Year |
Citation |
Score |
2018 |
Haq IU, Chica S, Caballero J, Jha S. Malware lineage in the wild Computers & Security. 78: 347-363. DOI: 10.1016/J.Cose.2018.07.012 |
0.336 |
|
2016 |
Octeau D, Luchaup D, Jha S, McDaniel P. Composite Constant Propagation and its Application to Android Program Analysis Ieee Transactions On Software Engineering. 42: 999-1014. DOI: 10.1109/Tse.2016.2550446 |
0.697 |
|
2013 |
Franz M, Deiseroth B, Hamacher K, Jha S, Katzenbeisser S, SchröDer H. Secure computations on non-integer values with applications to privacy-preserving sequence analysis Information Security Technical Report. 17: 117-128. DOI: 10.1016/J.Istr.2012.10.001 |
0.407 |
|
2011 |
Luchaup D, Smith R, Estan C, Jha S. Speculative parallel pattern matching Ieee Transactions On Information Forensics and Security. 6: 438-451. DOI: 10.1109/Tifs.2011.2112647 |
0.701 |
|
2010 |
Jha S, Katzenbeisser S, Schallhart C, Veith H, Chenney S. Semantic integrity in large-scale online simulations Acm Transactions On Internet Technology. 10: 2. DOI: 10.1145/1667067.1667069 |
0.323 |
|
2008 |
Preda MD, Christodorescu M, Jha S, Debray S. A semantics-based approach to malware detection Acm Transactions On Programming Languages and Systems. 30: 25. DOI: 10.1145/1387673.1387674 |
0.691 |
|
2008 |
Brumley D, Newsome J, Song D, Wang H, Jha S. Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241. DOI: 10.1109/Tdsc.2008.55 |
0.437 |
|
2008 |
Jha S, Li N, Tripunitara M, Wang Q, Winsborough WH. Toward formal verification of role-based access control policies Ieee Transactions On Dependable and Secure Computing. 5: 242-255. DOI: 10.1109/Tdsc.2007.70225 |
0.373 |
|
2007 |
Christodorescu M, Jha S, Kinder J, Katzenbeisser S, Veith H. Software transformations to improve malware detection Journal in Computer Virology. 3: 253-265. DOI: 10.1007/S11416-007-0059-8 |
0.671 |
|
2005 |
Chaki S, Clarke E, Jha S, Veith H. An Iterative Framework for Simulation Conformance Journal of Logic and Computation. 15: 465-488. DOI: 10.1093/Logcom/Exi028 |
0.632 |
|
2004 |
Jha S, Reps T. Model checking SPKI/SDSI Journal of Computer Security. 12: 317-353. DOI: 10.3233/Jcs-2004-123-402 |
0.37 |
|
2004 |
Chaki S, Clarke EM, Groce A, Jha S, Veith H. Modular verification of software components in C Ieee Transactions On Software Engineering. 30: 388-402. DOI: 10.1109/Tse.2004.22 |
0.727 |
|
2003 |
Clarke E, Grumberg O, Jha S, Lu Y, Veith H. Counterexample-guided abstraction refinement for symbolic model checking Journal of the Acm (Jacm). 50: 752-794. DOI: 10.1145/876638.876643 |
0.639 |
|
2001 |
Chauhan P, Clarke EM, Jha S, Kukula JH, Veith H, Wang D. Using Combinatorial Optimization Methods for Quantification Scheduling Lecture Notes in Computer Science. 293-309. DOI: 10.1007/3-540-44798-9_24 |
0.615 |
|
2001 |
Clarke EM, Grumberg O, Jha S, Lu Y, Veith H. Progress on the State Explosion Problem in Model Checking Lecture Notes in Computer Science. 176-194. DOI: 10.1007/3-540-44577-3_12 |
0.608 |
|
2000 |
Clarke EM, Jha S, Marrero W. Verifying security protocols with Brutus Acm Transactions On Software Engineering and Methodology. 9: 443-487. DOI: 10.1145/363516.363528 |
0.591 |
|
1999 |
Clarke EM, Jha S, Lu Y, Wang D. Abstract BDDs: A Technque for Using Abstraction in Model Checking Lecture Notes in Computer Science. 172-186. DOI: 10.1007/3-540-48153-2_14 |
0.609 |
|
1998 |
Chalasani P, Jha S, Varikooty A. Accurate approximations for European-style Asian options Journal of Computational Finance. 1: 11-30. DOI: 10.21314/Jcf.1998.017 |
0.349 |
|
1998 |
Jackson D, Jha S, Damon CA. Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications Acm Transactions On Programming Languages and Systems. 20: 302-343. DOI: 10.1145/276393.276396 |
0.344 |
|
1998 |
Dingel J, Garlan D, Jha S, Notkin D. Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning Formal Aspects of Computing. 10: 193-213. DOI: 10.1007/S001650050011 |
0.371 |
|
1997 |
Clarke EM, Grumberg O, Jha S. Verifying parameterized networks Acm Transactions On Programming Languages and Systems. 19: 726-750. DOI: 10.1145/265943.265960 |
0.57 |
|
1991 |
Pardalos PM, Jha S. Graph separation techniques for quadratic zero-one programming Computers and Mathematics With Applications. 21: 107-113. DOI: 10.1016/0898-1221(91)90165-Z |
0.334 |
|
Show low-probability matches. |