Author of the publication

Java mobile code security by bytecode behavior analysis.

, , , and . IASTED Conf. on Software Engineering and Applications, page 90-95. IASTED/ACTA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Load Estimation and Compensation Control of a Vertical Two-Link Robot., and . J. Robotics Mechatronics, 2 (2): 107-113 (1990)Java mobile code security by bytecode behavior analysis., , , and . IASTED Conf. on Software Engineering and Applications, page 90-95. IASTED/ACTA Press, (2004)Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality., , , and . Int. J. Netw. Secur., 7 (3): 416-427 (2008)An integrated optimization framework for reducing the energy consumption of embedded real-time applications., , , , , , , , , and 2 other author(s). ISLPED, page 271-276. IEEE/ACM, (2011)Java Bytecode Dependence Analysis for Secure Information Flow., , , and . Int. J. Netw. Secur., 4 (1): 59-68 (2007)Identifying candidate invariant conditions of running program., , , and . IASTED Conf. on Software Engineering and Applications, page 577-582. IASTED/ACTA Press, (2004)Analyzing Invariant Condition of Running Java Program., , , and . SEKE, page 350-353. (2004)An Integrated Framework for Energy Optimization of Embedded Real-Time Applications., , , , , , , , , and 1 other author(s). IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (12): 2477-2487 (2014)