Author of the publication

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques.

, , , , , and . Empir. Softw. Eng., 19 (4): 1040-1074 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Ontology-Based Semantic Annotation of Business Processes with Automated Suggestions., and . Int. J. Inf. Syst. Model. Des., 1 (2): 59-84 (2010)Dynamic model extraction and statistical analysis of Web applications: Follow-up after 6 years., and . WSE, page 3-10. IEEE Computer Society, (2008)Taxonomy of Real Faults in Deep Learning Systems., , , , , and . CoRR, (2019)Points-to analysis for program understanding., , , and . J. Syst. Softw., 44 (3): 213-227 (1999)Designing and Conducting an Empirical Study on Test Management Automation., and . Empirical Software Engineering, 8 (1): 59-81 (2003)Automatic support for the alignment of multilingual Web sites., , , and . Journal of Software Maintenance, 18 (3): 153-179 (2006)Automated inference of classifications and dependencies for combinatorial testing., and . ASE, page 622-627. IEEE, (2013)Using a Concept Lattice of Decomposition Slices for Program Understanding and Impact Analysis.. IEEE Trans. Software Eng., 29 (6): 495-509 (2003)Generating and detecting true ambiguity: a forgotten danger in DNN supervision testing., , and . Empir. Softw. Eng., 28 (6): 146 (November 2023)Using search-based algorithms for Ajax event sequence generation during testing., and . Empir. Softw. Eng., 16 (1): 103-140 (2011)