Author of the publication

Analyzing Complex Data in Motion at Scale with Temporal Graphs.

, , , , and . SEKE, page 596-601. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Profiling Android Vulnerabilities., , , and . QRS, page 222-229. IEEE, (2016)Vulnerability Prediction Models: A Case Study on the Linux Kernel., , and . SCAM, page 1-10. IEEE Computer Society, (2016)Analyzing Complex Data in Motion at Scale with Temporal Graphs., , , , and . SEKE, page 596-601. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2017)Are mutants really natural?: a study on how "naturalness" helps mutant selection., , , , , , and . ESEM, page 3:1-3:10. ACM, (2018)Engineering Paper Enabling the Continuous Analysis of Security Vulnerabilities with VulData7., , and . SCAM, page 56-61. IEEE Computer Society, (2018)The importance of accounting for real-world labelling when predicting software vulnerabilities., , , , , and . ESEC/SIGSOFT FSE, page 695-705. ACM, (2019)An Architecture to Support the Collection of Big Data in the Internet of Things., , , and . SERVICES, page 442-449. IEEE Computer Society, (2014)Evaluating Vulnerability Prediction Models.. University of Luxembourg, (2018)base-search.net (ftunivluxembourg:oai:orbilu.uni.lu:10993/36869).TUNA: TUning Naturalness-Based Analysis., , , and . ICSME, page 715. IEEE Computer Society, (2018)An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel., , and . APSEC, page 105-112. IEEE Computer Society, (2016)