Author of the publication

An effective and intelligent Windows application filtering system using software similarity.

, , , , , , and . Soft Comput., 20 (5): 1821-1827 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks., , , , , , and . LEET, USENIX Association, (2012)Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework., , , , and . Secur. Commun. Networks, (2018)Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation., , , , , and . CoRR, (2015)A software classification scheme using binary-level characteristics for efficient software filtering., , , and . Soft Comput., 22 (2): 595-606 (2018)A remotely controlled out-pipe climbing robot., , and . URAI, page 126. IEEE, (2013)A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information., , , , , and . ICUFN, page 478-483. IEEE, (2019)Android malware detection using convolutional neural networks and data section images., , , , , and . RACS, page 149-153. ACM, (2018)Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor., , , , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 174-182. Springer, (2004)Designing a Bow-Inspired Rigidable Exosuit for Adaptive Support., , , , , , , , , and 1 other author(s). IEEE Robotics Autom. Lett., 8 (11): 7328-7335 (November 2023)Open-Source Android App Detection considering the Effects of Code Obfuscation., , , , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 9 (3): 50-61 (2018)