Year |
Citation |
Score |
2020 |
Black P, Gondal I, Vamplew P, Lakhotia A. Function Similarity Using Family Context Electronics. 9: 1163. DOI: 10.3390/Electronics9071163 |
0.345 |
|
2013 |
Chouchane R, Stakhanova N, Walenstein A, Lakhotia A. Detecting machine-morphed malware variants via engine attribution Journal in Computer Virology. 9: 137-157. DOI: 10.1007/S11416-013-0183-6 |
0.396 |
|
2013 |
Lakhotia A, Walenstein A, Miles C, Singh A. VILO: A rapid learning nearest-neighbor classifier for malware triage Journal in Computer Virology. 9: 109-123. DOI: 10.1007/S11416-013-0178-3 |
0.478 |
|
2012 |
Miles C, Lakhotia A, Walenstein A. In situ reuse of logically extracted functional components Journal in Computer Virology. 8: 73-84. DOI: 10.1007/S11416-012-0167-Y |
0.358 |
|
2008 |
Chouchane MR, Walenstein A, Lakhotia A. Using markov chains to filter machine-morphed variants of malicious programs 3rd International Conference On Malicious and Unwanted Software, Malware 2008. 77-84. DOI: 10.1109/MALWARE.2008.4690861 |
0.72 |
|
2008 |
Walenstein A, Mathur R, Chouchane MR, Lakhotia A. Constructing malware normalizers using term rewriting Journal in Computer Virology. 4: 307-322. DOI: 10.1007/S11416-008-0081-5 |
0.715 |
|
2007 |
Chouchane MR, Walenstein A, Lakhotia A. Statistical signatures for fast filtering of instruction-substituting metamorphic malware Worm'07 - Proceedings of the 2007 Acm Workshop On Recurring Malcode. 31-37. DOI: 10.1145/1314389.1314397 |
0.679 |
|
2006 |
Chouchane MR, Lakhotia A. Using engine signature to detect metamorphic malware Proceedings of the 4th Acm Workshop On Recurring Malcode, Worm'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 73-78. DOI: 10.1145/1179542.1179558 |
0.69 |
|
2006 |
Walenstein A, Mathur R, Chouchane MR, Lakhotia A. Normalizing metamorphic malware using term rewriting Proceedings - Sixth Ieee International Workshop On Source Code Analysis and Manipulation, Scam 2006. 75-84. DOI: 10.1109/SCAM.2006.20 |
0.675 |
|
2006 |
Harman M, Lakhotia A, Binkley D. Theory and algorithms for slicing unstructured programs Information and Software Technology. 48: 549-565. DOI: 10.1016/J.Infsof.2005.06.001 |
0.394 |
|
2006 |
Karim ME, Parida L, Lakhotia A. Using permutation patterns for content-based phylogeny Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4146: 115-125. |
0.577 |
|
2005 |
Lakhotia A, Kumar EU, Venable M. A method for detecting obfuscated calls in malicious binaries Ieee Transactions On Software Engineering. 31: 955-967. DOI: 10.1109/Tse.2005.120 |
0.366 |
|
2005 |
Karim ME, Walenstein A, Lakhotia A, Parida L. Malware phylogeny generation using permutations of code Journal in Computer Virology. 1: 13-23. DOI: 10.1007/S11416-005-0002-9 |
0.323 |
|
2005 |
Venable M, Chouchane MR, Karim ME, Lakhotia A. Analyzing memory accesses in obfuscated x86 executables Lecture Notes in Computer Science. 3548: 1-18. |
0.677 |
|
2004 |
Walenstein A, Lakhotia A, Koschke R. The Second International Workshop on Detection of Software Clones: workshop report Acm Sigsoft Software Engineering Notes. 29: 1-5. DOI: 10.1145/979743.979752 |
0.307 |
|
2002 |
Singh PK, Lakhotia A. Analysis and detection of computer viruses and worms: an annotated bibliography Sigplan Notices. 37: 29-35. DOI: 10.1145/568600.568608 |
0.307 |
|
1998 |
Lakhotia A, Deprez JC. Restructuring programs by tucking statements into functions Information and Software Technology. 40: 677-689. DOI: 10.1016/S0950-5849(98)00091-3 |
0.648 |
|
1998 |
Chan TW, Lakhotia A. Debugging program failure exhibited by voluminous data Journal of Software Maintenance and Evolution. 10: 111-150. DOI: 10.1002/(Sici)1096-908X(199803/04)10:2<111::Aid-Smr167>3.0.Co;2-8 |
0.316 |
|
1997 |
Lakhotia A. A unified framework for expressing software subsystem classification techniques Journal of Systems and Software. 36: 211-231. DOI: 10.1016/0164-1212(95)00098-4 |
0.322 |
|
1994 |
Li J, Lakhotia A. Using mathematical induction in systematic program development International Journal of Software Engineering and Knowledge Engineering. 4: 561-574. DOI: 10.1142/S0218194094000271 |
0.406 |
|
1990 |
Lakhotia A, Sterling L. How to control unfolding when specializing interpreters New Generation Computing. 8: 61-70. DOI: 10.1007/Bf03037513 |
0.361 |
|
1988 |
Lakhotia A, Sterling L. Composing recursive logic programs with Clausal join New Generation Computing. 6: 211-225. DOI: 10.1007/Bf03037138 |
0.372 |
|
Show low-probability matches. |