default search action
Syed Shariyar Murtaza
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i2]Vanessa Liao, Syed Shariyar Murtaza, Yifan Nie, Jimmy Lin:
Regex-augmented Domain Transfer Topic Classification based on a Pre-trained Language Model: An application in Financial Domain. CoRR abs/2305.18324 (2023)
2010 – 2019
- 2018
- [j8]Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Chamseddine Talhi:
Combining heterogeneous anomaly detectors for improved software security. J. Syst. Softw. 137: 415-429 (2018) - [j7]Mayy Habayeb, Syed Shariyar Murtaza, Andriy V. Miranskyy, Ayse Basar Bener:
On the Use of Hidden Markov Model to Predict the Time to Fix Bugs. IEEE Trans. Software Eng. 44(12): 1224-1244 (2018) - [c18]Mayy Habayeb, Syed Shariyar Murtaza, Andriy V. Miranskyy, Ayse Basar Bener:
On the use of hidden Markov model to predict the time to fix bugs. ICSE 2018: 700 - 2016
- [j6]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Ayse Basar Bener:
Mining trends and patterns of software vulnerabilities. J. Syst. Softw. 117: 218-228 (2016) - [c17]Syed Shariyar Murtaza, Parisa Lak, Ayse Basar Bener, Armen Pischdotchian:
How to Effectively Train IBM Watson: Classroom Experience. HICSS 2016: 1663-1670 - [c16]Syed Shariyar Murtaza, Ayse Bener, Jeremy Petch, Muhammad Mamdani:
An empirical investigation of the evaluators' scoring of vendors' responses to an RFP of a large healthcare system. SEHS@ICSE 2016: 33-38 - 2015
- [j5]Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Abdelwahab Hamou-Lhadj:
Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System. IEEE Trans. Reliab. 64(1): 269-283 (2015) - [c15]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Stéphane Gagnon:
A trace abstraction approach for host-based anomaly detection. CISDA 2015: 1-8 - [c14]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Nazim H. Madhavji, Mechelle Gittens:
Towards an Emerging Theory for the Diagnosis of Faulty Functions in function-Call Traces. GTSE@ICSE 2015: 59-68 - [c13]Mayy Habayeb, Andriy V. Miranskyy, Syed Shariyar Murtaza, Leotis Buchanan, Ayse Bener:
The Firefox Temporal Defect Dataset. MSR 2015: 498-501 - 2014
- [j4]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Nazim H. Madhavji, Mechelle Gittens:
An empirical study on the use of mutant traces for diagnosis of faults in deployed systems. J. Syst. Softw. 90: 29-44 (2014) - [c12]Luay Alawneh, Abdelwahab Hamou-Lhadj, Syed Shariyar Murtaza, Yan Liu:
A contextual approach for effective recovery of inter-process communication patterns from HPC traces. CSMR-WCRE 2014: 274-282 - [c11]Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Wael Khreich, Mario Couture:
Total ADS: Automated Software Anomaly Detection System. SCAM 2014: 83-88 - 2013
- [c10]Shayan Eskandari, Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Mario Couture:
Monitoring system calls for anomaly detection in modern operating systems. ISSRE (Supplemental Proceedings) 2013: 19-20 - [c9]Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Mario Couture:
A host-based anomaly detection approach by representing system calls as states of kernel modules. ISSRE 2013: 431-440 - [c8]Abdelwahab Hamou-Lhadj, Syed Shariyar Murtaza, Waseem Fadel, Ali Mehrabian, Mario Couture, Raphaël Khoury:
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction. RACS 2013: 328-335 - 2012
- [j3]Andriy V. Miranskyy, Matthew Davison, R. Mark Reesor, Syed Shariyar Murtaza:
Using entropy measures for comparison of software traces. Inf. Sci. 203: 59-72 (2012) - [c7]Syed Shariyar Murtaza, Afroza Sultana, Abdelwahab Hamou-Lhadj, Mario Couture:
On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies. CSMR 2012: 127-136 - 2011
- [j2]Zude Li, Nazim H. Madhavji, Syed Shariyar Murtaza, Mechelle Gittens, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Characteristics of multiple-component defects and architectural hotspots: a large system case study. Empir. Softw. Eng. 16(5): 667-702 (2011) - [c6]Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Zude Li:
Diagnosing new faults using mutants and prior faults. ICSE 2011: 960-963 - 2010
- [j1]Zude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji:
A towards an extended relational algebra for software architecture. ACM SIGSOFT Softw. Eng. Notes 35(3): 1-4 (2010) - [c5]Syed Shariyar Murtaza, Mechelle Gittens, Zude Li, Nazim H. Madhavji:
F007: finding rediscovered faults from the field using function-level failed traces of software in the field. CASCON 2010: 57-71 - [i1]Andriy V. Miranskyy, Matthew Davison, Mark Reesor, Syed Shariyar Murtaza:
Using entropy measures for comparison of software traces. CoRR abs/1010.5537 (2010)
2000 – 2009
- 2009
- [c4]Zude Li, Mechelle Gittens, Syed Shariyar Murtaza, Nazim H. Madhavji, Andriy V. Miranskyy, David Godwin, Enzo Cialini:
Analysis of pervasive multiple-component defects in a large software system. ICSM 2009: 265-273 - 2008
- [c3]Syed Shariyar Murtaza, Mechelle Gittens, Nazim H. Madhavji:
Discovering the Fault Origin from Field Traces. ISSRE 2008: 295-296 - 2006
- [c2]Syed Shariyar Murtaza, Bilal Ahmed, Choong Seon Hong:
On the Dynamic Management of Information in Ubiquitous Systems Using Evolvable Software Components. APNOMS 2006: 513-516 - 2005
- [c1]Syed Shariyar Murtaza, Choong Seon Hong:
A Conceptual Architecture for the Uniform Identification of Objects. ACIS-ICIS 2005: 670-675
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint