Author of the publication

Automatic recognition of design motifs using semantic conditions.

, , and . SAC, page 1062-1067. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Collaboration Among Cyber Security Analysts Through Visualizing Their Analytical Reasoning Processes., , , , and . ICME Workshops, page 1-6. IEEE Computer Society, (2018)Using Ontology Reasoning for Reverse Engineering Design Patterns., and . MoDELS (Workshops), volume 6002 of Lecture Notes in Computer Science, page 344-358. Springer, (2009)Tag-based personalized recommendation in social media services, , , , and . Multimedia Tools and Applications, 75 (21): 13299--13315 (2016)Blind Attack Flaws in Adaptive Honeypot Strategies., , and . AIIoT, page 491-496. IEEE, (2021)Reusing Software Libraries Using Semantic Graphs., , , , and . IRI, page 531-540. IEEE Computer Society, (2016)Towards a Model-driven Approach for Reverse Engineering Design Patterns., and . TWOMDE@MoDELS, volume 531 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Effective API navigation and reuse., , and . IRI, page 7-12. IEEE Systems, Man, and Cybernetics Society, (2010)JMentor: An Ontology-Based Framework for Software Understanding and Reuse., , , and . AICCSA, page 1-8. IEEE Computer Society, (2019)Fostering Active Learning in Introductory Programming Courses by Utilizing Multiple Programming Tools and Enrichment Activities., , and . ICETC, page 379-385. ACM, (2022)A security framework for QaaS model in intelligent transportation systems., , , , , and . Microprocess. Microsystems, (April 2022)