Author of the publication

HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security.

, and . QRS, page 168-175. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting bug report fields using stack traces and categorical attributes., , , and . CASCON, page 224-233. ACM, (2019)Towards a formal framework for evaluating the effectiveness of system diversity when applied to security., , and . CISDA, page 1-7. IEEE, (2012)An improved Hidden Markov Model for anomaly detection using frequent common patterns., , and . ICC, page 1113-1117. IEEE, (2012)Execution Traces: A New Domain That Requires the Creation of a Standard Metamodel., and . FGIT-ASEA, volume 59 of Communications in Computer and Information Science, page 253-263. Springer, (2009)DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports., , and . QRS, page 240-250. IEEE, (2017)An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques., , and . QRS, page 109-118. IEEE, (2015)Automatic prediction of the severity of bugs using stack traces and categorical features., , and . Inf. Softw. Technol., (2020)The Effects of Education on Students' Perception of Modeling in Software Engineering., , , , , and . HuFaMo@MoDELS, volume 1522 of CEUR Workshop Proceedings, page 39-46. CEUR-WS.org, (2015)Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle., , and . ICSME, page 478-482. IEEE Computer Society, (2016)Towards Quality-Driven SOA Systems Refactoring Through Planning., , , , and . MCETECH, volume 209 of Lecture Notes in Business Information Processing, page 269-284. Springer, (2015)