Karim Elish
Karim Elish
Assistant Professor of Computer Science, Florida Polytechnic University
Verified email at floridapoly.edu - Homepage
Title
Cited by
Cited by
Year
Predicting defect-prone software modules using support vector machines
KO Elish, MO Elish
Journal of Systems and Software, Elsevier 81 (5), 649-660, 2008
5322008
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security, Elsevier Journal 49, 255-273, 2015
1182015
Application of treenet in predicting object-oriented software maintainability: A comparative study
MO Elish, KO Elish
IEEE European Conference on Software Maintenance and Reengineering, 69-78, 2009
962009
On the need of precise inter-app ICC classification for detecting Android malware collusions
KO Elish, D Yao, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2015
702015
User-centric dependence analysis for identifying malicious mobile apps
KO Elish, D Yao, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2012
592012
A classification of refactoring methods based on software quality attributes
KO Elish, M Alshayeb
Arabian Journal for Science and Engineering, Springer 36 (7), 1253-1267, 2011
382011
A Static Assurance Analysis of Android Applications
KO Elish, DD Yao, BG Ryder, X Jiang
Technical Report TR-13-03, Computer Science, Virginia Tech, 2013
342013
Comprehensive Behavior Profiling for Proactive Android Malware Detection
B Wolfe, KO Elish, DD Yao
17th International Information Security Conference, Springer, 2014
282014
Using Software Quality Attributes to Classify Refactoring to Patterns.
KO Elish, M Alshayeb
Journal of Software 7 (2), 408-419, 2012
282012
MR-Droid: A scalable and prioritized analysis of inter-app communication risks
F Liu, H Cai, G Wang, DD Yao, KO Elish, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2017
272017
Identifying Mobile Inter-App Communication Risks
K Elish, H Cai, D Barton, D Yao, B Ryder
IEEE Transactions on Mobile Computing, 2020
202020
High Precision Screening for Android Malware with Dimensionality Reduction
B Wolfe, K Elish, D Yao
IEEE International Conference on Machine Learning and Applications (ICMLA), 2014
192014
Investigating the Effect of Refactoring on Software Testing Effort
KO Elish, M Alshayeb
IEEE Asia-Pacific Software Engineering Conference, APSEC, 29-34, 2009
192009
Machine Learning-based Prediction of Prolonged Length of Stay in Newborns
B Thompson, KO Elish, R Steele
IEEE International Conference on Machine Learning and Applications (ICMLA), 2018
92018
BetterChoice: A Migraine Drug Recommendation System Based on Neo4J
B Stark, C Knahl, M Aydin, M Samarah, K Elish
IEEE International Conference on Computational Intelligence and Applications …, 2017
82017
A Literature Review on Medicine Recommender Systems
B Stark, C Knahl, M Aydin, K Elish
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
62019
Identifying Android Malware Families Using Android-Oriented Metrics
W Blanc, L Hashem, K Elish, H Almohri
IEEE International Conference on Big Data, 2019
42019
A Survey on Connected Vehicles Vulnerabilities and Countermeasures
C Riggs, CE Rigaud, R Beard, T Douglas, K Elish
Journal of Traffic and Logistics Engineering 6 (1), 2018
42018
Prioritized Analysis of Inter-App Communication Risks
F Liu, H Cai, G Wang, DD Yao, KO Elish, BG Ryder
ACM on Conference on Data and Application Security and Privacy (CODASPY …, 2017
32017
Device-based isolation for securing cryptographic keys
KO Elish, Y Deng, DD Yao, D Kafura
Procedia Computer Science, Elsevier 19, 1130-1135, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20