Author of the publication

Improve User's Security Literacy by Experiencing Behavior of Pseudo Android Malware.

, and . COMPSAC, page 602-603. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training of requirements analysis modeling with UML-based prototype generation tool., and . ISEC, page 105-108. ACM, (2012)Quality Improvement of Requirements Specification using Model Checking Technique., , , and . ICEIS (2), page 401-406. SciTePress, (2012)An evaluation method of project based learning on software development experiment.. SIGCSE, page 163-167. ACM, (2006)Knowledge Acquisition and Integration on Specification Change-A Method for Systematic Reuse., and . APSEC, page 364-373. IEEE Computer Society, (1995)A Dynamic Countermeasure Method to Android Malware by User Approval., and . COMPSAC, page 730-731. IEEE Computer Society, (2013)Collaboration Support Model of Software Development Experiment., and . SEKE, page 23-28. (2006)A Review Method of Requirements Analysis Model in UML with Prototyping., and . JCKBSE, volume 240 of Frontiers in Artificial Intelligence and Applications, page 181-190. IOS Press, (2012)EVA: A Flexible Programming Method for Evolving Systems., , and . IEEE Trans. Software Eng., 23 (5): 296-313 (1997)Design and Implementation of an Aspect Instantiation Mechanism., , , , and . LNCS Trans. Aspect Oriented Softw. Dev., (2006)Practical Behavioral Inconsistency Detection between Source Code and Specification Using Model Checking., , and . ISSRE Workshops, page 124-125. IEEE Computer Society, (2014)