• Login
    Browsing by Author 
    •   DORA Home
    • Browsing by Author
    •   DORA Home
    • Browsing by Author
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing by Author "Yerima, Suleiman"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-20 of 40

    • title
    • publication date
    • submission date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Adaptive Measurement-Based Policy-Driven QoS Management with Fuzzy-Rule-based Resource Allocation 

        Yerima, Suleiman; Parr, G.; Morrow, P.; McClean, S. (Article)
        Fixed and wireless networks are increasingly converging towards common connectivity with IP-based core networks. Providing effective end-to-end resource and QoS management in such complex heterogeneous converged network ...
      • Analysis of Bayesian classification-based approaches for Android malware detection 

        Yerima, Suleiman; Sezer, Sakir; McWilliams, G. (Article)
        Mobile malware has been growing in scale and complexity spurred by the unabated uptake of smartphones worldwide. Android is fast becoming the most popular mobile platform resulting in sharp increase in malware targeting ...
      • Android Malware Detection Using Parallel Machine Learning Classifiers 

        Yerima, Suleiman; Sezer, Sakir; Muttik, I. (Conference)
        Mobile malware has continued to grow at an alarming rate despite on-going mitigation efforts. This has been much more prevalent on Android due to being an open platform that is rapidly overtaking other competing platforms ...
      • Android malware detection: An eigenspace analysis approach 

        Yerima, Suleiman; Sezer, Sakir; Muttik, I. (Conference)
        The battle to mitigate Android malware has become more critical with the emergence of new strains incorporating increasingly sophisticated evasion techniques, in turn necessitating more advanced detection capabilities. ...
      • Buffer Management for Multimedia QoS Control over HSDPA Downlink 

        Yerima, Suleiman; Al-Begain, K. (Conference)
        HSDPA specifications include support for a flexible framework for QoS management. In this paper, it is shown how buffer management could be incorporated into HSDPA QoS framework for 'multimedia' traffic QoS control in the ...
      • Class Balanced Similarity-Based Instance Transfer Learning for Botnet Family Classification 

        Janicke, Helge; Yerima, Suleiman; Alothman, Basil (Conference)
        The use of Transfer Learning algorithms for enhancing the performance of machine learning algorithms has gained attention over the last decade. In this paper we introduce an extension and evaluation of our novel approach ...
      • Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system 

        Sezer, Sakir; Yao, F.; Yerima, Suleiman; Kang, B. (Conference)
        As mobile devices have become indispensable in modern life, mobile security is becoming much more important. Traditional password or PIN-like point-of-entry security measures score low on usability and are vulnerable to ...
      • Deep android malware detection 

        McLaughlin, Niall; Martinez del Rincon, Jesus; Kang, BooJoong; Yerima, Suleiman; Miller, Paul; Sezer, Sakir; Safaei, Yeganeh; Trickel, Erik; Zhao, Ziming; Doupe, Adam; Gail Joon Ahn (Conference)
        In this paper, we propose a novel android malware detection system that uses a deep convolutional neural network (CNN). Malware classification is performed based on static analysis of the raw opcode sequence from a ...
      • Deep Learning Techniques for Android Botnet Detection 

        Yerima, Suleiman; Alzaylaee, Mohammed Kadir; Shajan, Annette; P, Vinod (Article)
        Android is increasingly being targeted by malware since it has become the most popular mobile operating system worldwide. Evasive malware families, such as Chamois, designed to turn Android devices into bots that form part ...
      • Design and implementation of a measurement-based policy-driven resource management framework for converged networks 

        Yerima, Suleiman; Parr, G.; McClean, S.; Morrow, P.; Sivalingam, K. (Article)
        This paper presents the design and implementation of a measurement-based QoS and resource management framework, CNQF (Converged Networks’ QoS Management Framework). CNQF is designed to provide unified, scalable QoS control ...
      • Detection of Tor traffic using deep learning 

        Sarkar, Debmalya; P., Vinod; Yerima, Suleiman (Conference)
        Tor, originally known as The Onion Router, is a free software that allows users to communicate anonymously on the Internet. This makes Tor attractive to cyber criminals, and the anonymity provided can be misused by hackers ...
      • DL-Droid: Deep learning based android malware detection using real devices 

        Alzaylaee, Mohammed K.; Yerima, Suleiman; Sezer, Sakir (Article)
        The Android operating system has been the most popular for smartphones and tablets since 2012. This popularity has led to a rapid raise of Android malware in recent years. The sophistication of Android malware obfuscation ...
      • DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection 

        Yerima, Suleiman; Sezer, Sakir (Article)
        Android malware has continued to grow in volume and complexity posing significant threats to the security of mobile devices and the services they enable. This has prompted increasing interest in employing machine learning ...
      • Dynalog: An Automated Dynamic Analysis Framework for Characterizing Android Applications 

        Alzaylaee, M.K.; Yerima, Suleiman; Sezer, Sakir (Conference)
        Android is becoming ubiquitous and currently has the largest share of the mobile OS market with billions of application downloads from the official app market. It has also become the platform most targeted by mobile malware ...
      • Dynamic Buffer Management for Multimedia QoS in Beyond 3G Wireless Networks 

        Yerima, Suleiman; Al-Begain, K. (Article)
        This paper investigates a dynamic buffer management scheme for QoS control of multimedia services in beyond 3G wireless systems. The scheme is studied in the context of the state-of-the-art 3.5G system i.e. the High Speed ...
      • Dynamic Buffer Management for Multimedia Services in 3.5 G Wireless Networks 

        Yerima, Suleiman; Al-Begain, K. (Conference)
        This paper presents and investigates a dynamic buffer management scheme for QoS control of multimedia services in a 3.5 G wireless system ie the High Speed Downlink Packet Access (HSDPA). HSDPA was introduced to enhance ...
      • A Dynamic Buffer Management Scheme for End-to-End QoS Enhancement of Multi-flow Services in HSDPA 

        Yerima, Suleiman; Al-Begain, K. (Conference)
        End-user multi-flow services support is a crucial aspect of current and next generation mobile networks. This paper presents a dynamic buffer management strategy for HSDPA end-user multi-flow traffic with aggregated real-time ...
      • EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning 

        Yerima, Suleiman; Sezer, Sakir; Alzaylaee, Mohammed K. (Conference)
        The Android operating system has become the most popular operating system for smartphones and tablets leading to a rapid rise in malware. Sophisticated Android malware employ detection avoidance techniques in order to hide ...
      • End-to-End QoS Improvement of HSDPA End-User Multi-Flow Traffic Using RAN Buffer Management 

        Yerima, Suleiman; Al-Begain, K. (Conference)
        High speed downlink packet access (HSDPA) was introduced to UMTS radio access segment to provide higher capacity for new packet switched services. As a result, packet switched sessions with multiple diverse traffic flows ...
      • Event-driven implicit authentication for mobile access control 

        Yerima, Suleiman; Sezer, Sakir; Yao, F.; Kang, B. (Conference)
        In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. ...

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary
         

         

        Browse

        All of DORACommunities & CollectionsAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission Date

        My Account

        Login

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary