default search action
Suleiman Y. Yerima
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Dhanya K. A., P. Vinod, Suleiman Y. Yerima, Abul Bashar, David A. Wagner, Abhiram T., Alan Antony, Ashil K. Shavanas, T. Gireesh Kumar:
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN. IEEE Syst. J. 17(2): 2756-2766 (2023) - 2022
- [j12]P. R. Vishnu, P. Vinod, Suleiman Y. Yerima:
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network. J. Netw. Syst. Manag. 30(1): 9 (2022) - [c22]Dincy R. Arikkat, Rafidha Rehiman K. A., Vinod P., Suleiman Y. Yerima, Manoja W, Pooja S, Shilpa Sekhar, Sohan James, Josna Philomina:
Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques. IC3 2022: 305-312 - [c21]Suleiman Y. Yerima, Yi Min To:
A deep learning-enhanced botnet detection system based on Android manifest text mining. ISDFS 2022: 1-6 - [c20]Suleiman Y. Yerima, Abul Bashar:
Semi-supervised novelty detection with one class SVM for SMS spam detection. IWSSIP 2022: 1-4 - 2021
- [c19]Suleiman Y. Yerima, Abul Bashar:
Bot-IMG: A framework for image-based detection of Android botnets using machine learning. AICCSA 2021: 1-7 - [c18]Darpan Triboan, Esther Adhiambo Obonyo, Aladdin Ayesh, Suleiman Y. Yerima, Barnali Basak, Wangari Wang'Ombe, Daniel Olago, Lydia A. Olaka, Kristin K. Sznajder, Carvalho Madivate:
A Transdisciplinary Framework for AI-driven Disaster Risk Reduction for Low-income Housing Communities in Kenya. SMC 2021: 188-193 - 2020
- [j11]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. Comput. Secur. 89 (2020) - [c17]Debmalya Sarkar, P. Vinod, Suleiman Y. Yerima:
Detection of Tor Traffic using Deep Learning. AICCSA 2020: 1-8 - [c16]Suleiman Y. Yerima, Mohammed K. Alzaylaee:
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks. CyberSA 2020: 1-8 - [i26]Suleiman Y. Yerima, Mohammed K. Alzaylaee:
High Accuracy Phishing Detection Based on Convolutional Neural Networks. CoRR abs/2004.03960 (2020) - [i25]Suleiman Y. Yerima, Mohammed K. Alzaylaee:
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks. CoRR abs/2007.00263 (2020)
2010 – 2019
- 2019
- [j10]Suleiman Y. Yerima, Mohammed K. Alzaylaee, Sakir Sezer:
Machine learning-based dynamic analysis of Android apps with improved code coverage. EURASIP J. Inf. Secur. 2019: 4 (2019) - [j9]Suleiman Y. Yerima, Sakir Sezer:
DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection. IEEE Trans. Cybern. 49(2): 453-466 (2019) - [c15]Suleiman Y. Yerima, Sarmadullah Khan:
Longitudinal performance analysis of machine learning based Android malware detectors. Cyber Security 2019: 1-8 - [i24]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. CoRR abs/1911.10113 (2019) - 2018
- [j8]Suleiman Y. Yerima, Michael Loughlin, Sakir Sezer, John Moriarty, Mark McCann, Helen McAneney, Leeanne O'hara, Mark A. Tully, Paul S. Ell, Robert Miller, Geraldine Macdonald:
MobiQ: A modular Android application for collecting social interaction, repeated survey, GPS and photographic data. SoftwareX 7: 143-149 (2018) - [c14]Basil Alothman, Helge Janicke, Suleiman Y. Yerima:
Class Balanced Similarity-Based Instance Transfer Learning for Botnet Family Classification. DS 2018: 99-113 - 2017
- [c13]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning. IWSPA@CODASPY 2017: 65-72 - [c12]Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c11]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
Improving dynamic analysis of android apps using hybrid test input generation. Cyber Security 2017: 1-8 - [c10]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. Cyber Security 2017: 1-7 - [i23]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning. CoRR abs/1703.10926 (2017) - [i22]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
Improving Dynamic Analysis of Android Apps Using Hybrid Test Input Generation. CoRR abs/1705.06691 (2017) - [i21]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System. CoRR abs/1705.06715 (2017) - 2016
- [j7]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. Int. J. Cyber Situational Aware. 1(1): 231-255 (2016) - [c9]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode analysis for android malware classification and categorization. Cyber Security And Protection Of Digital Services 2016: 1-7 - [i20]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
Android Malware Detection: an Eigenspace Analysis Approach. CoRR abs/1607.08087 (2016) - [i19]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Event-Driven Implicit Authentication for Mobile Access Control. CoRR abs/1607.08101 (2016) - [i18]Suleiman Y. Yerima, Gerard P. Parr, Sally I. McClean, Philip J. Morrow, Krishna M. Sivalingam:
Design and Implementation of a Measurement-Based Policy-Driven Resource Management Framework For Converged Networks. CoRR abs/1607.08123 (2016) - [i17]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode Analysis for Android Malware Classification and Categorization. CoRR abs/1607.08149 (2016) - [i16]Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DynaLog: An automated dynamic analysis framework for characterizing Android applications. CoRR abs/1607.08166 (2016) - [i15]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
Android Malware Detection Using Parallel Machine Learning Classifiers. CoRR abs/1607.08186 (2016) - [i14]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
High Accuracy Android Malware Detection Using Ensemble Learning. CoRR abs/1608.00835 (2016) - [i13]Suleiman Y. Yerima, Gerard P. Parr, Cathryn Peoples, Sally I. McClean, Philip J. Morrow:
A Framework for Context-Driven End-to-End QoS Control in Converged Networks. CoRR abs/1608.00839 (2016) - [i12]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams, Igor Muttik:
A New Android Malware Detection Approach Using Bayesian Classification. CoRR abs/1608.00848 (2016) - [i11]Suleiman Y. Yerima, Khalid Al-Begain:
An Enhanced Buffer Management Scheme for Multimedia Traffic in HSDPA. CoRR abs/1608.00855 (2016) - [i10]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in Malware Categorization. CoRR abs/1608.00866 (2016) - [i9]Suleiman Y. Yerima, Khalid Al-Begain:
Analysis of M2/M2/1/R, N Queuing Model for Multimedia over 3.5G Wireless Network Downlink. CoRR abs/1608.01021 (2016) - [i8]Suleiman Y. Yerima, Khalid Al-Begain:
End-to-End QoS Improvement of HSDPA End-User Multi-flow Traffic Using RAN Buffer Management. CoRR abs/1608.01023 (2016) - [i7]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams:
Analysis of Bayesian Classification based Approaches for Android Malware Detection. CoRR abs/1608.05812 (2016) - [i6]Suleiman Y. Yerima, Khalid Al-Begain:
Dynamic Buffer Management for Multimedia QoS in Beyond 3G Wireless Networks. CoRR abs/1610.05184 (2016) - [i5]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Fuzzy Logic-based Implicit Authentication for Mobile Access Control. CoRR abs/1611.03343 (2016) - [i4]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. CoRR abs/1612.01445 (2016) - 2015
- [j6]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
High accuracy android malware detection using ensemble learning. IET Inf. Secur. 9(6): 313-320 (2015) - [c8]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Event-Driven Implicit Authentication for Mobile Access Control. NGMAST 2015: 248-255 - [c7]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in malware categorization. RACS 2015: 291-295 - [i3]Pushpinder-Kaur Chouhan, Feng Yao, Suleiman Y. Yerima, Sakir Sezer:
Software as a Service: Analyzing Security Issues. CoRR abs/1505.01711 (2015) - 2014
- [j5]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams:
Analysis of Bayesian classification-based approaches for Android malware detection. IET Inf. Secur. 8(1): 25-36 (2014) - [c6]Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
Android Malware Detection Using Parallel Machine Learning Classifiers. NGMAST 2014: 37-42 - 2013
- [c5]Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams, Igor Muttik:
A New Android Malware Detection Approach Using Bayesian Classification. AINA 2013: 121-128 - [i2]Suleiman Y. Yerima:
Implementation and Evaluation of Measurement-Based Admission Control Schemes Within a Converged Networks QoS Management Framework. CoRR abs/1311.1435 (2013) - [i1]Suleiman Y. Yerima, Gerard P. Parr, Sally I. McClean, Philip J. Morrow:
Adaptive Measurement-Based Policy-Driven QoS Management with Fuzzy-Rule-based Resource Allocation. CoRR abs/1311.1436 (2013) - 2012
- [j4]Suleiman Y. Yerima, Gerard P. Parr, Sally I. McClean, Philip J. Morrow:
Adaptive Measurement-Based Policy-Driven QoS Management with Fuzzy-Rule-based Resource Allocation. Future Internet 4(3): 646-671 (2012) - 2011
- [j3]Suleiman Y. Yerima, Khalid Al-Begain:
Novel Radio Link Buffer Management Schemes for End-User Multi-class Traffic in High Speed Packet Access Networks. Wirel. Pers. Commun. 61(2): 349-382 (2011) - [c4]Suleiman Y. Yerima, Gerard P. Parr, Sally I. McClean, Philip J. Morrow:
Modelling and evaluation of a policy-based resource management framework for converged next generation networks. Integrated Network Management 2011: 563-570 - 2010
- [c3]Suleiman Y. Yerima, Gerard P. Parr, Cathryn Peoples, Sally I. McClean, Philip J. Morrow:
A framework for context-driven end-to-end QoS control in Converged Networks. CNSM 2010: 250-253
2000 – 2009
- 2009
- [j2]Khalid Al-Begain, Alexander N. Dudin, Arseniy Kazimirsky, Suleiman Y. Yerima:
Investigation of the M2/G2/1/∞,N queue with restricted admission of priority customers and its application to HSDPA mobile systems. Comput. Networks 53(8): 1186-1201 (2009) - 2008
- [j1]Aymen I. Zreikat, Suleiman Y. Yerima, Khalid Al-Begain:
Performance Evaluation and Resource Management of Hierarchical MACRO-/MICRO Cellular Networks using MOSEL-2. Wirel. Pers. Commun. 44(2): 153-179 (2008) - [c2]Suleiman Y. Yerima, Khalid Al-Begain:
End-to-End QoS Improvement of HSDPA End-User Multi-Flow Traffic Using RAN Buffer Management. NTMS 2008: 1-5 - 2007
- [c1]Suleiman Y. Yerima, Khalid Al-Begain:
Buffer Management for Multimedia QoS Control over HSDPA Downlink. AINA Workshops (1) 2007: 912-917
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint