no code implementations • 4 Apr 2022 • Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan
In this way, a criterion is introduced that is used together with accuracy and FPR criteria for malware analysis in IoT environment.
no code implementations • 13 Aug 2019 • Rahim Taheri, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Mauro Conti
We test our experiments in a different type of features: API, intent, and permission features on these three datasets.