Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Andrew Walenstein
2010 – today
- 2013
[j9]Arun Lakhotia, Andrew Walenstein, Craig Miles, Anshuman Singh: VILO: a rapid learning nearest-neighbor classifier for malware triage. Journal in Computer Virology 9(3): 109-123 (2013)
[j8]Radhouane Chouchane, Natalia Stakhanova, Andrew Walenstein, Arun Lakhotia: Detecting machine-morphed malware variants via engine attribution. Journal in Computer Virology 9(3): 137-157 (2013)- 2012
[j7]Craig Miles, Arun Lakhotia, Andrew Walenstein: In situ reuse of logically extracted functional components. Journal in Computer Virology 8(3): 73-84 (2012)
[c28]Anshuman Singh, Andrew Walenstein, Arun Lakhotia: Tracking concept drift in malware families. AISec 2012: 81-92
[c27]Charles LeDoux, Andrew Walenstein, Arun Lakhotia: Improved Malware Classification through Sensor Fusion Using Disjoint Union. ICISTM 2012: 360-371
[c26]Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia: Deployable Classifiers for Malware Detection. ICISTM 2012: 384-395
[c25]Andrew Walenstein, Arun Lakhotia: A transformation-based model of malware derivation. MALWARE 2012: 17-25
[c24]Andrew Walenstein, Luke Deshotels, Arun Lakhotia: Program Structure-Based Feature Selection for Android Malware Analysis. MobiSec 2012: 51-52- 2011
[j6]Sibylle Schupp, Andrew Walenstein: Guest editor's introduction to the special section on source code analysis and manipulation. Software Quality Journal 19(2): 237-238 (2011)
[c23]Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia: On deployable adversarial classification models. AISec 2011: 113-114- 2010
[c22]Andrew Walenstein, Daniel J. Hefner, Jeffery Wichers: Header information in malware families and impact on automated classifiers. MALWARE 2010: 15-22
2000 – 2009
- 2009
[j5]Matthew Hayes, Andrew Walenstein, Arun Lakhotia: Evaluation of malware phylogeny modelling systems using automated variant generation. Journal in Computer Virology 5(4): 335-343 (2009)- 2008
[j4]Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia: Constructing malware normalizers using term rewriting. Journal in Computer Virology 4(4): 307-322 (2008)
[c21]Mohamed R. Chouchane, Andrew Walenstein, Arun Lakhotia: Using Markov chains to filter machine-morphed variants of malicious programs. MALWARE 2008: 77-84- 2007
[e1]Rainer Koschke, Ettore Merlo, Andrew Walenstein (Eds.): Duplication, Redundancy, and Similarity in Software, 23.07. - 26.07.2006. Dagstuhl Seminar Proceedings 06301, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007- 2006
[c20]Thomas R. Dean, Massimiliano Di Penta, Kostas Kontogiannis, Andrew Walenstein: Clone Detector Use Questions: A List of Desirable Empirical Studies. Duplication, Redundancy, and Similarity in Software 2006
[c19]Rainer Koschke, Andrew Walenstein, Ettore Merlo: 06301 Abstracts Collection -- Duplication, Redundancy, and Similarity in Software. Duplication, Redundancy, and Similarity in Software 2006
[c18]Andrew Walenstein: Code Clones: Reconsidering Terminology. Duplication, Redundancy, and Similarity in Software 2006
[c17]Andrew Walenstein, James R. Cordy, William S. Evans, Ahmed E. Hassan, Toshihiro Kamiya, Cory Kapser, Ettore Merlo: 06301 Working Session Summary: Presentation and Visualization of Redundant Code. Duplication, Redundancy, and Similarity in Software 2006
[c16]Andrew Walenstein, Mohammad El-Ramly, James R. Cordy, William S. Evans, Kiarash Mahdavi, Markus Pizka, Ganesan Ramalingam, Jürgen Wolff von Gudenberg: Similarity in Programs. Duplication, Redundancy, and Similarity in Software 2006
[c15]Andrew Walenstein, Rainer Koschke, Ettore Merlo: 06301 Summary -- Duplication, Redundancy, and Similarity in Software. Duplication, Redundancy, and Similarity in Software 2006
[c14]Andrew Walenstein, Arun Lakhotia: The Software Similarity Problem in Malware Analysis. Duplication, Redundancy, and Similarity in Software 2006
[c13]Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia: Normalizing Metamorphic Malware Using Term Rewriting. SCAM 2006: 75-84- 2005
[j3]Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida: Malware phylogeny generation using permutations of code. Journal in Computer Virology 1(1-2): 13-23 (2005)- 2004
[j2]Andrew Walenstein, Arun Lakhotia, Rainer Koschke: The Second International Workshop on Detection of Software Clones: workshop report. ACM SIGSOFT Software Engineering Notes 29(2): 1-5 (2004)
[c12]- 2003
[c11]Andrew Walenstein: Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories. ICSE Workshop on SE-HCI 2003: 92-99
[c10]Andrew Walenstein: Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering. IWPC 2003: 185-
[c9]Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Yang: Towards a Clone Detection Benchmark Suite and Results Archive. IWPC 2003: 285-
[c8]Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yang, Arun Lakhotia: Problems Creating Task-relevant Clone Detection Reference Data. WCRE 2003: 285-295
[c7]Arun Lakhotia, Andrew Walenstein, Rainer Koschke: Second International Workshop on Detection of Software Clones. WCRE 2003: 368- 2002
[j1]Jens H. Jahnke, Andrew Walenstein: Evaluating Theories for Managing Imperfect Knowledge in Human-Centric Database Reengineering Environments. International Journal of Software Engineering and Knowledge Engineering 12(1): 77-102 (2002)
[c6]Andrew Walenstein: Foundations of Cognitive Support: Toward Abstract Patterns of Usefulness. DSV-IS 2002: 133-147
[c5]Andrew Walenstein: Theory-based Analysis of Cognitive Support in Software Comprehension Tools. IWPC 2002: 75-84
[c4]Jens H. Jahnke, Hausi A. Müller, Andrew Walenstein, Nikolai Mansurov, Kenny Wong: Fused Data-Centric Visualizations for Software Evolution Environments. IWPC 2002: 187-196- 2000
[c3]Jens H. Jahnke, Andrew Walenstein: Reverse Engineering Tools as Media for Imperfect Knowledge. WCRE 2000: 22-31
[c2]Arthur Tateishi, Andrew Walenstein: Applying Traditional Unix Tools during Maintenance: An Experience Report. WCRE 2000: 203-206
1990 – 1999
- 1998
[c1]Andrew Walenstein: Developing the Designer's Toolkit with Software Comprehension Models. ASE 1998: 310-313
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:58 CEST by the dblp team



