Author of the publication

Security Toolbox for Detecting Novel and Sophisticated Android Malware.

, , , , and . ICSE (2), page 733-736. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Space and time efficient parallel algorithms and software for EST clustering., , , and . IEEE Trans. Parallel Distributed Syst., 14 (12): 1209-1221 (2003)A Condition Known to be Sufficient for Rearrangeability of the Benes Class of Interconnection Networks with 2x2 Switches Is Also Necessary., and . ICPP, page 76-78. IEEE Computer Society, (1983)Testing arbitrary subhypergraphs for the lossless join property., , , and . Inf. Sci., 51 (1): 95-110 (1990)Neural Networks for Pattern Recognition., and . Advances in Computers, (1993)Completeness Issues for Join Dependencies Derived from the Universal Relation Join Dependency., , , and . Inf. Process. Lett., 28 (5): 269-274 (1988)CMP: A Memory-Constrained Scalability Metric., and . PPSC, page 848-849. SIAM, (1995)DynaDoc: Automated On-demand Context-Specific Documentation., , , , , and . DySDoc@ICSME, page 5-6. IEEE, (2018)DISCOVER: detecting algorithmic complexity vulnerabilities., , , and . ESEC/SIGSOFT FSE, page 1129-1133. ACM, (2019)Let's verify Linux: accelerated learning of analytical reasoning through automation and collaboration., , , and . ICSE (Companion Volume), page 394-403. ACM, (2016)Rethinking verification: accuracy, efficiency and scalability through human-machine collaboration., , and . ICSE (Companion Volume), page 885-886. ACM, (2016)