default search action
Spiros Mancoridis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c75]Erick Galinkin, Emmanouil Pountourakis, Spiros Mancoridis:
The Price of Pessimism for Automated Defense. GameSec 2024: 45-64 - [c74]John Carter, Spiros Mancoridis, Pavlos Protopapas, Erick Galinkin:
IoT Malware Data Augmentation using a Generative Adversarial Network. HICSS 2024: 7572-7581 - [c73]John Carter, Spiros Mancoridis, Pavlos Protopapas, Erick Galinkin:
Behavioral Malware Detection using a Language Model Classifier Trained on sys2vec Embeddings. HICSS 2024: 7582-7591 - [i5]Erick Galinkin, Emmanouil Pountourakis, Spiros Mancoridis:
The Price of Pessimism for Automated Defense. CoRR abs/2409.19237 (2024) - 2023
- [c72]Aviel J. Stein, Spiros Mancoridis:
Chaos to Clarity with Semantic Inferencing for Python Source Code Snippets. ICSC 2023: 161-166 - 2022
- [c71]John Carter, Spiros Mancoridis, Erick Galinkin:
Fast, lightweight IoT anomaly detection using feature pruning and PCA. SAC 2022: 133-138 - [c70]Aviel J. Stein, Daniel Schwartz, Yiwen Shi, Spiros Mancoridis:
Linguistic Approach to Segmenting Source Code. ICSC 2022: 177-178 - [c69]John Carter, Spiros Mancoridis, Malvin Nkomo, Steven Weber, Kapil R. Dandekar:
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection. UbiSec 2022: 103-115 - [i4]Erick Galinkin, Emmanouil Pountourakis, John Carter, Spiros Mancoridis:
Simulation of Attacker Defender Interaction in a Noisy Security Game. CoRR abs/2212.04281 (2022) - 2021
- [c68]Erick Galinkin, John Carter, Spiros Mancoridis:
Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem. GameSec 2021: 354-364 - [c67]John Carter, Spiros Mancoridis:
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem. UbiSec 2021: 53-65 - [i3]Erick Galinkin, John Carter, Spiros Mancoridis:
Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem. CoRR abs/2109.11592 (2021) - [i2]John Carter, Spiros Mancoridis:
Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem. CoRR abs/2111.00097 (2021) - 2020
- [c66]Aviel J. Stein, Aviel Kapllani, Spiros Mancoridis, Rachel Greenstadt:
Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations. ICSC 2020: 242-248
2010 – 2019
- 2018
- [c65]Bander Alsulami, Spiros Mancoridis:
Behavioral Malware Classification using Convolutional Recurrent Neural Networks. MALWARE 2018: 103-111 - [c64]Ni An, Alexander M. Duff, Mahshid Noorani, Steven Weber, Spiros Mancoridis:
Malware Anomaly Detection on Virtual Assistants. MALWARE 2018: 124-131 - [i1]Bander Alsulami, Spiros Mancoridis:
Behavioral Malware Classification using Convolutional Recurrent Neural Networks. CoRR abs/1811.07842 (2018) - 2017
- [c63]Bander Alsulami, Edwin Dauber, Richard E. Harang, Spiros Mancoridis, Rachel Greenstadt:
Source Code Authorship Attribution Using Long Short-Term Memory Based Networks. ESORICS (1) 2017: 65-82 - [c62]Ni An, Alexander M. Duff, Gaurav Naik, Michalis Faloutsos, Steven Weber, Spiros Mancoridis:
Behavioral anomaly detection of malware on home routers. MALWARE 2017: 47-54 - [c61]Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis:
Lightweight behavioral malware detection for windows platforms. MALWARE 2017: 75-81 - 2016
- [c60]Matthew Ping, Bander Alsulami, Spiros Mancoridis:
On the effectiveness of application characteristics in the automatic classification of malware on smartphones. MALWARE 2016: 75-82 - 2015
- [c59]Raymond Canzanese, Spiros Mancoridis, Moshe Kam:
Run-time classification of malicious processes using system call analysis. MALWARE 2015: 21-28 - [c58]Raymond Canzanese, Spiros Mancoridis, Moshe Kam:
System Call-Based Detection of Malicious Processes. QRS 2015: 119-124 - 2013
- [c57]Raymond Canzanese, Moshe Kam, Spiros Mancoridis:
Toward an Automatic, Online Behavioral Malware Classification System. SASO 2013: 111-120 - [c56]Raymond Canzanese, Moshe Kam, Spiros Mancoridis:
Multi-channel Change-Point Malware Detection. SERE 2013: 70-79 - 2011
- [c55]Raymond Canzanese, Moshe Kam, Spiros Mancoridis:
Inoculation against malware infection using kernel-level software sensors. ICAC 2011: 101-110 - [c54]Maxim Shevertalov, Spiros Mancoridis:
On the maintenance of UI-integrated mashup applications. ICSM 2011: 203-212 - [c53]Edward Stehle, Kevin Lynch, Maxim Shevertalov, Chris Rorres, Spiros Mancoridis:
Diagnosis of software failures using computational geometry. ASE 2011: 496-499 - 2010
- [c52]Edward Stehle, Kevin Lynch, Maxim Shevertalov, Chris Rorres, Spiros Mancoridis:
On the use of computational geometry to detect software faults at runtime. ICAC 2010: 109-118 - [c51]Sunny Wong, Melissa Aaron, Jeffrey Segall, Kevin Lynch, Spiros Mancoridis:
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software. WCRE 2010: 141-149
2000 – 2009
- 2009
- [c50]Csaba Nagy, Spiros Mancoridis:
Static Security Analysis Based on Input-Related Software Faults. CSMR 2009: 37-46 - [c49]Robert Charles Lange, Spiros Mancoridis:
thr2csp: Toward Transforming Threads into Communicating Sequential Processes. SCAM 2009: 3-12 - 2008
- [j9]Brian S. Mitchell, Spiros Mancoridis:
On the evaluation of the Bunch search-based software modularization algorithm. Soft Comput. 12(1): 77-93 (2008) - [c48]Edward Stehle, Maxim Shevertalov, Paul deGrandis, Spiros Mancoridis, Moshe Kam:
Task Dependency of User Perceived Utility in Autonomic VoIP Systems. ICAS 2008: 248-254 - [c47]Jay Kothari, Dmitriy Bespalov, Spiros Mancoridis, Ali Shokoufandeh:
On evaluating the efficiency of software feature development using algebraic manifolds. ICSM 2008: 7-16 - [c46]William M. Mongan, Maxim Shevertalov, Spiros Mancoridis:
Re-Engineering a Reverse Engineering Portal to a Distributed SOA. ICPC 2008: 218-223 - [c45]Maxim Shevertalov, Spiros Mancoridis:
A Case Study on the Automatic Composition of Network Application Mashups. ASE 2008: 359-362 - 2007
- [j8]David W. Binkley, Rainer Koschke, Spiros Mancoridis:
Guest Editors' Introduction to the Special Section from the International Conference on Software Maintenance and Evolution. IEEE Trans. Software Eng. 33(12): 797-798 (2007) - [c44]Maxim Shevertalov, Edward Stehle, Spiros Mancoridis:
A genetic algorithm for solving the binning problem in networked applications detection. IEEE Congress on Evolutionary Computation 2007: 713-720 - [c43]Robert Charles Lange, Spiros Mancoridis:
Using code metric histograms and genetic algorithms to perform author identification for software forensics. GECCO 2007: 2082-2089 - [c42]Jay Kothari, Maxim Shevertalov, Edward Stehle, Spiros Mancoridis:
A Probabilistic Approach to Source Code Authorship Identification. ITNG 2007: 243-248 - [c41]Jay Kothari, Trip Denton, Ali Shokoufandeh, Spiros Mancoridis:
Reducing Program Comprehension Effort in Evolving Software by Recognizing Feature Implementation Convergence. ICPC 2007: 17-26 - [c40]Maxim Shevertalov, Spiros Mancoridis:
A Reverse Engineering Tool for Extracting Protocols of Networked Applications. WCRE 2007: 229-238 - [c39]Leon Moonen, Spiros Mancoridis:
International Workshop on Code Based Software Security Assessments - CoBaSSA 2007. WCRE 2007: 300 - 2006
- [j7]Brian S. Mitchell, Spiros Mancoridis:
On the Automatic Modularization of Software Systems Using the Bunch Tool. IEEE Trans. Software Eng. 32(3): 193-208 (2006) - [c38]Pragnesh Jay Modi, Spiros Mancoridis, William M. Mongan, William C. Regli, Israel Mayk:
Towards a reference model for agent-based systems. AAMAS 2006: 1475-1482 - [c37]Maher Salah, Spiros Mancoridis, Giuliano Antoniol, Massimiliano Di Penta:
Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems. CSMR 2006: 71-80 - [c36]Jay Kothari, Ali Shokoufandeh, Spiros Mancoridis, Ahmed E. Hassan:
Studying the Evolution of Software Systems Using Change Clusters. ICPC 2006: 46-55 - [c35]Jay Kothari, Trip Denton, Spiros Mancoridis, Ali Shokoufandeh:
On Computing the Canonical Features of Software Systems. WCRE 2006: 93-102 - [c34]Leon Moonen, Spiros Mancoridis:
Code Based Software Security Assessments. WCRE 2006: 313 - 2005
- [j6]Ali Shokoufandeh, Spiros Mancoridis, Trip Denton, Matthew Maycock:
Spectral and meta-heuristic algorithms for software clustering. J. Syst. Softw. 77(3): 213-223 (2005) - [c33]Joseph Haas, Maxim Peysakhov, Spiros Mancoridis:
GA-based parameter tuning for multi-agent systems. GECCO 2005: 1085-1086 - [c32]Maher Salah, Trip Denton, Spiros Mancoridis, Ali Shokoufandeh, Filippos I. Vokolos:
Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences. ICSM 2005: 155-164 - [c31]Maher Salah, Spiros Mancoridis, Giuliano Antoniol, Massimiliano Di Penta:
Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla. ICSM 2005: 639-642 - [c30]Leon Moonen, Spiros Mancoridis:
Workshop on Code Based Software Security Assessments (CoBaSSA 2005). WCRE 2005: 233 - 2004
- [c29]Brian S. Mitchell, Spiros Mancoridis, Martin Traverso:
Using Interconnection Style Rules to Infer Software Architecture Relations. GECCO (2) 2004: 1375-1387 - [c28]Maher Salah, Spiros Mancoridis:
A Hierarchy of Dynamic Software Views: From Object-Interactions to Feature-Interactions. ICSM 2004: 72-81 - 2003
- [j5]John A. Clark, José Javier Dolado, Mark Harman, Robert M. Hierons, Bryan F. Jones, M. Lumkin, Brian S. Mitchell, Spiros Mancoridis, K. Rees, Marc Roper, Martin J. Shepperd:
Formulating software engineering as a search problem. IEE Proc. Softw. 150(3): 161-175 (2003) - [c27]Dan DaCosta, Christopher Dahn, Spiros Mancoridis, Vassilis Prevelakis:
Demonstration of COSAK static analysis tools. DISCEX (2) 2003: 7-9 - [c26]Brian S. Mitchell, Spiros Mancoridis:
Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms. GECCO 2003: 2499-2510 - [c25]Dan DaCosta, Christopher Dahn, Spiros Mancoridis, Vassilis Prevelakis:
Characterizing the 'Security Vulnerability Likelihood' of Software Functions. ICSM 2003: 266- - [c24]Maher Salah, Spiros Mancoridis:
Toward an environment for comprehending distributed systems. WCRE 2003: 238-247 - [c23]Christopher Dahn, Spiros Mancoridis:
Using Program Transformation to Secure C Programs Against Buffer Overflows. WCRE 2003: 323-333 - 2002
- [j4]Martin Traverso, Spiros Mancoridis:
On the Automatic Recovery of Style-Specific Architectural Relations in Software Systems. Autom. Softw. Eng. 9(4): 331-360 (2002) - [c22]Brian S. Mitchell, Spiros Mancoridis:
Using Heuristic Search Techniques To Extract Design Abstractions From Source Code. GECCO 2002: 1375-1382 - [c21]Brian S. Mitchell, Spiros Mancoridis, Martin Traverso:
Search based reverse engineering. SEKE 2002: 431-438 - [c20]Ali Shokoufandeh, Spiros Mancoridis, Matthew Maycock:
Applying Spectral Methods to Software Clustering. WCRE 2002: 3-10 - 2001
- [j3]Adam L. Buchsbaum, Yih-Farn Chen, Huale Huang, Eleftherios Koutsofios, John M. Mocenigo, Anne Rogers, Michael Jankowsky, Spiros Mancoridis:
Visualizing and Analyzing Software Infrastructures. IEEE Softw. 18(5): 62-70 (2001) - [c19]Timothy S. Souder, Spiros Mancoridis, Maher Salah:
Form: A Framework for Creating Views of Program Executions. ICSM 2001: 612- - [c18]Brian S. Mitchell, Spiros Mancoridis:
Comparing the Decompositions Produced by Software Clustering Algorithms Using Similarity Measurements. ICSM 2001: 744-753 - [c17]Juan Gargiulo, Spiros Mancoridis:
Gadget: A Tool for Extracting the Dynamic Structure of Java Programs. SEKE 2001: 244-251 - [c16]Brian S. Mitchell, Spiros Mancoridis:
CRAFT: A Framework for Evaluating Software Clustering Results in the Absence of Benchmark Decompositions. WCRE 2001: 93-102 - [c15]Spiros Mancoridis, Timothy S. Souder, Yih-Farn Chen, Emden R. Gansner, Jeffrey L. Korn:
REportal: A Web-Based Portal Site for Reverse Engineering. WCRE 2001: 221-230 - [c14]Brian S. Mitchell, Martin Traverso, Spiros Mancoridis:
An Architecture for Distributing the Computation of Software Clustering Algorithms. WICSA 2001: 181-190 - 2000
- [j2]Spiros Mancoridis:
Toward a design environment for recovering and maintaining the structure of software systems. ACM SIGSOFT Softw. Eng. Notes 25(1): 63-64 (2000)
1990 – 1999
- 1999
- [c13]Spiros Mancoridis, Brian S. Mitchell, Yih-Farn Chen, Emden R. Gansner:
Bunch: A Clustering Tool for the Recovery and Maintenance of Software System Structures. ICSM 1999: 50- - [c12]Timothy S. Souder, Spiros Mancoridis:
A Tool for Securely Integrating Legacy Systems into a Distributed Environment. WCRE 1999: 47-55 - 1998
- [j1]Spiros Mancoridis:
ISF: A Visual Formalism for Specifying Interconnection Styles for Software Design. Int. J. Softw. Eng. Knowl. Eng. 8(4): 517-540 (1998) - [c11]Spiros Mancoridis, Brian S. Mitchell, Chris Rorres, Yih-Farn Chen, Emden R. Gansner:
Using Automatic Clustering to Produce High-Level System Organizations of Source Code. IWPC 1998: 45-52 - 1997
- [c10]Hoda Fahmy, Richard C. Holt, Spiros Mancoridis:
Repairing software style using graph grammars. CASCON 1997: 6 - 1996
- [b1]Spiros Mancoridis:
Controlling the interactions of architectural design components using scoping rules. University of Toronto, Canada, 1996 - [c9]Spiros Mancoridis, Richard C. Holt:
Recovering the Structure of Software Systems Using Tube Graph Interconnection Clustering. ICSM 1996: 23- - [c8]Spiros Mancoridis:
Toward a generic framework for computing subsystem interfaces. ISAW/Viewpoints@FSE 1996: 106-110 - 1994
- [c7]Spiros Mancoridis, Richard C. Holt, Michael W. Godfrey:
A Program Understanding Environment Based on the "Star" Approach to Tool Integration. ACM Conference on Computer Science 1994: 60-65 - [c6]Spiros Mancoridis:
Loosely integrating tools using the star system. CASCON 1994: 43 - [c5]Michael W. Godfrey, Richard C. Holt, Spiros Mancoridis:
Prototyping a Visual Formalism for System Modelling. ICSE Workshop on SE-HCI 1994: 211-224 - 1993
- [c4]Spiros Mancoridis, Richard C. Holt, David A. Penny:
A Conceptual Framework for Software Development. ACM Conference on Computer Science 1993: 74-80 - [c3]Spiros Mancoridis:
A multi-dimensional taxonomy of software development environments. CASCON 1993: 581-594 - [c2]Spiros Mancoridis, Richard C. Holt, David A. Penny:
A "curriculum-cycle" environment for teaching programming. SIGCSE 1993: 15-19 - 1992
- [c1]Richard C. Holt, David A. Penny, Spiros Mancoridis:
Multicolour programming and metamorphic programming: object oriented programming-in-the-large. CASCON 1992: 43-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint