigenspace Analysis Approach.
CoRR, 2016

Design and Implementation of a Measurement-Based Policy-Driven Resource Management Framework For Converged Networks.
CoRR, 2016

Dynamic Buffer Management for Multimedia QoS in Beyond 3G Wireless Networks.
CoRR, 2016

Analysis of M2/M2/1/R, N Queuing Model for Multimedia over 3.5G Wireless Network Downlink.
CoRR, 2016

An Enhanced Buffer Management Scheme for Multimedia Traffic in HSDPA.
CoRR, 2016

Fuzzy Logic-based Implicit Authentication for Mobile Access Control.
CoRR, 2016

DynaLog: An automated dynamic analysis framework for characterizing Android applications.
CoRR, 2016

N-opcode analysis for android malware classification and categorization.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2015
High accuracy android malware detection using ensemble learning.
IET Inf. Secur., 2015

Software as a Service: Analyzing Security Issues.
CoRR, 2015

PageRank in malware categorization.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

Event-Driven Implicit Authentication for Mobile Access Control.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

2014
Analysis of Bayesian classification-based approaches for Android malware detection.
IET Inf. Secur., 2014

Android Malware Detection Using Parallel Machine Learning Classifiers.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

2013
Implementation and Evaluation of Measurement-Based Admission Control Schemes Within a Converged Networks QoS Management Framework.
CoRR, 2013

A New Android Malware Detection Approach Using Bayesian Classification.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Adaptive Measurement-Based Policy-Driven QoS Management with Fuzzy-Rule-based Resource Allocation.
Future Internet, 2012

2011
Novel Radio Link Buffer Management Schemes for End-User Multi-class Traffic in High Speed Packet Access Networks.
Wirel. Pers. Commun., 2011

Modelling and evaluation of a policy-based resource management framework for converged next generation networks.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

2010
A framework for context-driven end-to-end QoS control in Converged Networks.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Investigation of the M<sub>2</sub>/G<sub>2</sub>/1/∞,N queue with restricted admission of priority customers and its application to HSDPA mobile systems.
Comput. Networks, 2009

2008
Performance Evaluation and Resource Management of Hierarchical MACRO-/MICRO Cellular Networks using MOSEL-2.
Wirel. Pers. Commun., 2008

End-to-End QoS Improvement of HSDPA End-User Multi-Flow Traffic Using RAN Buffer Management.
Proceedings of the NTMS 2008, 2008

2007
Buffer Management for Multimedia QoS Control over HSDPA Downlink.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007


  Loading...