Profiling user-trigger dependence for Android malware detection
Elish, Karim O., Shu, Xiaokui, Yao, Danfeng (Daphne), Ryder, Barbara G., Jiang, Xuxian
Published in Computers & security (01.03.2015)
Published in Computers & security (01.03.2015)
Get full text
Journal Article
Lightweight, Effective Detection and Characterization of Mobile Malware Families
Elish, Karim O., Elish, Mahmoud O., Almohri, Hussain M. J.
Published in IEEE transactions on computers (01.11.2022)
Published in IEEE transactions on computers (01.11.2022)
Get full text
Journal Article
A Classification of Refactoring Methods Based on Software Quality Attributes
Elish, Karim O., Alshayeb, Mohammad
Published in Arabian Journal for Science and Engineering (01.11.2011)
Published in Arabian Journal for Science and Engineering (01.11.2011)
Get full text
Journal Article
Machine Learning-Based Prediction of Prolonged Length of Stay in Newborns
Thompson, Brandon, Elish, Karim O., Steele, Robert
Published in 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA) (01.12.2018)
Published in 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA) (01.12.2018)
Get full text
Conference Proceeding
Identifying Android Malware Families Using Android-Oriented Metrics
Blanc, William, Hashem, Lina G., Elish, Karim O., Hussain Almohri, M. J.
Published in 2019 IEEE International Conference on Big Data (Big Data) (01.12.2019)
Published in 2019 IEEE International Conference on Big Data (Big Data) (01.12.2019)
Get full text
Conference Proceeding
Investigating the Effect of Refactoring on Software Testing Effort
Elish, K.O., Alshayeb, M.
Published in 2009 16th Asia-Pacific Software Engineering Conference (01.12.2009)
Published in 2009 16th Asia-Pacific Software Engineering Conference (01.12.2009)
Get full text
Conference Proceeding
Application of TreeNet in Predicting Object-Oriented Software Maintainability: A Comparative Study
Elish, M.O., Elish, K.O.
Published in 2009 13th European Conference on Software Maintenance and Reengineering (01.03.2009)
Published in 2009 13th European Conference on Software Maintenance and Reengineering (01.03.2009)
Get full text
Conference Proceeding
Device-based Isolation for Securing Cryptographic Keys
Elish, Karim O., Deng, Yipan, Yao, Danfeng (Daphne), Kafura, Dennis
Published in Procedia computer science (2013)
Published in Procedia computer science (2013)
Get full text
Journal Article
Identifying Mobile Inter-App Communication Risks
Elish, Karim O., Cai, Haipeng, Barton, Daniel, Yao, Danfeng, Ryder, Barbara G.
Published in IEEE transactions on mobile computing (01.01.2020)
Published in IEEE transactions on mobile computing (01.01.2020)
Get full text
Magazine Article
Enabling Smart Cities through V2X Communication
Aydin, Mert, Samarah, Mohammad, Elish, Karim O.
Published in 2018 IEEE 4th International Conference on Computer and Communications (ICCC) (01.12.2018)
Published in 2018 IEEE 4th International Conference on Computer and Communications (ICCC) (01.12.2018)
Get full text
Conference Proceeding
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks
Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Elish, Karim O., Ryder, Barbara G.
Published in 2017 IEEE Security and Privacy Workshops (SPW) (01.05.2017)
Published in 2017 IEEE Security and Privacy Workshops (SPW) (01.05.2017)
Get full text
Conference Proceeding
High Precision Screening for Android Malware with Dimensionality Reduction
Wolfe, Britton, Elish, Karim, Danfeng Yao
Published in 2014 13th International Conference on Machine Learning and Applications (01.12.2014)
Published in 2014 13th International Conference on Machine Learning and Applications (01.12.2014)
Get full text
Conference Proceeding
BetterChoice: A migraine drug recommendation system based on Neo4J
Stark, Benjamin, Knahl, Constanze, Aydin, Mert, Samarah, Mohammad, Elish, Karim O.
Published in 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA) (01.09.2017)
Published in 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA) (01.09.2017)
Get full text
Conference Proceeding