Predictive models in software engineering: Challenges and opportunities
Predictive models are one of the most important techniques that are widely applied in many
areas of software engineering. There have been a large number of primary studies that …
areas of software engineering. There have been a large number of primary studies that …
Deep learning methods for malware and intrusion detection: A systematic literature review
Android and Windows are the predominant operating systems used in mobile environment
and personal computers and it is expected that their use will rise during the next decade …
and personal computers and it is expected that their use will rise during the next decade …
“Leagile” software development: An experience report analysis of the application of lean approaches in agile software development
In recent years there has been a noticeable shift in attention from those who use agile
software development toward lean software development, often labelled as a shift “from …
software development toward lean software development, often labelled as a shift “from …
[HTML][HTML] Explainable malware detection system using transformers-based transfer learning and multi-model visual representation
Android has become the leading mobile ecosystem because of its accessibility and
adaptability. It has also become the primary target of widespread malicious apps. This …
adaptability. It has also become the primary target of widespread malicious apps. This …
Effective, Platform-Independent GUI Testing via Image Embedding and Reinforcement Learning
Software applications (apps) have been playing an increasingly important role in various
aspects of society. In particular, mobile apps and web apps are the most prevalent among all …
aspects of society. In particular, mobile apps and web apps are the most prevalent among all …
Malbert: Using transformers for cybersecurity and malicious software detection
In recent years we have witnessed an increase in cyber threats and malicious software
attacks on different platforms with important consequences to persons and businesses. It …
attacks on different platforms with important consequences to persons and businesses. It …
A systematic overview of android malware detection
Due to the completely open-source nature of Android, the exploitable vulnerability of
malware attacks is increasing. To stay ahead of other similar review work attempting to deal …
malware attacks is increasing. To stay ahead of other similar review work attempting to deal …
Malbert: Malware detection using bidirectional encoder representations from transformers
In recent years we have witnessed an increase in cyber threats and malicious software
attacks on different platforms with important consequences to persons and businesses. It …
attacks on different platforms with important consequences to persons and businesses. It …
Androct: ten years of app call traces in android
Data-driven approaches have proven to be promising in mobile software analysis, yet these
approaches rely on sizable and quality datasets. For Android app analysis in particular …
approaches rely on sizable and quality datasets. For Android app analysis in particular …
Mixed signals: Analyzing software attribution challenges in the android ecosystem
The ability to identify the author responsible for a given software object is critical for many
research studies and for enhancing software transparency and accountability. However, as …
research studies and for enhancing software transparency and accountability. However, as …