Author of the publication

Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android apps.

, , and . RACS, page 342-346. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measurement-based Analysis of Power Consumption Patterns for Portable Multimedia Players., , , , and . ESA, page 134-140. CSREA Press, (2006)Design and experiments of new IP traceback method based on offline analysis., , and . Comput. Syst. Sci. Eng., (2014)Combined ranking for multi-media web search engine., , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 554-557. ACM, (2009)Using Entropy Cluster-Based Clustering for Finding Potential Protein Complexes., and . IWBBIO (1), volume 9043 of Lecture Notes in Computer Science, page 524-535. Springer, (2015)Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System., and . J. Internet Serv. Inf. Secur., 2 (3/4): 43-53 (2012)Application of sim-hash algorithm and big data analysis in spam email detection system., , and . RACS, page 242-246. ACM, (2014)Measuring similarities among intrusion detection rules on the MapReduce environment., , , and . RACS, page 58-60. ACM, (2014)Small DDoS defense system using routing deployment method., and . WorldCIS, page 204-206. IEEE, (2012)A fast algorithm for the generalized k-keyword proximity problem given keyword offsets., , and . Inf. Process. Lett., 91 (3): 115-120 (2004)K-strings algorithm, a new approach based on Kmeans., and . RACS, page 15-20. ACM, (2015)