Spiros Mancoridis

Orcid: 0000-0001-6354-4281

According to our database1, Spiros Mancoridis authored at least 86 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Behavioral Malware Detection using a Language Model Classifier Trained on sys2vec Embeddings.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

IoT Malware Data Augmentation using a Generative Adversarial Network.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

The Price of Pessimism for Automated Defense.
Proceedings of the Decision and Game Theory for Security - 15th International Conference, 2024

2023
Chaos to Clarity with Semantic Inferencing for Python Source Code Snippets.
Proceedings of the 17th IEEE International Conference on Semantic Computing, 2023

2022
Simulation of Attacker Defender Interaction in a Noisy Security Game.
CoRR, 2022

System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

Linguistic Approach to Segmenting Source Code.
Proceedings of the 16th IEEE International Conference on Semantic Computing, 2022

Fast, lightweight IoT anomaly detection using feature pruning and PCA.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

2020
Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations.
Proceedings of the IEEE 14th International Conference on Semantic Computing, 2020

2018
Malware Anomaly Detection on Virtual Assistants.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Behavioral Malware Classification using Convolutional Recurrent Neural Networks.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

2017
Behavioral anomaly detection of malware on home routers.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Lightweight behavioral malware detection for windows platforms.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Source Code Authorship Attribution Using Long Short-Term Memory Based Networks.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
On the effectiveness of application characteristics in the automatic classification of malware on smartphones.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2015
System Call-Based Detection of Malicious Processes.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Run-time classification of malicious processes using system call analysis.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

2013
Multi-channel Change-Point Malware Detection.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Toward an Automatic, Online Behavioral Malware Classification System.
Proceedings of the 7th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2013

2011
Diagnosis of software failures using computational geometry.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

On the maintenance of UI-integrated mashup applications.
Proceedings of the IEEE 27th International Conference on Software Maintenance, 2011

Inoculation against malware infection using kernel-level software sensors.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

2010
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software.
Proceedings of the 17th Working Conference on Reverse Engineering, 2010

On the use of computational geometry to detect software faults at runtime.
Proceedings of the 7th International Conference on Autonomic Computing, 2010

2009
thr2csp: Toward Transforming Threads into Communicating Sequential Processes.
Proceedings of the Ninth IEEE International Working Conference on Source Code Analysis and Manipulation, 2009

Static Security Analysis Based on Input-Related Software Faults.
Proceedings of the 13th European Conference on Software Maintenance and Reengineering, 2009

2008
On the evaluation of the Bunch search-based software modularization algorithm.
Soft Comput., 2008

A Case Study on the Automatic Composition of Network Application Mashups.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

Re-Engineering a Reverse Engineering Portal to a Distributed SOA.
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008

On evaluating the efficiency of software feature development using algebraic manifolds.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

Task Dependency of User Perceived Utility in Autonomic VoIP Systems.
Proceedings of the Fourth International Conference on Autonomic and Autonomous Systems, 2008

2007
Guest Editors' Introduction to the Special Section from the International Conference on Software Maintenance and Evolution.
IEEE Trans. Software Eng., 2007

A Reverse Engineering Tool for Extracting Protocols of Networked Applications.
Proceedings of the 14th Working Conference on Reverse Engineering (WCRE 2007), 2007

International Workshop on Code Based Software Security Assessments - CoBaSSA 2007.
Proceedings of the 14th Working Conference on Reverse Engineering (WCRE 2007), 2007

Reducing Program Comprehension Effort in Evolving Software by Recognizing Feature Implementation Convergence.
Proceedings of the 15th International Conference on Program Comprehension (ICPC 2007), 2007

A Probabilistic Approach to Source Code Authorship Identification.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Using code metric histograms and genetic algorithms to perform author identification for software forensics.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

A genetic algorithm for solving the binning problem in networked applications detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
On the Automatic Modularization of Software Systems Using the Bunch Tool.
IEEE Trans. Software Eng., 2006

Code Based Software Security Assessments.
Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), 2006

On Computing the Canonical Features of Software Systems.
Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), 2006

Studying the Evolution of Software Systems Using Change Clusters.
Proceedings of the 14th International Conference on Program Comprehension (ICPC 2006), 2006

Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems.
Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR 2006), 2006

Towards a reference model for agent-based systems.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

2005
Spectral and meta-heuristic algorithms for software clustering.
J. Syst. Softw., 2005

Workshop on Code Based Software Security Assessments (CoBaSSA 2005).
Proceedings of the 12th Working Conference on Reverse Engineering, 2005

Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla.
Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM 2005), 2005

Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences.
Proceedings of the 21st IEEE International Conference on Software Maintenance (ICSM 2005), 2005

GA-based parameter tuning for multi-agent systems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

2004
A Hierarchy of Dynamic Software Views: From Object-Interactions to Feature-Interactions.
Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004), 2004

Using Interconnection Style Rules to Infer Software Architecture Relations.
Proceedings of the Genetic and Evolutionary Computation, 2004

2003
Formulating software engineering as a search problem.
IEE Proc. Softw., 2003

Toward an environment for comprehending distributed systems.
Proceedings of the 10th Working Conference on Reverse Engineering, 2003

Using Program Transformation to Secure C Programs Against Buffer Overflows.
Proceedings of the 10th Working Conference on Reverse Engineering, 2003

Characterizing the 'Security Vulnerability Likelihood' of Software Functions.
Proceedings of the 19th International Conference on Software Maintenance (ICSM 2003), 2003

Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms.
Proceedings of the Genetic and Evolutionary Computation, 2003

Demonstration of COSAK static analysis tools.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
On the Automatic Recovery of Style-Specific Architectural Relations in Software Systems.
Autom. Softw. Eng., 2002

Applying Spectral Methods to Software Clustering.
Proceedings of the 9th Working Conference on Reverse Engineering (WCRE 2002), 28 October, 2002

Search based reverse engineering.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

Using Heuristic Search Techniques To Extract Design Abstractions From Source Code.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

2001
Visualizing and Analyzing Software Infrastructures.
IEEE Softw., 2001

An Architecture for Distributing the Computation of Software Clustering Algorithms.
Proceedings of the 2001 Working IEEE / IFIP Conference on Software Architecture (WICSA 2001), 2001

CRAFT: A Framework for Evaluating Software Clustering Results in the Absence of Benchmark Decompositions.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001

REportal: A Web-Based Portal Site for Reverse Engineering.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001

Gadget: A Tool for Extracting the Dynamic Structure of Java Programs.
Proceedings of the Thirteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2001), 2001

Form: A Framework for Creating Views of Program Executions.
Proceedings of the 2001 International Conference on Software Maintenance, 2001

Comparing the Decompositions Produced by Software Clustering Algorithms Using Similarity Measurements.
Proceedings of the 2001 International Conference on Software Maintenance, 2001

2000
Toward a design environment for recovering and maintaining the structure of software systems.
ACM SIGSOFT Softw. Eng. Notes, 2000

1999
A Tool for Securely Integrating Legacy Systems into a Distributed Environment.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999

Bunch: A Clustering Tool for the Recovery and Maintenance of Software System Structures.
Proceedings of the 1999 International Conference on Software Maintenance, 1999

1998
ISF: A Visual Formalism for Specifying Interconnection Styles for Software Design.
Int. J. Softw. Eng. Knowl. Eng., 1998

Using Automatic Clustering to Produce High-Level System Organizations of Source Code.
Proceedings of the 6th International Workshop on Program Comprehension (IWPC '98), 1998

1997
Repairing software style using graph grammars.
Proceedings of the 1997 conference of the Centre for Advanced Studies on Collaborative Research, 1997

1996
Controlling the interactions of architectural design components using scoping rules.
PhD thesis, 1996

Toward a generic framework for computing subsystem interfaces.
Proceedings of the Joint Proceedings of the Second International Software Architecture Workshop (ISAW-2) and International Workshop on Multiple Perspectives in Software Development (Viewpoints '96) on SIGSOFT '96 workshops, 1996

Recovering the Structure of Software Systems Using Tube Graph Interconnection Clustering.
Proceedings of the 1996 International Conference on Software Maintenance (ICSM '96), 1996

1994
Prototyping a Visual Formalism for System Modelling.
Proceedings of the Software Engineering and Human-Computer Interaction, 1994

Loosely integrating tools using the star system.
Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31, 1994

A Program Understanding Environment Based on the "Star" Approach to Tool Integration.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
A "curriculum-cycle" environment for teaching programming.
Proceedings of the 24th SIGCSE Technical Symposium on Computer Science Education, 1993

A multi-dimensional taxonomy of software development environments.
Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, 1993

A Conceptual Framework for Software Development.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
Multicolour programming and metamorphic programming: object oriented programming-in-the-large.
Proceedings of the 1992 Conference of the Centre for Advanced Studies on Collaborative Research, 1992


  Loading...