default search action
Andrew Walenstein
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Mohd Saqib, Benjamin C. M. Fung, Philippe Charland, Andrew Walenstein:
GAGE: Genetic Algorithm-Based Graph Explainer for Malware Analysis. ICDE 2024: 2258-2270 - [c30]Jesia Quader Yuki, Mohammadhossein Amouei, Benjamin C. M. Fung, Philippe Charland, Andrew Walenstein:
AsmDocGen: Generating Functional Natural Language Descriptions for Assembly Code. ICSOFT 2024: 35-45 - [c29]Samaneh Mahdavifar, Mohd Saqib, Benjamin C. M. Fung, Philippe Charland, Andrew Walenstein:
VulEXplaineR: XAI for Vulnerability Detection on Assembly Code. ECML/PKDD (9) 2024: 3-20 - [i11]Litao Li, Steven H. H. Ding, Andrew Walenstein, Philippe Charland, Benjamin C. M. Fung:
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection. CoRR abs/2404.08562 (2024) - [i10]Leo Song, Steven H. H. Ding, Yuan Tian, Li Tao Li, Philippe Charland, Andrew Walenstein:
Chain-of-Experts (CoE): Reverse Engineering Software Bills of Materials for JavaScript Application Bundles through Code Clone Search. CoRR abs/2408.16198 (2024) - 2023
- [j12]Kundi Yao, Gustavo Ansaldi Oliva, Ahmed E. Hassan, Muhammad Asaduzzaman, Andrew J. Malton, Andrew Walenstein:
Finding associations between natural and computer languages: A case-study of bilingual LDA applied to the bleeping computer forum posts. J. Syst. Softw. 201: 111651 (2023) - [c28]Milad Farsi, Shuhao Bian, Nasser L. Azad, Xiaobing Shi, Andrew Walenstein:
An Efficient Resilient MPC Scheme via Constraint Tightening Against Cyberattacks: Application to Vehicle Cruise Control. ICINCO (1) 2023: 674-682 - [i9]Milad Farsi, Shuhao Bian, Nasser L. Azad, Xiaobing Shi, Andrew Walenstein:
An Efficient Resilient MPC Scheme via Constraint Tightening against Cyberattacks: Application to Vehicle Cruise Control. CoRR abs/2310.08680 (2023) - 2022
- [c27]Christopher Molloy, Jeremy Banks, Steven H. H. Ding, Philippe Charland, Andrew Walenstein, Litao Li:
Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection. ICDM 2022: 1131-1136 - 2021
- [j11]Changyuan Lin, Hamzeh Khazaei, Andrew Walenstein, Andrew J. Malton:
Autonomic Security Management for IoT Smart Spaces. ACM Trans. Internet Things 2(4): 27:1-27:20 (2021) - [i8]Jinxin Liu, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein:
Risk-Aware Fine-Grained Access Control in Cyber-Physical Contexts. CoRR abs/2108.12739 (2021) - 2020
- [c26]Kyle Quintal, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein:
Enterprise Security with Adaptive Ensemble Learning on Cooperation and Interaction Patterns. CCNC 2020: 1-7
2010 – 2019
- 2019
- [j10]Kyle Quintal, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein:
Contextual, Behavioral, and Biometric Signatures for Continuous Authentication. IEEE Internet Comput. 23(5): 18-28 (2019) - [c25]Andrew Walenstein, Andrew J. Malton:
Generative modeling games for exploratory industry-academic research. CESSER-IP@ICSE 2019: 18-21 - 2018
- [c24]Gopi Krishnan Rajbahadur, Andrew J. Malton, Andrew Walenstein, Ahmed E. Hassan:
A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety. Intelligent Vehicles Symposium 2018: 421-426 - 2017
- [c23]Duo Lu, Dijiang Huang, Andrew Walenstein, Deep Medhi:
A Secure Microservice Framework for IoT. SOSE 2017: 9-18 - 2013
- [j9]Arun Lakhotia, Andrew Walenstein, Craig Miles, Anshuman Singh:
VILO: a rapid learning nearest-neighbor classifier for malware triage. J. Comput. Virol. Hacking Tech. 9(3): 109-123 (2013) - [j8]Radhouane Chouchane, Natalia Stakhanova, Andrew Walenstein, Arun Lakhotia:
Detecting machine-morphed malware variants via engine attribution. J. Comput. Virol. Hacking Tech. 9(3): 137-157 (2013) - 2012
- [j7]Craig Miles, Arun Lakhotia, Andrew Walenstein:
In situ reuse of logically extracted functional components. J. Comput. Virol. 8(3): 73-84 (2012) - [c22]Anshuman Singh, Andrew Walenstein, Arun Lakhotia:
Tracking concept drift in malware families. AISec 2012: 81-92 - [c21]Charles LeDoux, Andrew Walenstein, Arun Lakhotia:
Improved Malware Classification through Sensor Fusion Using Disjoint Union. ICISTM 2012: 360-371 - [c20]Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia:
Deployable Classifiers for Malware Detection. ICISTM 2012: 384-395 - [c19]Andrew Walenstein, Arun Lakhotia:
A transformation-based model of malware derivation. MALWARE 2012: 17-25 - [c18]Andrew Walenstein, Luke Deshotels, Arun Lakhotia:
Program Structure-Based Feature Selection for Android Malware Analysis. MobiSec 2012: 51-52 - 2011
- [j6]Sibylle Schupp, Andrew Walenstein:
Guest editor's introduction to the special section on source code analysis and manipulation. Softw. Qual. J. 19(2): 237-238 (2011) - [c17]Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia:
On deployable adversarial classification models. AISec 2011: 113-114 - 2010
- [c16]Andrew Walenstein, Daniel J. Hefner, Jeffery Wichers:
Header information in malware families and impact on automated classifiers. MALWARE 2010: 15-22
2000 – 2009
- 2009
- [j5]Matthew Hayes, Andrew Walenstein, Arun Lakhotia:
Evaluation of malware phylogeny modelling systems using automated variant generation. J. Comput. Virol. 5(4): 335-343 (2009) - 2008
- [j4]Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia:
Constructing malware normalizers using term rewriting. J. Comput. Virol. 4(4): 307-322 (2008) - [c15]Mohamed R. Chouchane, Andrew Walenstein, Arun Lakhotia:
Using Markov chains to filter machine-morphed variants of malicious programs. MALWARE 2008: 77-84 - 2007
- [e1]Rainer Koschke, Ettore Merlo, Andrew Walenstein:
Duplication, Redundancy, and Similarity in Software, 23.07. - 26.07.2006. Dagstuhl Seminar Proceedings 06301, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - 2006
- [c14]Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia:
Normalizing Metamorphic Malware Using Term Rewriting. SCAM 2006: 75-84 - [i7]Thomas R. Dean, Massimiliano Di Penta, Kostas Kontogiannis, Andrew Walenstein:
Clone Detector Use Questions: A List of Desirable Empirical Studies. Duplication, Redundancy, and Similarity in Software 2006 - [i6]Rainer Koschke, Andrew Walenstein, Ettore Merlo:
06301 Abstracts Collection -- Duplication, Redundancy, and Similarity in Software. Duplication, Redundancy, and Similarity in Software 2006 - [i5]Andrew Walenstein:
Code Clones: Reconsidering Terminology. Duplication, Redundancy, and Similarity in Software 2006 - [i4]Andrew Walenstein, James R. Cordy, William S. Evans, Ahmed E. Hassan, Toshihiro Kamiya, Cory Kapser, Ettore Merlo:
06301 Working Session Summary: Presentation and Visualization of Redundant Code. Duplication, Redundancy, and Similarity in Software 2006 - [i3]Andrew Walenstein, Mohammad El-Ramly, James R. Cordy, William S. Evans, Kiarash Mahdavi, Markus Pizka, Ganesan Ramalingam, Jürgen Wolff von Gudenberg:
Similarity in Programs. Duplication, Redundancy, and Similarity in Software 2006 - [i2]Andrew Walenstein, Rainer Koschke, Ettore Merlo:
06301 Summary -- Duplication, Redundancy, and Similarity in Software. Duplication, Redundancy, and Similarity in Software 2006 - [i1]Andrew Walenstein, Arun Lakhotia:
The Software Similarity Problem in Malware Analysis. Duplication, Redundancy, and Similarity in Software 2006 - 2005
- [j3]Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida:
Malware phylogeny generation using permutations of code. J. Comput. Virol. 1(1-2): 13-23 (2005) - 2004
- [j2]Andrew Walenstein, Arun Lakhotia, Rainer Koschke:
The Second International Workshop on Detection of Software Clones: workshop report. ACM SIGSOFT Softw. Eng. Notes 29(2): 1-5 (2004) - [c13]Andrew Walenstein:
Theory adapters as discipline coordinators. WISER 2004: 8-17 - 2003
- [c12]Andrew Walenstein:
Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories. ICSE Workshop on SE-HCI 2003: 92-99 - [c11]Andrew Walenstein:
Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering. IWPC 2003: 185-195 - [c10]Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Yang:
Towards a Clone Detection Benchmark Suite and Results Archive. IWPC 2003: 285-287 - [c9]Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yang, Arun Lakhotia:
Problems Creating Task-relevant Clone Detection Reference Data. WCRE 2003: 285-295 - [c8]Arun Lakhotia, Andrew Walenstein, Rainer Koschke:
Second International Workshop on Detection of Software Clones. WCRE 2003: 368 - 2002
- [j1]Jens H. Jahnke, Andrew Walenstein:
Evaluating Theories for Managing Imperfect Knowledge in Human-Centric Database Reengineering Environments. Int. J. Softw. Eng. Knowl. Eng. 12(1): 77-102 (2002) - [c7]Andrew Walenstein:
Foundations of Cognitive Support: Toward Abstract Patterns of Usefulness. DSV-IS 2002: 133-147 - [c6]Andrew Walenstein:
Theory-based Analysis of Cognitive Support in Software Comprehension Tools. IWPC 2002: 75-84 - [c5]Jens H. Jahnke, Hausi A. Müller, Andrew Walenstein, Nikolai Mansurov, Kenny Wong:
Fused Data-Centric Visualizations for Software Evolution Environments. IWPC 2002: 187-196 - [c4]Andrew Walenstein:
HASTI: A Lightweight Framework for Cognitive Reengineering Analysis. PPIG 2002: 21 - 2000
- [c3]Jens H. Jahnke, Andrew Walenstein:
Reverse Engineering Tools as Media for Imperfect Knowledge. WCRE 2000: 22-31 - [c2]Arthur Tateishi, Andrew Walenstein:
Applying Traditional Unix Tools during Maintenance: An Experience Report. WCRE 2000: 203-206
1990 – 1999
- 1998
- [c1]Andrew Walenstein:
Developing the Designer's Toolkit with Software Comprehension Models. ASE 1998: 310-313
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint