Malware phylogeny generation using permutations of code ME Karim, A Walenstein, A Lakhotia, L Parida Journal in Computer Virology 1 (1-2), 13-23, 2005 | 343 | 2005 |
The software similarity problem in malware analysis A Walenstein, A Lakhotia Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2007 | 112 | 2007 |
A secure microservice framework for iot D Lu, D Huang, A Walenstein, D Medhi 2017 IEEE symposium on service-oriented system engineering (SOSE), 9-18, 2017 | 108 | 2017 |
Problems Creating Task-relevant Clone Detection Reference Data. A Walenstein, N Jyoti, J Li, Y Yang, A Lakhotia WCRE 3, 285, 2003 | 107 | 2003 |
Normalizing metamorphic malware using term rewriting A Walenstein, R Mathur, MR Chouchane, A Lakhotia 2006 Sixth IEEE International Workshop on Source Code Analysis and …, 2006 | 106 | 2006 |
Cognitive support in software engineering tools: A distributed cognition framework A Walenstein Simon Fraser University, 2002 | 98 | 2002 |
Exploiting similarity between variants to defeat malware A Walenstein, M Venable, M Hayes, C Thompson, A Lakhotia Proc. BlackHat DC Conf, 2007 | 89 | 2007 |
A survey of anomaly detection for connected vehicle cybersecurity and safety GK Rajbahadur, AJ Malton, A Walenstein, AE Hassan 2018 IEEE Intelligent Vehicles Symposium (IV), 421-426, 2018 | 80 | 2018 |
Tracking concept drift in malware families A Singh, A Walenstein, A Lakhotia Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012 | 70 | 2012 |
The design space of metamorphic malware A Walenstein, R Mathur, MR Chouchane, A Lakhotia 2nd International Conference on i-Warfare and Security (ICIW 2007). 2nd …, 2007 | 57 | 2007 |
Similarity in programs A Walenstein, M El-Ramly, JR Cordy, WS Evans, K Mahdavi, M Pizka, ... Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2007 | 50 | 2007 |
Theory-based analysis of cognitive support in software comprehension tools A Walenstein Proceedings 10th International Workshop on Program Comprehension, 75-84, 2002 | 48 | 2002 |
Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories. A Walenstein ICSE Workshop on SE-HCI, 92-99, 2003 | 47 | 2003 |
Towards a clone detection benchmark suite and results archive A Lakhotia, J Li, A Walenstein, Y Yang 11th IEEE International Workshop on Program Comprehension, 2003., 285-286, 2003 | 45 | 2003 |
Reverse engineering tools as media for imperfect knowledge JH Jahnke, A Walenstein Proceedings Seventh Working Conference on Reverse Engineering, 22-31, 2000 | 45 | 2000 |
Vilo: a rapid learning nearest-neighbor classifier for malware triage A Lakhotia, A Walenstein, C Miles, A Singh Journal of Computer Virology and Hacking Techniques 9 (3), 109-123, 2013 | 42 | 2013 |
Observing and measuring cognitive support: Steps toward systematic tool evaluation and engineering A Walenstein 11th IEEE International Workshop on Program Comprehension, 2003., 185-194, 2003 | 41 | 2003 |
Evaluation of malware phylogeny modelling systems using automated variant generation M Hayes, A Walenstein, A Lakhotia Journal in Computer Virology 5, 335-343, 2009 | 39 | 2009 |
Phylogeny generation A Lakhotia, ME Karim, A Walenstein US Patent 7,873,947, 2011 | 33 | 2011 |
Statistical signatures for fast filtering of instruction-substituting metamorphic malware MR Chouchane, A Walenstein, A Lakhotia Proceedings of the 2007 ACM workshop on Recurring malcode, 31-37, 2007 | 33 | 2007 |