Author of the publication

On the Use of API Calls for Detecting Repackaged Malware Apps: Challenges and Ideas.

, , and . ISSRE Workshops, page 116-117. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effects of Education on Students' Perception of Modeling in Software Engineering., , , , , and . HuFaMo@MoDELS, volume 1522 of CEUR Workshop Proceedings, page 39-46. CEUR-WS.org, (2015)An improved Hidden Markov Model for anomaly detection using frequent common patterns., , and . ICC, page 1113-1117. IEEE, (2012)Towards Quality-Driven SOA Systems Refactoring Through Planning., , , , and . MCETECH, volume 209 of Lecture Notes in Business Information Processing, page 269-284. Springer, (2015)Software Clustering Using Dynamic Analysis and Static Dependencies., , and . CSMR, page 27-36. IEEE Computer Society, (2009)Predicting bug report fields using stack traces and categorical attributes., , , and . CASCON, page 224-233. ACM, (2019)DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports., , and . QRS, page 240-250. IEEE, (2017)An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques., , and . QRS, page 109-118. IEEE, (2015)Towards a formal framework for evaluating the effectiveness of system diversity when applied to security., , and . CISDA, page 1-7. IEEE, (2012)Execution Traces: A New Domain That Requires the Creation of a Standard Metamodel., and . FGIT-ASEA, volume 59 of Communications in Computer and Information Science, page 253-263. Springer, (2009)Automatic prediction of the severity of bugs using stack traces and categorical features., , and . Inf. Softw. Technol., (2020)