Mourad Leslous
Mourad Leslous
Verified email at edf.fr
Title
Cited by
Cited by
Year
Kharon dataset: Android malware under a microscope
N Kiss, JF Lalande, M Leslous, VVT Tong
The {LASER} Workshop: learning from authoritative security experiment …, 2016
352016
Gpfinder: tracking the invisible in android malware
M Leslous, VVT Tong, JF Lalande, T Genet
2017 12th International Conference on Malicious and Unwanted Software …, 2017
122017
Inferring a distributed application behavior model for anomaly based intrusion detection
E Totel, M Hkimi, M Hurfin, M Leslous, Y Labiche
2016 12th European Dependable Computing Conference (EDCC), 53-64, 2016
82016
Challenges for reliable and large scale evaluation of android malware analysis
JF Lalande, VVT Tong, M Leslous, P Graux
2018 International Conference on High Performance Computing & Simulation …, 2018
72018
Information Flows at OS Level Unmask Sophisticated Android Malware.
VVT Tong, A Trulla, M Leslous, JF Lalande
SECRYPT, 578-585, 2017
42017
Challenges in Android Malware Analysis
VVT Tong, JF Lalande, M Leslous
ERCIM News, 42-43, 2016
22016
Highlight and execute suspicious paths in Android malware
M Leslous
Rennes 1, 2018
12018
Using Implicit Calls to Improve Malware Dynamic Execution
M Leslous, JF Lalande, VVT Tong
37th IEEE Symposium on Security and Privacy, 2016
12016
Anomaly Based Intrusion Detection in Distributed Applications without global clock
E Totel, M Hkimi, M Hurfin, M Leslous, Y Labiche
SEC2 2016-Deuxième atelier sur la Sécurité dans les Clouds, 2016
2016
Poster: Using Implicit Calls to Improve Malware Dynamic Execution
M Leslous, VVT Tong, JF Lalande
The system can't perform the operation now. Try again later.
Articles 1–10