Author of the publication

A comprehensive study on software aging across android versions and vendors.

, , , and . Empir. Softw. Eng., 25 (5): 3357-3395 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependability Assessment of the Android OS through Fault Injection., , , and . CoRR, (2019)Privacy Preserving Intrusion Detection Via Homomorphic Encryption., , , , , , and . WETICE, page 321-326. IEEE, (2019)Towards Cognitive Security Defense from Data., , and . DSN (Supplements), page 11-12. IEEE, (2019)Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications., , , and . IEEE Trans. Dependable Secur. Comput., 1 (4): 223-237 (2004)A comprehensive study on software aging across android versions and vendors., , , and . Empir. Softw. Eng., 25 (5): 3357-3395 (2020)Bringing service differentiation to the end system., , , and . ICON, page 436-440. IEEE, (2000)A logging framework for the on-line failure analysis of Android smart phones., , and . ARMOR, page 2:1-2:6. ACM, (2012)Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures., , , , and . ICSOC Workshops, volume 12632 of Lecture Notes in Computer Science, page 162-175. Springer, (2020)Virtualizing Mixed-Criticality Systems: A Survey on Industrial Trends and Issues., , , and . CoRR, (2021)Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study., , , and . CoRR, (2022)