Yasir Malik

According to our database1, Yasir Malik authored at least 24 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
An Approach to Evaluating Learning Algorithms for Decision Trees.
CoRR, 2020

2019
Detecting Android Security Vulnerabilities Using Machine Learning and System Calls Analysis.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Vulnerability assessment of machine learning based malware classification models.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Simulating link aggregation in private virtual lan using openflow for cloud environment.
Proceedings of the Communications and Networking Symposium, 2018

Detecting Blind Cross-Site Scripting Attacks Using Machine Learning.
Proceedings of the 2018 International Conference on Signal Processing and Machine Learning, 2018

Is Predicting Software Security Bugs Using Deep Learning Better Than the Traditional Machine Learning Algorithms?
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Analysing Data Security Requirements of Android Mobile Banking Application.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018

2016
An Advanced DSP Algorithm for Music-Less Audio Stream Generation.
Proceedings of the International Conference on Frontiers of Information Technology, 2016

2015
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors.
CoRR, 2015

2013
Evaluation of PhonAge: An Adapted Smartphone Interface for Elderly People.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

Formal Modeling and Analysis of Context-Aware Medication Management System for Smart Houses.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

PhonAge: Adapted SmartPhone for Aging Population.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

Reliable communication protocol for inter-vehicular network.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

2012
Defense and Monitoring Model for Distributed Denial of Service Attacks.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

A Peer-to-Peer Architecture for Remote Service Discovery.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Mobile node localization in cellular networks
CoRR, 2012

Towards Verifying Service Interoperability Requirements for Pervasive Computing Environments.
Proceedings of the PECCS 2012, 2012

A Distributed Architecture for Remote Service Discovery in Pervasive Computing.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012

2011
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

NACS: non-overlapping AP's caching scheme to reduce handoff in 802.11 wireless LAN
CoRR, 2011

2010
A Taxonomy Driven Approach towards Evaluating Pervasive Computing System.
Proceedings of the Aging Friendly Technology for Health and Independence, 2010


  Loading...