Author of the publication

An effective framework of behavior detection-advanced static analysis for malware detection.

, , , and . ISCIT, page 361-365. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TCP Pre-Connection for Prefix-Caching Video Proxy in Wide Area Networks., and . International Conference on Internet Computing (1), page 514-520. (2001)An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing., , and . AINA, page 695-700. IEEE Computer Society, (2012)Smart government framework with geo-crowdsourcing and social media analysis., , and . Future Generation Comp. Syst., (2018)RDM: Rapid Deduplication for Mobile Cloud Storage., and . ICCMS, page 14-18. ACM, (2017)An Efficient Video Prefix-Caching Scheme in Wide Area Networks., , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 679-688. Springer, (2004)A Strong User Authentication Framework for Cloud Computing., , , , and . APSCC, page 110-115. IEEE Computer Society, (2011)Performance and Optical Cost Analysis of Shared Fiber Delay Line Based Two-Stage Optical Packet Switch., and . AINA, page 682-687. IEEE Computer Society, (2011)An Efficient Hardware Countermeasure against Differential Power Analysis Attack., , , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 153-159. Springer, (2011)Comparative Performance Study of WDM Packet Switch for Different Traffic Arrival Approach., and . J. Inform. and Commun. Convergence Engineering, 9 (5): 551-555 (2011)Two Factor Authentication for Cloud Computing., , , and . J. Inform. and Commun. Convergence Engineering, 8 (4): 427-432 (2010)