Search

Your search keyword '"Sangchul Han"' showing total 29 results

Search Constraints

Start Over You searched for: Author "Sangchul Han" Remove constraint Author: "Sangchul Han" Search Limiters Full Text Remove constraint Search Limiters: Full Text
29 results on '"Sangchul Han"'

Search Results

1. Deoptfuscator: Defeating Advanced Control-Flow Obfuscation Using Android Runtime (ART)

2. A Comparative Study on the Schedulability of the EDZL Scheduling Algorithm on Multiprocessors

3. Android-Based Audio Video Navigation System Forensics: A Case Study

4. Design of an Intuitive Master for Improving Teleoperation Task Performance Using the Functional Separation of Actuators: Movement and Gravity Compensation

5. Screwdriving Gripper That Mimics Human Two-Handed Assembly Tasks

6. Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions

7. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

8. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

10. Snake Robot Gripper Module for Search and Rescue in Narrow Spaces

15. Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions

18. Development of Disaster-Responding Special-Purpose Machinery: Results of Experiments

19. Dynamic Analysis of Android Apps written with PhoneGap Cross-Platform Framework

20. Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework

22. A dual speed scheme for dynamic voltage scaling on real-time multiprocessor systems

23. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

24. Protecting Android Applications with Multiple DEX Files against Static Reverse Engineering Attacks

25. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

26. Protecting Android Applications with Multiple DEX Files Against Static Reverse Engineering Attacks.

27. Effects of infections with five sexually transmitted pathogens on sperm quality

28. Effects of infections with five sexually transmitted pathogens on sperm quality.

29. Scalable Group Key Exchange for Securing Distributed Operating Systems.

Catalog

Books, media, physical & digital resources