Search

Your search keyword '"Sangchul Han"' showing total 28 results

Search Constraints

Start Over You searched for: Author "Sangchul Han" Remove constraint Author: "Sangchul Han" Topic computer Remove constraint Topic: computer
28 results on '"Sangchul Han"'

Search Results

2. Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions

4. A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information

5. Detecting Malicious Android Apps using the Popularity and Relations of APIs

7. A software classification scheme using binary-level characteristics for efficient software filtering

8. Android malware detection using convolutional neural networks and data section images

9. An effective and intelligent Windows application filtering system using software similarity

10. Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework

11. An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications

12. A dual speed scheme for dynamic voltage scaling on real-time multiprocessor systems

13. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

14. Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation

15. An Efficient Prefix Caching Scheme with Bounded Prefix Expansion for High-Speed IP Lookup

16. Machine learning-based software classification scheme for efficient program similarity analysis

17. Protecting Android Applications with Multiple DEX Files against Static Reverse Engineering Attacks

18. Characteristics and perspectives of wearable smart devices and industrial ecosystem

19. A robust and efficient birthmark-based android application filtering system

20. Efficient Identification of Windows Executable Programs to Prevent Software Piracy

21. A kernel-based monitoring approach for analyzing malicious behavior on Android

22. Measuring similarity of android applications via reversing and K-gram birthmarking

23. A Static Birthmark of Windows Binary Executables Based on Strings

24. A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications

25. Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords

26. Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems

27. Fast Real-Time Job Selection with Resource Constraints Under Earliest Deadline First

28. An efficient job selection scheme in real-time scheduling under the stack resource policy

Catalog

Books, media, physical & digital resources