Author of the publication

Can a Machine Replace Humans in Building Regular Expressions? A Case Study.

, , , and . IEEE Intell. Syst., 31 (6): 15-21 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semisupervised Wrapper Choice and Generation for Print-Oriented Documents., , , and . IEEE Trans. Knowl. Data Eng., 26 (1): 208-220 (2014)A Framework for Large-Scale Detection of Web Site Defacements., , and . ACM Trans. Internet Techn., 10 (3): 10:1-10:37 (2010)Active learning approaches for learning regular expressions with genetic programming., , , and . SAC, page 97-102. ACM, (2016)A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection., , and . SEC, volume 278 of IFIP, page 711-716. Springer, (2008)(In)Secure Configuration Practices of WPA2 Enterprise Supplicants., , , and . ARES, page 37:1-37:6. ACM, (2018)Compressing Regular Expression Sets for Deep Packet Inspection., , , and . PPSN, volume 8672 of Lecture Notes in Computer Science, page 394-403. Springer, (2014)Efficient Verification of a Multicast Protocol for Mobile Computing., , , and . Comput. J., 44 (1): 21-30 (2001)Communication-based cooperative tasks: how the language expressiveness affects reinforcement learning., , and . SAC, page 898-905. ACM, (2019)Road Traffic Rules Synthesis Using Grammatical Evolution., , and . EvoApplications (2), volume 10200 of Lecture Notes in Computer Science, page 173-188. (2017)Fault-tolerant support for reliable multicast in Mobile Wireless Systems: Design and Evaluation., , and . Wireless Networks, 10 (3): 259-269 (2004)