Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEET: Symbolic Execution of ETL Transformations., , and . J. Syst. Softw., (2020)A machine learning approach for detecting and categorizing evasion sources in Android malware., , , and . ISCISC, page 28-34. IEEE, (2021)Automatic Generation of Business Intelligence Chatbot for Organizations., , , and . CSICC, page 1-5. IEEE, (2022)Tool Support for Pattern Selection and Use., , and . SQM@CSMR, volume 233 of Electronic Notes in Theoretical Computer Science, page 127-142. Elsevier, (2008)Automatic Pattern Proposition in Transformation Life Cycle., and . IJITSA, 10 (2): 1-16 (2017)Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System., , and . CoRR, (2022)A model-driven framework for developing multi-agent systems in emergency response environments., , , and . Softw. Syst. Model., 18 (3): 1985-2012 (2019)A Formalism for Specifying Model Merging Conflicts., , and . SAM, page 1-10. ACM, (2020)Maaker: A framework for detecting and defeating evasion techniques in Android malware., , and . J. Inf. Secur. Appl., (November 2023)Towards Personalized Change Propagation for Collaborative Modeling., , and . MoDELS (Companion), page 3-7. IEEE, (2021)