Sam Malek
Affiliations: | George Mason University, Washington, DC |
Area:
Computer ScienceGoogle:
"Sam Malek"Parents
Sign in to add mentorNenad Medvidovic | grad student | 2007 | USC (Philosophy Tree) | |
(A User-Centric Approach for Improving a Distributed Software System’s Deployment Architecture) |
Children
Sign in to add traineeAhmed Elkhodary | grad student | 2012 | George Mason |
Naeem Esfahani | grad student | 2014 | George Mason |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Hammad M, Bagheri H, Malek S. (2019) DelDroid: An automated approach for determination and enforcement of least-privilege architecture in android Journal of Systems and Software. 149: 83-100 |
Garcia J, Hammad M, Malek S. (2018) Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware Acm Transactions On Software Engineering and Methodology. 26: 11 |
Bagheri H, Kang E, Malek S, et al. (2018) A formal approach for detection of security flaws in the android permission system Formal Aspects of Computing. 30: 525-544 |
Sadeghi A, Esfahani N, Malek S. (2017) Ensuring the Consistency of Adaptation through Inter- and Intra-Component Dependency Analysis Acm Transactions On Software Engineering and Methodology. 26: 2 |
Sadeghi A, Bagheri H, Garcia J, et al. (2017) A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software Ieee Transactions On Software Engineering. 43: 492-530 |
Weyns D, Bencomo N, Calinescu R, et al. (2017) Perpetual assurances for self-adaptive systems Lecture Notes in Computer Science. 31-63 |
Esfahani N, Yuan E, Canavera KR, et al. (2016) Inferring software component interaction dependencies for adaptation support Acm Transactions On Autonomous and Adaptive Systems. 10 |
Yuan E, Malek S. (2016) Mining software component interactions to detect security threats at the architectural level Proceedings - 2016 13th Working Ieee/Ifip Conference On Software Architecture, Wicsa 2016. 211-220 |
Bagheri H, Garcia J, Sadeghi A, et al. (2016) Software architectural principles in contemporary mobile software: from conception to practice Journal of Systems and Software. 119: 31-44 |
Bagheri H, Sadeghi A, Garcia J, et al. (2015) COVERT: Compositional Analysis of Android Inter-App Permission Leakage Ieee Transactions On Software Engineering. 41: 866-886 |