Author of the publication

Search Based Clustering for Protecting Software with Diversified Updates.

, , , , and . SSBSE, volume 9962 of Lecture Notes in Computer Science, page 159-175. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A large study on the effect of code obfuscation on the quality of java code., , , and . Empirical Software Engineering, 20 (6): 1486-1524 (2015)Automated Reasoning on Aspects Interactions., and . ASE, page 313-316. IEEE Computer Society, (2006)Attack simulation based software protection assessment method., , , , , , and . Cyber Security And Protection Of Digital Services, page 1-8. IEEE, (2016)Situation Inference for Mobile Users: A Rule Based Approach., , , and . MDM, page 299-303. IEEE, (2007)An Open Source Software Architecture for Smart Buildings., , , and . IntelliSys (2), volume 869 of Advances in Intelligent Systems and Computing, page 160-169. Springer, (2018)Realizing an MDA and SOA Marriage for the Development of Mobile Services., and . ECMDA-FA, volume 5095 of Lecture Notes in Computer Science, page 393-405. Springer, (2008)Synthesizing Service Composition Models on the Basis of Temporal Business Rules., , , , , and . J. Comput. Sci. Technol., 23 (6): 885-894 (2008)A Visual Semantic Service Browser Supporting User-Centric Service Composition., , and . AINA, page 244-251. IEEE Computer Society, (2010)Search Based Clustering for Protecting Software with Diversified Updates., , , , and . SSBSE, volume 9962 of Lecture Notes in Computer Science, page 159-175. (2016)Using Temporal Business Rules to Synthesize Service Composition Process Models., , , and . ACT4SOC, page 85-94. INSTICC Press, (2007)