Arun Lakhotia
Orcid: 0000-0001-9943-7795Affiliations:
- University of Louisiana at Lafayette, USA
According to our database1,
Arun Lakhotia
authored at least 77 papers
between 1983 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
2018
Proceedings of the International Conference On Cyber Situational Awareness, 2018
Proceedings of the International Conference On Cyber Situational Awareness, 2018
2017
Malware Analysis: From Large-Scale Data Triage to Targeted Attack Recognition (Dagstuhl Seminar 17281).
Dagstuhl Reports, 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
2015
Proceedings of the Intelligent Methods for Cyber Warfare, 2015
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015
2014
Proceedings of the 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2014, 2014
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
2013
J. Comput. Virol. Hacking Tech., 2013
J. Comput. Virol. Hacking Tech., 2013
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, 2013
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013
2012
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Proceedings of the Information Systems, Technology and Management, 2012
Proceedings of the Information Systems, Technology and Management, 2012
Proceedings of the Information Systems, Technology and Management, 2012
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012
2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
2010
Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2010
2009
Evaluation of malware phylogeny modelling systems using automated variant generation.
J. Comput. Virol., 2009
2008
A User Interface for Exploiting Web Communities in Searching the Web.
Proceedings of the WEBIST 2008, 2008
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
2007
J. Aerosp. Comput. Inf. Commun., 2007
2006
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006
Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 2006
Proceedings of the Pattern Recognition in Bioinformatics, International Workshop, 2006
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006
2005
IEEE Trans. Software Eng., 2005
Proceedings of the Detection of Intrusions and Malware, 2005
2004
ACM SIGSOFT Softw. Eng. Notes, 2004
Proceedings of the 11th Working Conference on Reverse Engineering, 2004
Proceedings of the 11th Working Conference on Reverse Engineering, 2004
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004
2003
Proceedings of the 10th Working Conference on Reverse Engineering, 2003
Proceedings of the 10th Working Conference on Reverse Engineering, 2003
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003
Static Verification of Worm and virus Behavior in binary Executables using Model Checking.
Proceedings of the IEEE Systems, 2003
2002
ACM SIGPLAN Notices, 2002
2000
Proceedings of the 8th International Workshop on Program Comprehension (IWPC 2000), 2000
1999
Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion.
J. Softw. Maintenance Res. Pract., 1999
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999
1998
J. Softw. Maintenance Res. Pract., 1998
Inf. Softw. Technol., 1998
Proceedings of the 6th International Workshop on Program Comprehension (IWPC '98), 1998
1997
J. Syst. Softw., 1997
1996
Proceedings of the 3rd Working Conference on Reverse Engineering, 1996
1995
Proceedings of the 2nd Working Conference on Reverse Engineering, 1995
1994
Int. J. Softw. Eng. Knowl. Eng., 1994
1993
Proceedings of the Conference Record of the Twentieth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1993
Proceedings of the 15th International Conference on Software Engineering, 1993
1992
Int. J. Softw. Eng. Knowl. Eng., 1992
1990
Program Development by Stepwise 'Enhancement'.
Proceedings of the SEKE'90, 1990
1989
Incorporating 'Programming Techniques' into Prolog Programs.
Proceedings of the Logic Programming, 1989
1988
Composing Prolog Meta-Interpreters.
Proceedings of the Logic Programming, 1988
1985
1983
An improvement over: "an improvement over deeply nested IF-THEN-ELSE control structure".
ACM SIGPLAN Notices, 1983