Andrew Walenstein

According to our database1, Andrew Walenstein authored at least 48 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Finding associations between natural and computer languages: A case-study of bilingual LDA applied to the bleeping computer forum posts.
J. Syst. Softw., July, 2023

An Efficient Resilient MPC Scheme via Constraint Tightening Against Cyberattacks: Application to Vehicle Cruise Control.
Proceedings of the 20th International Conference on Informatics in Control, 2023

2022
Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection.
Proceedings of the IEEE International Conference on Data Mining, 2022

2021
Autonomic Security Management for IoT Smart Spaces.
ACM Trans. Internet Things, 2021

Risk-Aware Fine-Grained Access Control in Cyber-Physical Contexts.
CoRR, 2021

2020
Enterprise Security with Adaptive Ensemble Learning on Cooperation and Interaction Patterns.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Contextual, Behavioral, and Biometric Signatures for Continuous Authentication.
IEEE Internet Comput., 2019

Generative modeling games for exploratory industry-academic research.
Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, 2019

2018
A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

2017
A Secure Microservice Framework for IoT.
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017

2013
VILO: a rapid learning nearest-neighbor classifier for malware triage.
J. Comput. Virol. Hacking Tech., 2013

Detecting machine-morphed malware variants via engine attribution.
J. Comput. Virol. Hacking Tech., 2013

2012
In situ reuse of logically extracted functional components.
J. Comput. Virol., 2012

Program Structure-Based Feature Selection for Android Malware Analysis.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2012

A transformation-based model of malware derivation.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Deployable Classifiers for Malware Detection.
Proceedings of the Information Systems, Technology and Management, 2012

Improved Malware Classification through Sensor Fusion Using Disjoint Union.
Proceedings of the Information Systems, Technology and Management, 2012

Tracking concept drift in malware families.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Guest editor's introduction to the special section on source code analysis and manipulation.
Softw. Qual. J., 2011

On deployable adversarial classification models.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Header information in malware families and impact on automated classifiers.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2009
Evaluation of malware phylogeny modelling systems using automated variant generation.
J. Comput. Virol., 2009

2008
Constructing malware normalizers using term rewriting.
J. Comput. Virol., 2008

Using Markov chains to filter machine-morphed variants of malicious programs.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

2006
Normalizing Metamorphic Malware Using Term Rewriting.
Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), 2006

The Software Similarity Problem in Malware Analysis.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

06301 Summary -- Duplication, Redundancy, and Similarity in Software.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

Similarity in Programs.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

06301 Working Session Summary: Presentation and Visualization of Redundant Code.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

Code Clones: Reconsidering Terminology.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

06301 Abstracts Collection -- Duplication, Redundancy, and Similarity in Software.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

Clone Detector Use Questions: A List of Desirable Empirical Studies.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

2005
Malware phylogeny generation using permutations of code.
J. Comput. Virol., 2005

2004
The Second International Workshop on Detection of Software Clones: workshop report.
ACM SIGSOFT Softw. Eng. Notes, 2004

Theory adapters as discipline coordinators.
Proceedings of the ACM Workshop on Interdisciplinary Software Engineering Research, 2004

2003
Problems Creating Task-relevant Clone Detection Reference Data.
Proceedings of the 10th Working Conference on Reverse Engineering, 2003

Second International Workshop on Detection of Software Clones.
Proceedings of the 10th Working Conference on Reverse Engineering, 2003

Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering.
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003

Towards a Clone Detection Benchmark Suite and Results Archive.
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003

Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories.
Proceedings of ICSE 2003 Workshop on Bridging the Gaps Between Software Engineering and Human-Computer Interaction, 2003

2002
Evaluating Theories for Managing Imperfect Knowledge in Human-Centric Database Reengineering Environments.
Int. J. Softw. Eng. Knowl. Eng., 2002

HASTI: A Lightweight Framework for Cognitive Reengineering Analysis.
Proceedings of the 14th Annual Workshop of the Psychology of Programming Interest Group, 2002

Theory-based Analysis of Cognitive Support in Software Comprehension Tools.
Proceedings of the 10th International Workshop on Program Comprehension (IWPC 2002), 2002

Fused Data-Centric Visualizations for Software Evolution Environments.
Proceedings of the 10th International Workshop on Program Comprehension (IWPC 2002), 2002

Foundations of Cognitive Support: Toward Abstract Patterns of Usefulness.
Proceedings of the Interactive Systems. Design, 2002

2000
Applying Traditional Unix Tools during Maintenance: An Experience Report.
Proceedings of the Seventh Working Conference on Reverse Engineering, 2000

Reverse Engineering Tools as Media for Imperfect Knowledge.
Proceedings of the Seventh Working Conference on Reverse Engineering, 2000

1998
Developing the Designer's Toolkit with Software Comprehension Models.
Proceedings of the Thirteenth IEEE Conference on Automated Software Engineering, 1998


  Loading...