Author of the publication

Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android apps.

, , and . RACS, page 342-346. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measurement-based Analysis of Power Consumption Patterns for Portable Multimedia Players., , , , and . ESA, page 134-140. CSREA Press, (2006)Design and experiments of new IP traceback method based on offline analysis., , and . Comput. Syst. Sci. Eng., (2014)Combined ranking for multi-media web search engine., , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 554-557. ACM, (2009)Application of sim-hash algorithm and big data analysis in spam email detection system., , and . RACS, page 242-246. ACM, (2014)Using Entropy Cluster-Based Clustering for Finding Potential Protein Complexes., and . IWBBIO (1), volume 9043 of Lecture Notes in Computer Science, page 524-535. Springer, (2015)Measuring similarities among intrusion detection rules on the MapReduce environment., , , and . RACS, page 58-60. ACM, (2014)Small DDoS defense system using routing deployment method., and . WorldCIS, page 204-206. IEEE, (2012)Design of UPnP-based Ubiquitous Virtual Storage., , , and . ESA, page 155-158. CSREA Press, (2007)Development and verification of the DRM standard protocol for media card., , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 572-575. ACM, (2009)Detecting soft errors by redirection classification., , , , and . WWW, page 1119-1120. ACM, (2009)