Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation., , , , and . Simul. Model. Pract. Theory, (2020)Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique., , , and . WETICE, page 249-254. IEEE, (2019)Evaluating model checking for cyber threats code obfuscation identification., , , , , and . J. Parallel Distributed Comput., (2018)A "pay-how-you-drive" car insurance approach through cluster analysis., , , , , , and . Soft Comput., 23 (9): 2863-2875 (2019)Problems and Solutions in Applying Continuous Integration and Delivery to 20 Open-Source Cyber-Physical Systems., , and . MSR, page 646-657. ACM, (2022)Hey Malware, I Can Find You!, , , and . WETICE, page 261-262. IEEE Computer Society, (2016)Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning., , , , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 374-386. Springer, (2018)Detecting Video Game-Specific Bad Smells in Unity Projects., , , , and . MSR, page 198-208. ACM, (2020)Video Game Bad Smells: What They Are and How Developers Perceive Them., , , , and . ACM Trans. Softw. Eng. Methodol., 32 (4): 88:1-88:35 (July 2023)"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification., and . ICISSP, page 663-672. SciTePress, (2017)