Login / Signup
Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
Hisham Alasmary
Aminollah Khormali
Afsah Anwar
Jeman Park
Jinchun Choi
Ahmed Abusnaina
Amro Awad
DaeHun Nyang
Aziz Mohaisen
Published in:
IEEE Internet Things J. (2019)
Keyphrases
</>
graph theory
mobile devices
directed graph
detect malicious
graph structure
structured data
random walk
graph representation
graph model
automatic detection
big data
weighted graph
key technologies
graph search
bipartite graph
reverse engineering
directed acyclic graph
stable set
data sets