2024
Towards Type Agnostic Cyber Defense Agents.
CoRR, 2024
Behavioral Malware Detection using a Language Model Classifier Trained on sys2vec Embeddings.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
IoT Malware Data Augmentation using a Generative Adversarial Network.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
The Price of Pessimism for Automated Defense.
Proceedings of the Decision and Game Theory for Security - 15th International Conference, 2024
2023
Chaos to Clarity with Semantic Inferencing for Python Source Code Snippets.
Proceedings of the 17th IEEE International Conference on Semantic Computing, 2023
2022
Simulation of Attacker Defender Interaction in a Noisy Security Game.
CoRR, 2022
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
Linguistic Approach to Segmenting Source Code.
Proceedings of the 16th IEEE International Conference on Semantic Computing, 2022
Fast, lightweight IoT anomaly detection using feature pruning and PCA.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
2021
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem.
Proceedings of the Ubiquitous Security - First International Conference, 2021
Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
2020
Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations.
Proceedings of the IEEE 14th International Conference on Semantic Computing, 2020
2018
Malware Anomaly Detection on Virtual Assistants.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Behavioral Malware Classification using Convolutional Recurrent Neural Networks.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
2017
Behavioral anomaly detection of malware on home routers.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Lightweight behavioral malware detection for windows platforms.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Source Code Authorship Attribution Using Long Short-Term Memory Based Networks.
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
On the effectiveness of application characteristics in the automatic classification of malware on smartphones.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
2015
System Call-Based Detection of Malicious Processes.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
Run-time classification of malicious processes using system call analysis.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015
2013
Multi-channel Change-Point Malware Detection.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Toward an Automatic, Online Behavioral Malware Classification System.
Proceedings of the 7th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2013
2011
Diagnosis of software failures using computational geometry.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011
On the maintenance of UI-integrated mashup applications.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011
Inoculation against malware infection using kernel-level software sensors.
Proceedings of the 8th International Conference on Autonomic Computing, 2011
2010
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software.
Proceedings of the 17th Working Conference on Reverse Engineering, 2010
On the use of computational geometry to detect software faults at runtime.
Proceedings of the 7th International Conference on Autonomic Computing, 2010
2009
thr2csp: Toward Transforming Threads into Communicating Sequential Processes.
Proceedings of the Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, 2009
Static Security Analysis Based on Input-Related Software Faults.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009
2008
On the evaluation of the Bunch search-based software modularization algorithm.
Soft Comput., 2008
A Case Study on the Automatic Composition of Network Application Mashups.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008
Re-Engineering a Reverse Engineering Portal to a Distributed SOA.
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008
On evaluating the efficiency of software feature development using algebraic manifolds.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008
Task Dependency of User Perceived Utility in Autonomic VoIP Systems.
Proceedings of the Fourth International Conference on Autonomic and Autonomous Systems, 2008
2007
Guest Editors' Introduction to the Special Section from the International Conference on Software Maintenance and Evolution.
IEEE Trans. Software Eng., 2007
A Reverse Engineering Tool for Extracting Protocols of Networked Applications.
Proceedings of the 14th Working Conference on Reverse Engineering (WCRE 2007), 2007
International Workshop on Code Based Software Security Assessments - CoBaSSA 2007.
Proceedings of the 14th Working Conference on Reverse Engineering (WCRE 2007), 2007
Reducing Program Comprehension Effort in Evolving Software by Recognizing Feature Implementation Convergence.
Proceedings of the 15th International Conference on Program Comprehension (ICPC 2007), 2007
A Probabilistic Approach to Source Code Authorship Identification.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Using code metric histograms and genetic algorithms to perform author identification for software forensics.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
A genetic algorithm for solving the binning problem in networked applications detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
2006
On the Automatic Modularization of Software Systems Using the Bunch Tool.
IEEE Trans. Software Eng., 2006
Code Based Software Security Assessments.
Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), 2006
On Computing the Canonical Features of Software Systems.
Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), 2006
Studying the Evolution of Software Systems Using Change Clusters.
Proceedings of the 14th International Conference on Program Comprehension (ICPC 2006), 2006
Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems.
Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR 2006), 2006
Towards a reference model for agent-based systems.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006
2005
Spectral and meta-heuristic algorithms for software clustering.
J. Syst. Softw., 2005
Workshop on Code Based Software Security Assessments (CoBaSSA 2005).
Proceedings of the 12th Working Conference on Reverse Engineering, 2005
Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla.
Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM 2005), 2005
Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences.
Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM 2005), 2005
GA-based parameter tuning for multi-agent systems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
2004
A Hierarchy of Dynamic Software Views: From Object-Interactions to Feature-Interactions.
Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004), 2004
Using Interconnection Style Rules to Infer Software Architecture Relations.
Proceedings of the Genetic and Evolutionary Computation, 2004
2003
Formulating software engineering as a search problem.
,
,
,
,
,
,
,
,
,
,
IEE Proc. Softw., 2003
Toward an environment for comprehending distributed systems.
Proceedings of the 10th Working Conference on Reverse Engineering, 2003
Using Program Transformation to Secure C Programs Against Buffer Overflows.
Proceedings of the 10th Working Conference on Reverse Engineering, 2003
Characterizing the 'Security Vulnerability Likelihood' of Software Functions.
Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003), 2003
Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms.
Proceedings of the Genetic and Evolutionary Computation, 2003
Demonstration of COSAK static analysis tools.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
On the Automatic Recovery of Style-Specific Architectural Relations in Software Systems.
Autom. Softw. Eng., 2002
Applying Spectral Methods to Software Clustering.
Proceedings of the 9th Working Conference on Reverse Engineering (WCRE 2002), 28 October, 2002
Search based reverse engineering.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002
Using Heuristic Search Techniques To Extract Design Abstractions From Source Code.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002
2001
Visualizing and Analyzing Software Infrastructures.
IEEE Softw., 2001
An Architecture for Distributing the Computation of Software Clustering Algorithms.
Proceedings of the 2001 Working IEEE / IFIP Conference on Software Architecture (WICSA 2001), 2001
CRAFT: A Framework for Evaluating Software Clustering Results in the Absence of Benchmark Decompositions.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001
REportal: A Web-Based Portal Site for Reverse Engineering.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001
Gadget: A Tool for Extracting the Dynamic Structure of Java Programs.
Proceedings of the Thirteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2001), 2001
Form: A Framework for Creating Views of Program Executions.
Proceedings of the 2001 International Conference on Software Maintenance, 2001
Comparing the Decompositions Produced by Software Clustering Algorithms Using Similarity Measurements.
Proceedings of the 2001 International Conference on Software Maintenance, 2001
2000
Toward a design environment for recovering and maintaining the structure of software systems.
ACM SIGSOFT Softw. Eng. Notes, 2000
1999
A Tool for Securely Integrating Legacy Systems into a Distributed Environment.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999
Bunch: A Clustering Tool for the Recovery and Maintenance of Software System Structures.
Proceedings of the 1999 International Conference on Software Maintenance, 1999
1998
ISF: A Visual Formalism for Specifying Interconnection Styles for Software Design.
Int. J. Softw. Eng. Knowl. Eng., 1998
Using Automatic Clustering to Produce High-Level System Organizations of Source Code.
Proceedings of the 6th International Workshop on Program Comprehension (IWPC '98), 1998
1997
Repairing software style using graph grammars.
Proceedings of the 1997 conference of the Centre for Advanced Studies on Collaborative Research, 1997
1996
Controlling the interactions of architectural design components using scoping rules.
PhD thesis, 1996
Toward a generic framework for computing subsystem interfaces.
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996
Recovering the Structure of Software Systems Using Tube Graph Interconnection Clustering.
Proceedings of the 1996 International Conference on Software Maintenance (ICSM '96), 1996
1994
Prototyping a Visual Formalism for System Modelling.
Proceedings of the Software Engineering and Human-Computer Interaction, 1994
Loosely integrating tools using the star system.
Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31, 1994
A Program Understanding Environment Based on the "Star" Approach to Tool Integration.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994
1993
A "curriculum-cycle" environment for teaching programming.
Proceedings of the 24th SIGCSE Technical Symposium on Computer Science Education, 1993
A multi-dimensional taxonomy of software development environments.
Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, 1993
A Conceptual Framework for Software Development.
Proceedings of the ACM 21th Conference on Computer Science, 1993
1992
Multicolour programming and metamorphic programming: object oriented programming-in-the-large.
Proceedings of the 1992 Conference of the Centre for Advanced Studies on Collaborative Research, 1992