Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones

J. Alzahran Abdullah , Nataliav Stakhanoa , Hugo Gonzalezand Ali , A. Ghorbani
Journal of Cyber Security and Mobility 3 ( 2) 89 -132

3
2014
Types of Hosts on a Remote File Inclusion (RFI) Botnet

Hugo F. González Robledo
electronics robotics and automotive mechanics conference 105 -109

11
2008
2
2007
Code Authorship Attribution: Methods and Challenges

Vaibhavi Kalgutkar , Ratinder Kaur , Hugo Gonzalez , Natalia Stakhanova
ACM Computing Surveys 52 ( 1) 3

70
2019
A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps

Ratinder Kaur , Yan Li , Junaid Iqbal , Hugo Gonzalez
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) 02 492 -497

20
2018
DroidKin: Lightweight Detection of Android Apps Similarity

Hugo Gonzalez , Natalia Stakhanova , Ali A. Ghorbani
security and privacy in communication networks 436 -453

76
2014
Measuring code reuse in Android apps

Hugo Gonzalez , Natalia Stakhanova , Ali A. Ghorbani
conference on privacy security and trust 187 -195

3
2016
Towards a Network-Based Framework for Android Malware Detection and Characterization

Arash Habibi Lashkari , Andi Fitriah A.Kadir , Hugo Gonzalez , Kenneth Fon Mbah
conference on privacy security and trust 233 -234

105
2017
Unmasking Android Obfuscation Tools Using Spatial Analysis

Ratinder Kaur , Ye Ning , Hugo Gonzalez , Natalia Stakhanova
conference on privacy security and trust 1 -10

8
2018
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters

Marc Antoine Gosselin-Lavigne , Hugo Gonzalez , Natalia Stakhanova , Ali A. Ghorbani
availability, reliability and security 516 -521

3
2015
Phishing by form: The abuse of form sites

Hugo Gonzalez , Kara Nance , Jose Nazario
international conference on malicious and unwanted software 95 -101

2
2011
Enriching reverse engineering through visual exploration of Android binaries

Ashutosh Jain , Hugo Gonzalez , Natalia Stakhanova
Proceedings of the 5th Program Protection and Reverse Engineering Workshop 9

11
2015
When Software Engineering meets Cybersecurity at the classroom

Hugo Gonzalez , Rafael Llamas-Contreras , Omar Montano-Rivas
international conference on software engineering

2019
MOSCAF – Specifying Data Quality Requirements according Web Functionalities

Cesar Guerra-Garcia , Hector G. Perez-Gonzalez , Marco Ramirez-Torres , Reyes Juarez-Ramirez
international conference on software engineering

2020
Exploring reverse engineering symptoms in Android apps

Hugo Gonzalez , Andi A Kadir , Natalia Stakhanova , Abdullah J Alzahrani
european workshop on system security 7

20
2015
Authorship Attribution of Android Apps

Hugo Gonzalez , Natalia Stakhanova , Ali A. Ghorbani
conference on data and application security and privacy 277 -286

7
2018
Cybersecurity Teaching through Gamification: Aligning Training Resources to our Syllabus

Hugo Gonzalez , Rafael Llamas , Francisco Ordaz
Research on computing science 146 ( 1) 35 -43

19
2017
Using a CTF Tournament for Reinforcing Learned Skills in Cybersecurity Course

Hugo Gonzalez , Rafael Llamas , Omar Montaño
Research on computing science 148 ( 5) 133 -141

1
2019
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling

Hossein Hadian Jazi , Hugo Gonzalez , Natalia Stakhanova , Ali A. Ghorbani
Computer Networks 121 25 -36

152
2017
The impact of application-layer denial-of-service attacks

Hugo Gonzalez , Marc Antoine Gosselin-Lavigne , Natalia Stakhanova , Ali A Ghorbani
Case Studies in Secure Computing: Achievements and Trends 261

19
2014