Author of the publication

Impact on the Writing Granularity for Incremental Checkpointing.

, , , , , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 1154-1157. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks., , , , , , and . LEET, USENIX Association, (2012)An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots., , , , and . RACS, page 266-271. ACM, (2011)Android malware detection using convolutional neural networks and data section images., , , , , and . RACS, page 149-153. ACM, (2018)Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor., , , , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 174-182. Springer, (2004)Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer., , , , and . SMA, page 272-276. ACM, (2020)Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering., , , , , , and . ISORC, page 80-86. IEEE Computer Society, (2010)Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps., , , and . Forensic Sci. Int. Digit. Investig., (2024)Machine learning-based software classification scheme for efficient program similarity analysis., , , , , and . RACS, page 114-118. ACM, (2015)Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation., , , , , and . RACS, page 148-152. ACM, (2016)A Static Birthmark of Windows Binary Executables Based on Strings., , , , , , and . IMIS, page 734-738. IEEE Computer Society, (2013)