Browsing NTNU Open by Author "Shalaginov, Andrii"
Now showing items 21-31 of 31
-
Memory access patterns for malware detection
Banin, Sergii; Shalaginov, Andrii; Franke, Katrin (Journal article; Peer reviewed, 2016)Malware brings significant threats to modern digitized society. Malware developers put in significant efforts to evade detection and remain unnoticed on victims' computers despite a number of malware detection techniques. ... -
A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey
Bouzidi, Mohammed; Gupta, Nishu; Alaya Cheikh, Faouzi; Shalaginov, Andrii; Derawi, Mohammad (Peer reviewed; Journal article, 2022)For the past few years, the Internet of Things (IoT) technology continues to not only gain popularity and importance, but also witnesses the true realization of everything being smart. With the advent of the concept of ... -
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting
Kumar, Ajit; Agarwal, Vinti; Kumar Shandilya, Shishir; Shalaginov, Andrii; Upadhyay, Saket; Yadav, Bhawna (Peer reviewed; Journal article, 2020)Android malware has become the topmost threat for the ubiquitous and useful Android ecosystem. Multiple solutions leveraging big data and machine-learning capabilities to detect Android malware are being constantly developed. ... -
Predicting likelihood of legitimate data loss in email DLP
Faiz, Mohamed Falah; Junaid, Arshad; Alazab, Mamoun; Shalaginov, Andrii (Journal article; Peer reviewed, 2019)The point of departure is the Swedish rebellion against the regime of King John (Hans) in 1501. Sten Sture the Elder was the rebellion’s most prominent leader. The article moves from a discussion of Sten’s character and ... -
Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security
Wangen, Gaute; Shalaginov, Andrii (Chapter, 2016)Achieving the quantitative risk assessment has long been an elusive problem in information security, where the subjective and qualitative assessments dominate. This paper discusses the appropriateness of statistical and ... -
RESPOnSE—A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments
Michailidou, Christina; Gkioulos, Vasileios; Shalaginov, Andrii; Rizos, Athanasios; Saracino, Andrea (Peer reviewed; Journal article, 2020)The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices ... -
Similarity-based Intelligent Malware Type Detection through Multiple Sources of Dynamic Characteristics
Denzer, Thilo (Master thesis, 2019)Malware analysts face challenges related to increasing number of malware variants emerging every year. Conventional classification of Windows PE32 executables into benign and malicious is no longer sufficient and needs ... -
Smart Policing for a Smart World Opportunities, Challenges and Way Forward
Yamin, Muhammad Mudassar; Shalaginov, Andrii; Katt, Basel (Peer reviewed; Journal article, 2020)Our world is getting evolved to smart world day by day. This smart world is being developed to make people life easier through the data generated by the smart devices. Data is the fuel that powers the smart world evolution, ... -
Study of Blacklisted Malicious Domains from a Microsoft Windows End-user Perspective: Is It Safe Behind the Wall?
Jensen, Øyvind; Shalaginov, Andrii; Dyrkolbotn, Geir Olav (Peer reviewed; Journal article, 2020)The Internet is a dangerous place, _lled with di_erent cyber threats, including malware. To withstand this, blacklists have been utilized for a long time to block known infection and delivery sources. However, through ... -
The Cyber Threat Landscape on Blacklisted Malicious Domains
Jensen, Øyvind (Master thesis, 2019)Internett er en farlig plass, fylt med forskjellige typer skadevare. Derfor har svartelister blitt benyttet i lengre tid for å blokkere kjente infeksjons- og leveringskilder. Ved å blokkere domener trenger vi ikke å bekymre ... -
The study of keyword search in open source search engines and digital forensics tools with respect to the needs of cyber crime investigations
Hansen, Joachim (Master thesis, 2017)This master thesis consists of both a theoretical and practical part. In the theoretical part of the thesis are three main parts of study: 1) Exploration of experimental search methodologies used in a Digital forensics ...