Author of the publication

Detecting clones in Android applications through analyzing user interfaces.

, , , and . ICPC, page 163-173. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting common web application vulnerabilities from input validation and sanitization code patterns., and . ASE, page 310-313. ACM, (2012)Automated Insertion of Exception Handling for Key and Referential Constraints., , and . J. Database Manag., 24 (1): 1-19 (2013)On Formalization of the Whole-Part Relationship in the Unified Modeling Language., , and . IEEE Trans. Software Eng., 29 (11): 1054-1055 (2003)Systematic Transformation of Functional Analysis Model into OO Design and Implementation., , and . IEEE Trans. Software Eng., 32 (2): 111-135 (2006)Mining key and referential constraints enforcement patterns., , and . SAC, page 850-854. ACM, (2014)Supporting the adaptation of open-source database applications through extracting data lifecycles., , and . IET Softw., 7 (4): 213-221 (2013)Defending against Buffer-Overflow Vulnerabilities., and . Computer, 44 (11): 53-60 (2011)Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications., and . Software Engineering Research and Practice, page 522-528. CSREA Press, (2010)Checking enforcement of integrity constraints in database applications based on code patterns., , , , , , and . J. Syst. Softw., 84 (12): 2253-2264 (2011)Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities., , , and . APSEC (1), page 363-370. IEEE Computer Society, (2013)978-1-4799-2143-0.