Syed Shariyar Murtaza

According to our database1, Syed Shariyar Murtaza authored at least 26 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Regex-augmented Domain Transfer Topic Classification based on a Pre-trained Language Model: An application in Financial Domain.
CoRR, 2023

2018
On the Use of Hidden Markov Model to Predict the Time to Fix Bugs.
IEEE Trans. Software Eng., 2018

Combining heterogeneous anomaly detectors for improved software security.
J. Syst. Softw., 2018

2016
Mining trends and patterns of software vulnerabilities.
J. Syst. Softw., 2016

An empirical investigation of the evaluators' scoring of vendors' responses to an RFP of a large healthcare system.
Proceedings of the International Workshop on Software Engineering in Healthcare Systems, 2016

How to Effectively Train IBM Watson: Classroom Experience.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System.
IEEE Trans. Reliab., 2015

The Firefox Temporal Defect Dataset.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

Towards an Emerging Theory for the Diagnosis of Faulty Functions in function-Call Traces.
Proceedings of the IEEE/ACM 4th SEMAT Workshop on a General Theory of Software Engineering, 2015

A trace abstraction approach for host-based anomaly detection.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

2014
An empirical study on the use of mutant traces for diagnosis of faults in deployed systems.
J. Syst. Softw., 2014

Total ADS: Automated Software Anomaly Detection System.
Proceedings of the 14th IEEE International Working Conference on Source Code Analysis and Manipulation, 2014

A contextual approach for effective recovery of inter-process communication patterns from HPC traces.
Proceedings of the 2014 Software Evolution Week, 2014

2013
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

A host-based anomaly detection approach by representing system calls as states of kernel modules.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Monitoring system calls for anomaly detection in modern operating systems.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

2012
Using entropy measures for comparison of software traces.
Inf. Sci., 2012

On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies.
Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 2012

2011
Characteristics of multiple-component defects and architectural hotspots: a large system case study.
Empir. Softw. Eng., 2011

Diagnosing new faults using mutants and prior faults.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
A towards an extended relational algebra for software architecture.
ACM SIGSOFT Softw. Eng. Notes, 2010

F007: finding rediscovered faults from the field using function-level failed traces of software in the field.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

2009
Analysis of pervasive multiple-component defects in a large software system.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

2008
Discovering the Fault Origin from Field Traces.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

2006
On the Dynamic Management of Information in Ubiquitous Systems Using Evolvable Software Components.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
A Conceptual Architecture for the Uniform Identification of Objects.
Proceedings of the 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 2005


  Loading...