Search the dblp DataBase
Arun Lakhotia :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael Venable , Mohamed R. Chouchane , Md. Enamul Karim , Arun Lakhotia Analyzing Memory Accesses in Obfuscated x86 Executables. [Citation Graph (0, 0)][DBLP ] DIMVA, 2005, pp:1-18 [Conf ] Prabhat K. Singh , Arun Lakhotia Static Verification of Worm and virus Behavior in binary Executables using Model Checking. [Citation Graph (0, 0)][DBLP ] IAW, 2003, pp:298-300 [Conf ] Leon Sterling , Arun Lakhotia Composing Prolog Meta-Interpreters. [Citation Graph (0, 0)][DBLP ] ICLP/SLP, 1988, pp:386-403 [Conf ] Arun Lakhotia Rule-Based Approach to Computing Module Cohesion. [Citation Graph (0, 0)][DBLP ] ICSE, 1993, pp:35-44 [Conf ] Jean-Christophe Deprez , Arun Lakhotia A Formalism to Automate Mapping from Program Features to Code. [Citation Graph (0, 0)][DBLP ] IWPC, 2000, pp:69-78 [Conf ] Arun Lakhotia DIME: A Direct Manipulation Environment for Evolutionary Development of Software. [Citation Graph (0, 0)][DBLP ] IWPC, 1998, pp:72-0 [Conf ] Arun Lakhotia , Junwei Li , Andrew Walenstein , Yun Yang Towards a Clone Detection Benchmark Suite and Results Archive. [Citation Graph (0, 0)][DBLP ] IWPC, 2003, pp:285-0 [Conf ] Arun Lakhotia Constructing Call Multigraphs Using Dependence Graphs. [Citation Graph (0, 0)][DBLP ] POPL, 1993, pp:273-284 [Conf ] Andrew Walenstein , Rachit Mathur , Mohamed R. Chouchane , Arun Lakhotia Normalizing Metamorphic Malware Using Term Rewriting. [Citation Graph (0, 0)][DBLP ] SCAM, 2006, pp:75-84 [Conf ] Arun Lakhotia , Eric Uday Kumar Abstracting Stack to Detect Obfuscated Calls in Binaries. [Citation Graph (0, 0)][DBLP ] SCAM, 2004, pp:17-26 [Conf ] Arun Lakhotia , Leon Sterling Program Development by Stepwise 'Enhancement'. [Citation Graph (0, 0)][DBLP ] SEKE, 1990, pp:78-83 [Conf ] Arun Lakhotia Incorporating `Programming Techniques' into Prolog Programs. [Citation Graph (0, 0)][DBLP ] NACLP, 1989, pp:426-440 [Conf ] John M. Gravley , Arun Lakhotia Identifying Enumeration Types Modeled with Symbolic Constants. [Citation Graph (0, 0)][DBLP ] WCRE, 1996, pp:227-0 [Conf ] Arun Lakhotia , Jean-Christophe Deprez Restructuring Functions with Low Cohesion. [Citation Graph (0, 0)][DBLP ] WCRE, 1999, pp:36-46 [Conf ] Arun Lakhotia , John M. Gravley Toward Experimental Evaluation of Subsystem Classification Recovery Techniques. [Citation Graph (0, 0)][DBLP ] WCRE, 1995, pp:262-269 [Conf ] Arun Lakhotia , Moinuddin Mohammed Imposing Order on Program Statements to Assist Anti-Virus Scanners. [Citation Graph (0, 0)][DBLP ] WCRE, 2004, pp:161-170 [Conf ] Arun Lakhotia , Prashant Pathak Virus Analysis: Techniques, Tools, and Research Issues. [Citation Graph (0, 0)][DBLP ] WCRE, 2004, pp:2- [Conf ] Arun Lakhotia , Andrew Walenstein , Rainer Koschke Second International Workshop on Detection of Software Clones. [Citation Graph (0, 0)][DBLP ] WCRE, 2003, pp:368- [Conf ] Andrew Walenstein , Nitin Jyoti , Junwei Li , Yun Yang , Arun Lakhotia Problems Creating Task-relevant Clone Detection Reference Data. [Citation Graph (0, 0)][DBLP ] WCRE, 2003, pp:285-295 [Conf ] Md. Enamul Karim , Laxmi Parida , Arun Lakhotia Using Permutation Patterns for Content-Based Phylogeny. [Citation Graph (0, 0)][DBLP ] PRIB, 2006, pp:115-125 [Conf ] Mohamed R. Chouchane , Arun Lakhotia Using engine signature to detect metamorphic malware. [Citation Graph (0, 0)][DBLP ] WORM, 2006, pp:73-78 [Conf ] Mark Harman , Arun Lakhotia , David Binkley Theory and algorithms for slicing unstructured programs. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2006, v:48, n:7, pp:549-565 [Journal ] Arun Lakhotia , Jean-Christophe Deprez Restructuring programs by tucking statements into functions. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 1998, v:40, n:11-12, pp:677-689 [Journal ] Arun Lakhotia Understanding someone else's code: Analysis of experiences. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1993, v:23, n:3, pp:269-275 [Journal ] Arun Lakhotia A Unified Framework For Expressing Software Subsystem Classification Techniques. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1997, v:36, n:3, pp:211-231 [Journal ] Arun Lakhotia , Leon Sterling Composing Recursive Logic Programs with Clausal Join. [Citation Graph (0, 0)][DBLP ] New Generation Comput., 1988, v:6, n:2&3, pp:211-225 [Journal ] Arun Lakhotia , Leon Sterling How to Control Unfolding when Specializing Interpreters. [Citation Graph (0, 0)][DBLP ] New Generation Comput., 1990, v:8, n:1, pp:61-70 [Journal ] Arun Lakhotia Implication and Equivalence I/O. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1985, v:19, n:1, pp:46-52 [Journal ] Prabhat K. Singh , Arun Lakhotia Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography. [Citation Graph (0, 0)][DBLP ] SIGPLAN Notices, 2002, v:37, n:2, pp:29-35 [Journal ] Jagadeesh Nandigam , Arun Lakhotia , Claude G. Cech Experimental Evaluation of Agreement among Programmers in Applying the Rules of Cohesion. [Citation Graph (0, 0)][DBLP ] Journal of Software Maintenance, 1999, v:11, n:1, pp:35-53 [Journal ] Tat W. Chan , Arun Lakhotia Debugging program failure exhibited by voluminous data. [Citation Graph (0, 0)][DBLP ] Journal of Software Maintenance, 1998, v:10, n:2, pp:111-150 [Journal ] Arun Lakhotia , Eric Uday Kumar , Michael Venable A Method for Detecting Obfuscated Calls in Malicious Binaries. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2005, v:31, n:11, pp:955-968 [Journal ] Md. Enamul Karim , Andrew Walenstein , Arun Lakhotia , Laxmi Parida Malware phylogeny generation using permutations of code. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2005, v:1, n:1-2, pp:13-23 [Journal ] The Software Similarity Problem in Malware Analysis. [Citation Graph (, )][DBLP ] Context-sensitive analysis of obfuscated x86 executables. [Citation Graph (, )][DBLP ] A User Interface for Exploiting Web Communities in Searching the Web. [Citation Graph (, )][DBLP ] Unmanned Vehicles Come of Age: The DARPA Grand Challenge. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.008secs