Author of the publication

Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering.

, , , , , , and . ISORC, page 80-86. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering., , , , , , and . ISORC, page 80-86. IEEE Computer Society, (2010)RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks., , , , , , and . LEET, USENIX Association, (2012)An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots., , , , and . RACS, page 266-271. ACM, (2011)Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework., , , , and . Security and Communication Networks, (2018)Android malware detection using convolutional neural networks and data section images., , , , , and . RACS, page 149-153. ACM, (2018)Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor., , , , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 174-182. Springer, (2004)Cooperative information-driven source search and estimation for multiple agents., and . Information Fusion, (2020)Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems., , , , , and . ISORC, page 359-364. IEEE Computer Society, (2006)Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots., , , , and . J. Inf. Sci. Eng., 28 (5): 911-924 (2012)A kernel-based monitoring approach for analyzing malicious behavior on Android., , , , and . SAC, page 1737-1738. ACM, (2014)