Author of the publication

Process Mining Meets Malware Evolution: A Study of the Behavior of Malicious Code.

, , and . CANDAR, page 616-622. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Analytics to Support Students in Object-Oriented Programming Tasks: An Empirical Study., , and . IEEE Access, (2020)Early Detection of Parkinson Disease using Deep Neural Networks on Gait Dynamics., , , and . IJCNN, page 1-8. IEEE, (2020)Evaluating coding behavior in software development processes: a process mining approach., , , and . ICSSP, page 84-93. IEEE / ACM, (2019)A Multi-source Machine Learning Approach to Predict Defect Prone Components., , and . ICSOFT, page 306-313. SciTePress, (2018)Do activity lifecycles affect the validity of a business rule in a business process?, , , and . Inf. Syst., (2016)Discovering cross-organizational business rules from the cloud., , and . CIDM, page 389-396. IEEE, (2014)Forecasting technical debt evolution in software systems: an empirical study., , , , and . Frontiers Comput. Sci., 17 (3): 173210 (2023)Improving Design Patterns Finder Precision Using a Model Checking Approach., , , , and . CAiSE Forum, volume 1367 of CEUR Workshop Proceedings, page 113-120. CEUR-WS.org, (2015)Model-driven detection of Design Patterns., and . ICSM, page 1-5. IEEE Computer Society, (2010)Technical Debt predictive model through Temporal Convolutional Network., , , and . IJCNN, page 1-8. IEEE, (2021)