Author of the publication

A scalable approach for malware detection through bounded feature space behavior modeling.

, , , , and . ASE, page 312-322. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting common web application vulnerabilities from input validation and sanitization code patterns., and . ASE, page 310-313. ACM, (2012)On Formalization of the Whole-Part Relationship in the Unified Modeling Language., , and . IEEE Trans. Software Eng., 29 (11): 1054-1055 (2003)Systematic Transformation of Functional Analysis Model into OO Design and Implementation., , and . IEEE Trans. Software Eng., 32 (2): 111-135 (2006)Mining key and referential constraints enforcement patterns., , and . SAC, page 850-854. ACM, (2014)Defending against Buffer-Overflow Vulnerabilities., and . Computer, 44 (11): 53-60 (2011)Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications., and . Software Engineering Research and Practice, page 522-528. CSREA Press, (2010)Automated Insertion of Exception Handling for Key and Referential Constraints., , and . J. Database Manag., 24 (1): 1-19 (2013)Supporting the adaptation of open-source database applications through extracting data lifecycles., , and . IET Softw., 7 (4): 213-221 (2013)Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities., , , and . APSEC (1), page 363-370. IEEE Computer Society, (2013)978-1-4799-2143-0.Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications., and . APSEC (1), page 223-230. IEEE Computer Society, (2013)978-1-4799-2143-0.