Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Salleh, Rosli
add a person with the name Salleh, Rosli
 

Other publications of authors with the same name

Analysis and Design of Low-Cost Bit-Serial Architectures for Motion Estimation in H.264/AVC., , and . Signal Processing Systems, 71 (2): 111-121 (2013)A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC., , and . IIH-MSP, page 818-821. IEEE Computer Society, (2008)Protection of Binding Update Message in Mobile IPv6., , , and . EMS, page 444-447. IEEE, (2012)Mobile Botnet Attacks: A Thematic Taxonomy., , and . WorldCIST (2), volume 276 of Advances in Intelligent Systems and Computing, page 153-164. Springer, (2014)The Evolution of Android Malware and Android Analysis Techniques., , , , and . ACM Comput. Surv., 49 (4): 76:1-76:41 (2017)A survey of secure protocols in Mobile IPv6., , , and . J. Network and Computer Applications, (2014)The rise of "malware": Bibliometric analysis of malware study., , , and . J. Network and Computer Applications, (2016)On the Analysis and Detection of Mobile Botnet Applications., , , , and . J. UCS, 22 (4): 567-588 (2016)Copy-move forgery detection: Survey, challenges and future directions., , , , , , and . J. Network and Computer Applications, (2016)A Survey on Cloud Computing Security, , , , and . CoRR, (2012)