Author of the publication

Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware.

, , , , and . ARES, page 333-340. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical study on the evolution of design patterns., , , , and . ESEC/SIGSOFT FSE, page 385-394. ACM, (2007)A Design Rationale Based Environment for Cooperative Maintenance., , and . International Journal of Software Engineering and Knowledge Engineering, 10 (5): 627-645 (2000)An approach for restructuring text content., , , and . ICSE, page 1225-1228. IEEE Computer Society, (2013)Open Challenges in Ubiquitous and Net-Centric Computing Middleware., , , and . STEP, page 182-192. IEEE Computer Society, (2005)How Crosscutting Concerns Evolve in JHotDraw., and . STEP, page 65-73. IEEE Computer Society, (2005)A Bayesian Approach for on-Line Max Auditing., and . ARES, page 1020-1027. IEEE Computer Society, (2008)Transforming quantities into qualities in assessment of software systems., , and . COMPSAC, page 312-319. IEEE Computer Society, (2003)ContentP2P: A Peer-to-Peer Content Management System., , , and . COMPSAC, page 773-778. IEEE Computer Society, (2002)Towards reengineering in reuse reengineering processes., , and . ICSM, page 147-156. IEEE Computer Society, (1995)Welcome from the Early Research Achievements Chairs., and . CSMR, page 331. IEEE Computer Society, (2012)