Author of the publication

A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.

, , , , , , , and . IMIS, page 723-728. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prosperity of IT security technologies in homeland defense., , and . J. Ambient Intell. Humaniz. Comput., 5 (2): 169-171 (2014)Random Cladding with Feedback Mechanism for encrypting mobile messages., , , , , and . INFOCOM Workshops, page 970-975. IEEE, (2016)MIST 2016: 8th International Workshop on Managing Insider Security Threats., and . ACM Conference on Computer and Communications Security, page 1890-1891. ACM, (2016)Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing., , , and . IEEE Access, (2017)Efficient Computation Offloading in Edge Computing Enabled Smart Home., , , and . IEEE Access, (2021)Identifying Windows Installer Package Files for Detection of Pirated Software., , , , , and . IMIS, page 287-290. IEEE Computer Society, (2014)Improvised Model for Blockchain in Distributed Cloud Environment., , , , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 327-341. Springer, (2022)Partition ORAMS Combined with Novel Client Eviction Mechanism., , and . CSE/EUC (1), page 525-530. IEEE Computer Society, (2017)Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities., , , and . MobiSec, volume 1644 of Communications in Computer and Information Science, page 63-81. Springer, (2022)5G and beyond telco cloud: architecture and cybersecurity challenges., , , , , and . WAC, page 1-6. IEEE, (2021)