default search action
Wes Masri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Ahmad Mustapha, Wael Khreich, Wes Masri:
Inter-model interpretability: Self-supervised models as a case study. Array 22: 100350 (2024) - 2021
- [j20]Rawad Abou Assi, Wes Masri, Chadi Trad:
How detrimental is coincidental correctness to coverage-based fault detection and localization? An empirical study. Softw. Test. Verification Reliab. 31(5) (2021) - 2020
- [c21]Rawad Abou Assi, Wes Masri, Chadi Trad:
Substate Profiling for Enhanced Fault Detection and Localization: An Empirical Study. ICST 2020: 16-27
2010 – 2019
- 2019
- [j19]Rawad Abou Assi, Chadi Trad, Marwan Maalouf, Wes Masri:
Coincidental correctness in the Defects4J benchmark. Softw. Test. Verification Reliab. 29(3) (2019) - 2018
- [c20]Rawad Abou Assi, Wes Masri, Chadi Trad:
Substate Profiling for Effective Test Suite Reduction. ISSRE 2018: 123-134 - [c19]Chadi Trad, Rawad Abou Assi, Wes Masri, Fadi A. Zaraket:
CFAAR: Control Flow Alteration to Assist Repair. ISSRE Workshops 2018: 208-215 - [i6]Chadi Trad, Rawad Abou Assi, Wes Masri:
Substate Profiling for Effective Test Suite Reduction. CoRR abs/1808.08174 (2018) - [i5]Chadi Trad, Rawad Abou Assi, Wes Masri, Fadi A. Zaraket:
CFAAR: Control Flow Alteration to Assist Repair. CoRR abs/1808.09229 (2018) - [i4]Rawad Abou Assi, Wes Masri, Marwan Maalouf, Chadi Trad:
Is Unit Testing Immune to Coincidental Correctness? CoRR abs/1808.09233 (2018) - 2017
- [j18]Dalal Hammoud, Fadi A. Zaraket, Wes Masri:
GUICop: Approach and toolset for specification-based GUI testing. Softw. Test. Verification Reliab. 27(8) (2017) - [i3]Rawad Abou Assi, Chadi Trad, Wes Masri:
ACDC: Altering Control Dependence Chains for Automated Patch Generation. CoRR abs/1705.00811 (2017) - 2016
- [j17]Wes Masri, Fadi A. Zaraket:
Coverage-Based Software Testing: Beyond Basic Test Requirements. Adv. Comput. 103: 79-142 (2016) - [j16]Rawad Abou Assi, Wes Masri, Fadi A. Zaraket:
UCov: a user-defined coverage criterion for test case intent verification. Softw. Test. Verification Reliab. 26(6): 460-491 (2016) - [i2]Dalal Hammoud, Fadi A. Zaraket, Wes Masri:
GUICop: Approach and Toolset for Specification-based GUI Testing. CoRR abs/1607.01723 (2016) - 2015
- [j15]Wes Masri:
Automated Fault Localization: Advances and Challenges. Adv. Comput. 99: 103-156 (2015) - [j14]Wes Masri, Sam Sleiman:
SQLPIL: SQL injection prevention by input labeling. Secur. Commun. Networks 8(15): 2545-2560 (2015) - [j13]Kassem Fawaz, Fadi A. Zaraket, Wes Masri, Hamza Harkous:
PBCOV: a property-based coverage criterion. Softw. Qual. J. 23(1): 171-202 (2015) - [j12]Joan Farjo, Rawad Abou Assi, Wes Masri:
Reducing execution profiles: techniques and benefits. Softw. Test. Verification Reliab. 25(2): 115-137 (2015) - 2014
- [j11]Wes Masri, Rawad Abou Assi, Marwa El-Ghali:
Generating profile-based signatures for online intrusion and failure detection. Inf. Softw. Technol. 56(2): 238-251 (2014) - [j10]Wes Masri, Rawad Abou Assi:
Prevalence of coincidental correctness and mitigation of its impact on fault localization. ACM Trans. Softw. Eng. Methodol. 23(1): 8:1-8:28 (2014) - [c18]Rawad Abou Assi, Wes Masri:
Lossless Reduction of Execution Profiles Using a Genetic Algorithm. ICST Workshops 2014: 294-297 - [c17]Joan Farjo, Wes Masri:
Weighted Execution Profiles for Software Testing. ICST Workshops 2014: 298-301 - [c16]Wes Masri, James Daou, Rawad Abou Assi:
State Profiling of Internal Variables. ICST Workshops 2014: 332-335 - [i1]Rawad Abou Assi, Fadi A. Zaraket, Wes Masri:
UCov: a User-Defined Coverage Criterion for Test Case Intent Verification. CoRR abs/1407.3091 (2014) - 2013
- [c15]Joan Farjo, Wes Masri, Hazem M. Hajj:
Isolating failing test cases: A comparative experimental study of clustering techniques. ICCIT 2013: 73-77 - [c14]Elie Shaccour, Fadi A. Zaraket, Wes Masri:
Coverage Specification for Test Case Intent Preservation in Regression Suites. ICST Workshops 2013: 392-395 - [c13]Joan Farjo, Rawad Abou Assi, Wes Masri, Fadi A. Zaraket:
Does Principal Component Analysis Improve Cluster-Based Analysis? ICST Workshops 2013: 400-403 - 2012
- [j9]Walid J. Ghandour, Haitham Akkary, Wes Masri:
Leveraging Strength-Based Dynamic Information Flow Analysis to Enhance Data Value Prediction. ACM Trans. Archit. Code Optim. 9(1): 1:1-1:33 (2012) - [c12]Wes Masri, Rawad Abou Assi, Fadi A. Zaraket, Nour Fatairi:
Enhancing Fault Localization via Multivariate Visualization. ICST 2012: 737-741 - [c11]Fadi A. Zaraket, Wes Masri, Marc Adam, Dalal Hammoud, Raghd Hamzeh, Raja Farhat, Elie Khamissi, Joseph Noujaim:
GUICOP: Specification-Based GUI Testing. ICST 2012: 747-751 - 2011
- [j8]Wes Masri, Hiba Halabi:
An algorithm for capturing variables dependences in test suites. J. Syst. Softw. 84(7): 1171-1190 (2011) - [c10]Rawad Abou Assi, Wes Masri:
Identifying Failure-Correlated Dependence Chains. ICST Workshops 2011: 607-616 - 2010
- [j7]Wes Masri:
Fault localization based on information flow coverage. Softw. Test. Verification Reliab. 20(2): 121-147 (2010) - [c9]Walid J. Ghandour, Haitham Akkary, Wes Masri:
The potential of using dynamic information flow analysis in data value prediction. PACT 2010: 431-442 - [c8]Wes Masri, Rawad Abou Assi:
Cleansing Test Suites from Coincidental Correctness to Enhance Fault-Localization. ICST 2010: 165-174
2000 – 2009
- 2009
- [j6]Wes Masri, Andy Podgurski:
Algorithms and tool support for dynamic information flow analysis. Inf. Softw. Technol. 51(2): 385-404 (2009) - [j5]Wes Masri, Andy Podgurski:
Measuring the strength of information flows in programs. ACM Trans. Softw. Eng. Methodol. 19(2): 5:1-5:33 (2009) - [c7]Marwa El-Ghali, Wes Masri:
Intrusion detection using signatures extracted from execution profiles. SESS@ICSE 2009: 17-24 - [c6]Wes Masri, Marwa El-Ghali:
Test case filtering and prioritization based on coverage of combinations of program elements. WODA 2009: 29-34 - 2008
- [j4]Wes Masri, Andy Podgurski:
Application-based anomaly intrusion detection with dynamic information flow analysis. Comput. Secur. 27(5-6): 176-187 (2008) - [j3]Wes Masri:
Exploiting the empirical characteristics of program dependences for improved forward computation of dynamic slices. Empir. Softw. Eng. 13(4): 369-399 (2008) - 2007
- [j2]Wes Masri, Andy Podgurski, David Leon:
An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows. IEEE Trans. Software Eng. 33(7): 454-477 (2007) - 2006
- [c5]Wes Masri, Nagi Nahas, Andy Podgurski:
Memoized Forward Computation of Dynamic Slices. ISSRE 2006: 23-32 - 2005
- [j1]Wes Masri, Andy Podgurski:
Using dynamic information flow analysis to detect attacks against applications. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c4]Wes Masri, Andy Podgurski:
Using dynamic information flow analysis to detect attacks against applications. SESS@ICSE 2005: 1-7 - [c3]David Leon, Wes Masri, Andy Podgurski:
An empirical evaluation of test case filtering techniques based on exercising complex information flows. ICSE 2005: 412-421 - 2004
- [c2]Wes Masri, Andy Podgurski, David Leon:
Detecting and Debugging Insecure Information Flows. ISSRE 2004: 198-209 - 2003
- [c1]Andy Podgurski, David Leon, Patrick Francis, Wes Masri, Melinda Minch, Jiayang Sun, Bin Wang:
Automated Support for Classifying Software Failure Reports. ICSE 2003: 465-477
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint