Security Analysis Method

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress)

Authors: Ashish Kundu, Chinmay Kundu, Karan K. Budhraja | Published: 2017-04-10
Security Analysis Method
Device Sensitivity Analysis
Vulnerability Analysis

A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization

Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-04-06 | Updated: 2017-04-08
Security Analysis Method
Program Analysis
Malware Detection Method

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be

Authors: Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin | Published: 2017-03-28
IoT Security Issues
Security Analysis Method
Attack Method