Author of the publication

A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques.

, , , , , and . Empir. Softw. Eng., 19 (4): 1040-1074 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interpolated n-grams for model based testing., , and . ICSE, page 562-572. ACM, (2014)eCAT: a tool for automating test cases generation and execution in testing multi-agent systems., , and . AAMAS (Demos), page 1669-1670. IFAAMAS, (2008)Supporting Ontology-Based Semantic Annotation of Business Processes with Automated Suggestions., and . Int. J. Inf. Syst. Model. Des., 1 (2): 59-84 (2010)Automated inference of classifications and dependencies for combinatorial testing., and . ASE, page 622-627. IEEE, (2013)Using search-based algorithms for Ajax event sequence generation during testing., and . Empir. Softw. Eng., 16 (1): 103-140 (2011)N-Gram Based Test Sequence Generation from Finite State Models., , and . FITTEST@ICTSS, volume 8432 of Lecture Notes in Computer Science, page 59-74. Springer, (2013)Search Based Path and Input Data Generation for Web Application Testing., , and . SSBSE, volume 10452 of Lecture Notes in Computer Science, page 18-32. Springer, (2017)E2E Web Test Dependency Detection using NLP., , , , and . CoRR, (2019)Visual vs. DOM-Based Web Locators: An Empirical Study., , , and . ICWE, volume 8541 of Lecture Notes in Computer Science, page 322-340. Springer, (2014)A framework for the collaborative specification of semantically annotated business processes., , , , and . Journal of Software Maintenance, 23 (4): 261-295 (2011)