Karim Elish
Karim Elish
Assistant Professor of Computer Science, Florida Polytechnic University
Verifierad e-postadress på floridapoly.edu - Startsida
Titel
Citeras av
Citeras av
År
Predicting defect-prone software modules using support vector machines
KO Elish, MO Elish
Journal of Systems and Software, Elsevier 81 (5), 649-660, 2008
4972008
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security, Elsevier Journal 49, 255-273, 2015
1132015
Application of treenet in predicting object-oriented software maintainability: A comparative study
MO Elish, KO Elish
IEEE European Conference on Software Maintenance and Reengineering, 69-78, 2009
872009
On the need of precise inter-app ICC classification for detecting Android malware collusions
KO Elish, D Yao, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2015
612015
User-centric dependence analysis for identifying malicious mobile apps
KO Elish, D Yao, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2012
572012
A classification of refactoring methods based on software quality attributes
KO Elish, M Alshayeb
Arabian Journal for Science and Engineering, Springer 36 (7), 1253-1267, 2011
342011
A Static Assurance Analysis of Android Applications
KO Elish, DD Yao, BG Ryder, X Jiang
Technical Report TR-13-03, Computer Science, Virginia Tech, 2013
312013
Using Software Quality Attributes to Classify Refactoring to Patterns.
KO Elish, M Alshayeb
Journal of Software 7 (2), 408-419, 2012
262012
Comprehensive Behavior Profiling for Proactive Android Malware Detection
B Wolfe, KO Elish, DD Yao
17th International Information Security Conference, Springer, 2014
252014
MR-Droid: A scalable and prioritized analysis of inter-app communication risks
F Liu, H Cai, G Wang, DD Yao, KO Elish, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2017
242017
High Precision Screening for Android Malware with Dimensionality Reduction
B Wolfe, K Elish, D Yao
IEEE International Conference on Machine Learning and Applications (ICMLA), 2014
202014
Investigating the Effect of Refactoring on Software Testing Effort
KO Elish, M Alshayeb
IEEE Asia-Pacific Software Engineering Conference, APSEC, 29-34, 2009
192009
Identifying Mobile Inter-App Communication Risks
K Elish, H Cai, D Barton, D Yao, B Ryder
IEEE Transactions on Mobile Computing, 2020
142020
Machine Learning-based Prediction of Prolonged Length of Stay in Newborns
B Thompson, KO Elish, R Steele
IEEE International Conference on Machine Learning and Applications (ICMLA), 2018
92018
A Survey on Connected Vehicles Vulnerabilities and Countermeasures
C Riggs, CE Rigaud, R Beard, T Douglas, K Elish
Journal of Traffic and Logistics Engineering 6 (1), 2018
42018
BetterChoice: A Migraine Drug Recommendation System Based on Neo4J
B Stark, C Knahl, M Aydin, M Samarah, K Elish
IEEE International Conference on Computational Intelligence and Applications …, 2017
42017
A Literature Review on Medicine Recommender Systems
B Stark, C Knahl, M Aydin, K Elish
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
32019
Prioritized Analysis of Inter-App Communication Risks
F Liu, H Cai, G Wang, DD Yao, KO Elish, BG Ryder
ACM on Conference on Data and Application Security and Privacy (CODASPY …, 2017
32017
User-Intention Based Program Analysis for Android Security
KO Elish
PhD Dissertation, Virginia Tech, 2015
22015
Profiling User-Trigger Dependence for Android Security
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security 49 (10.1016), 2015
22015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20