Author of the publication

Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android apps.

, , and . RACS, page 342-346. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of sim-hash algorithm and big data analysis in spam email detection system., , and . RACS, page 242-246. ACM, (2014)Combined ranking for multi-media web search engine., , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 554-557. ACM, (2009)Measurement-based Analysis of Power Consumption Patterns for Portable Multimedia Players., , , , and . ESA, page 134-140. CSREA Press, (2006)Using Entropy Cluster-Based Clustering for Finding Potential Protein Complexes., and . IWBBIO (1), volume 9043 of Lecture Notes in Computer Science, page 524-535. Springer, (2015)Design and experiments of new IP traceback method based on offline analysis., , and . Comput. Syst. Sci. Eng., (2014)Measuring similarities among intrusion detection rules on the MapReduce environment., , , and . RACS, page 58-60. ACM, (2014)Small DDoS defense system using routing deployment method., and . WorldCIS, page 204-206. IEEE, (2012)Design of UPnP-based Ubiquitous Virtual Storage., , , and . ESA, page 155-158. CSREA Press, (2007)A Grid Computing-Based Monte Carlo Docking Simulations Approach for Computational Chiral Discrimination., , , and . RSFDGrC (2), volume 3642 of Lecture Notes in Computer Science, page 446-455. Springer, (2005)Detecting soft errors by redirection classification., , , , and . WWW, page 1119-1120. ACM, (2009)