Akbar Siami Namin
Citée par
Citée par
Using mutation analysis for assessing and comparing testing coverage criteria
JH Andrews, LC Briand, Y Labiche, AS Namin
IEEE Transactions on Software Engineering 32 (8), 608-624, 2006
Sufficient mutation operators for measuring test effectiveness
AS Namin, J Andrews, D Murdoch
2008 ACM/IEEE 30th International Conference on Software Engineering, 351-360, 2008
The influence of size and coverage on test suite effectiveness
AS Namin, JH Andrews
Proceedings of the eighteenth international symposium on Software testing …, 2009
A comparison of ARIMA and LSTM in forecasting time series
S Siami-Namini, N Tavakoli, AS Namin
2018 17th IEEE International Conference on Machine Learning and Applications …, 2018
Forecasting economics and financial time series: ARIMA vs. LSTM
S Siami-Namini, AS Namin
arXiv preprint arXiv:1803.06386, 2018
The use of mutation in testing experiments and its sensitivity to external threats
AS Namin, S Kakarla
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
Finding sufficient mutation operators via variable reduction
AS Namin, JH Andrews
Second Workshop on Mutation Analysis (Mutation 2006-ISSRE Workshops 2006), 5-5, 2006
Predicting vulnerable software components through n-gram analysis and statistical feature selection
Y Pang, X Xue, AS Namin
2015 IEEE 14th International Conference on Machine Learning and Applications …, 2015
The performance of LSTM and BiLSTM in forecasting time series
S Siami-Namini, N Tavakoli, AS Namin
2019 IEEE International Conference on Big Data (Big Data), 3285-3292, 2019
A survey on the moving target defense strategies: An architectural perspective
J Zheng, AS Namin
Journal of Computer Science and Technology 34 (1), 207-233, 2019
Trimming test suites with coincidentally correct test cases for enhancing fault localizations
X Xue, Y Pang, AS Namin
2014 IEEE 38th Annual Computer Software and Applications Conference, 239-244, 2014
Prioritizing mutation operators based on importance sampling
M Sridharan, AS Namin
2010 IEEE 21st International Symposium on Software Reliability Engineering …, 2010
On sufficiency of mutants
AS Namin, JH Andrews
29th International Conference on Software Engineering (ICSE'07 Companion), 73-74, 2007
Identifying effective test cases through k-means clustering for enhancing regression testing
Y Pang, X Xue, AS Namin
2013 12th International Conference on Machine Learning and Applications 2, 78-83, 2013
The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals
KS Jones, AS Namin, ME Armstrong
ACM Transactions on Computing Education (TOCE) 18 (3), 1-12, 2018
Can machine/deep learning classifiers detect zero-day malware with high accuracy?
F Abri, S Siami-Namini, MA Khanghah, FM Soltani, AS Namin
2019 IEEE international conference on big data (Big Data), 3252-3259, 2019
MuRanker: a mutant ranking tool
AS Namin, X Xue, O Rosas, P Sharma
Software Testing, Verification and Reliability 25 (5-7), 572-604, 2015
Detecting phishing websites through deep reinforcement learning
M Chatterjee, AS Namin
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019
Internet use and cybersecurity concerns of individuals with visual impairments
FA Inan, AS Namin, RL Pogrund, KS Jones
Journal of Educational Technology & Society 19 (1), 28-40, 2016
How significant is the effect of fault interactions on coverage-based fault localizations?
X Xue, AS Namin
2013 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20