Follow
Karim Elish, Ph.D., SMIEEE
Karim Elish, Ph.D., SMIEEE
Associate Professor of Computer Science, Florida Polytechnic University
Verified email at floridapoly.edu - Homepage
Title
Cited by
Cited by
Year
Predicting defect-prone software modules using support vector machines
KO Elish, MO Elish
Journal of Systems and Software, Elsevier 81 (5), 649-660, 2008
6852008
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security, Elsevier Journal 49, 255-273, 2015
1542015
Application of treenet in predicting object-oriented software maintainability: A comparative study
MO Elish, KO Elish
IEEE European Conference on Software Maintenance and Reengineering, 69-78, 2009
1222009
On the need of precise inter-app ICC classification for detecting Android malware collusions
KO Elish, D Yao, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2015
782015
User-centric dependence analysis for identifying malicious mobile apps
KO Elish, D Yao, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2012
582012
A classification of refactoring methods based on software quality attributes
KO Elish, M Alshayeb
Arabian Journal for Science and Engineering, Springer 36 (7), 1253-1267, 2011
582011
A Literature Review on Medicine Recommender Systems
B Stark, C Knahl, M Aydin, K Elish
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
552019
Identifying Mobile Inter-App Communication Risks
K Elish, H Cai, D Barton, D Yao, B Ryder
IEEE Transactions on Mobile Computing, 2020
422020
MR-Droid: A scalable and prioritized analysis of inter-app communication risks
F Liu, H Cai, G Wang, DD Yao, KO Elish, BG Ryder
IEEE Mobile Security Technologies (MoST), in conjunction with IEEE S&P, 2017
382017
Using Software Quality Attributes to Classify Refactoring to Patterns.
KO Elish, M Alshayeb
Journal of Software 7 (2), 408-419, 2012
372012
Comprehensive Behavior Profiling for Proactive Android Malware Detection
B Wolfe, KO Elish, DD Yao
17th International Information Security Conference, Springer, 2014
342014
Machine Learning-based Prediction of Prolonged Length of Stay in Newborns
B Thompson, KO Elish, R Steele
IEEE International Conference on Machine Learning and Applications (ICMLA), 2018
322018
Investigating the Effect of Refactoring on Software Testing Effort
KO Elish, M Alshayeb
IEEE Asia-Pacific Software Engineering Conference, APSEC, 29-34, 2009
312009
A Static Assurance Analysis of Android Applications
KO Elish, DD Yao, BG Ryder, X Jiang
Technical Report TR-13-03, Computer Science, Virginia Tech, 2013
302013
High Precision Screening for Android Malware with Dimensionality Reduction
B Wolfe, K Elish, D Yao
IEEE International Conference on Machine Learning and Applications (ICMLA), 2014
242014
BetterChoice: A Migraine Drug Recommendation System Based on Neo4J
B Stark, C Knahl, M Aydin, M Samarah, K Elish
IEEE International Conference on Computational Intelligence and Applications …, 2017
232017
Identifying Android Malware Families Using Android-Oriented Metrics
W Blanc, L Hashem, K Elish, H Almohri
IEEE International Conference on Big Data, 2019
152019
A Survey on Connected Vehicles Vulnerabilities and Countermeasures
C Riggs, CE Rigaud, R Beard, T Douglas, K Elish
Journal of Traffic and Logistics Engineering 6 (1), 2018
142018
Lightweight, effective detection and characterization of mobile malware families
KO Elish, MO Elish, HMJ Almohri
IEEE Transactions on Computers 71 (11), 2982-2995, 2022
72022
An Empirical Comparison of Resampling Ensemble Methods of Deep Learning Neural Networks for Cross-Project Software Defect Prediction
MO Elish, K Elish
International Journal of Intelligent Engineering and Systems 14 (3), 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20