Author of the publication

A new detection scheme of software copyright infringement using software birthmark on windows systems.

, , , , , , and . Comput. Sci. Inf. Syst., 11 (3): 1055-1069 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications., , , , , , , and . IMIS, page 723-728. IEEE Computer Society, (2013)Efficient Identification of Windows Executable Programs to Prevent Software Piracy., , , , and . IMIS, page 236-240. IEEE Computer Society, (2014)Protecting data on android platform against privilege escalation attack., , , and . Int. J. Comput. Math., 93 (2): 401-414 (2016)Measuring similarity of windows applications using static and dynamic birthmarks., , , , , , , and . SAC, page 1628-1633. ACM, (2013)Detection and prevention of LeNa Malware on Android., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 63-71 (2013)Efficient Android Malware Detection Using API Rank and Machine Learning., , , , and . J. Internet Serv. Inf. Secur., 9 (1): 48-59 (2019)An effective and intelligent Windows application filtering system using software similarity., , , , , , and . Soft Comput., 20 (5): 1821-1827 (2016)Enhancing Sustainability in Machine Learning-based Android Malware Detection using API calls., , , , and . AIKE, page 131-134. IEEE, (2022)DAAV: Dynamic API Authority Vectors for Detecting Software Theft., , , and . CIKM, page 1819-1822. ACM, (2015)Unified security enhancement framework for the Android operating system., , , , and . J. Supercomput., 67 (3): 738-756 (2014)