36 results on '"Minkyu Park"'
Search Results
2. Forensic Analysis of Apple CarPlay: A Case Study.
3. Enhanced Android Malware Detection: An SVM-Based Machine Learning Approach.
4. Reversing Obfuscated Control Flow Structures in Android Apps using ReDex Optimizer.
5. Android Malware Family Classification using Images from Dex Files.
6. Android malware detection using convolutional neural networks and data section images.
7. An Anti-Reverse Engineering Technique using Native code and Obfuscator-LLVM for Android Applications.
8. Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation.
9. Machine learning-based software classification scheme for efficient program similarity analysis.
10. Efficient Identification of Windows Executable Programs to Prevent Software Piracy.
11. A robust and efficient birthmark-based android application filtering system.
12. A birthmark-based method for intellectual software asset management.
13. A Static Birthmark for MS Windows Applications Using Import Address Table.
14. A Static Birthmark of Windows Binary Executables Based on Strings.
15. A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications.
16. Measuring similarity of android applications via reversing and K-gram birthmarking.
17. An efficient protection scheme of digital contents under mobile devices.
18. Measuring similarity of windows applications using static and dynamic birthmarks.
19. An anti-piracy mechanism based on class separation and dynamic loading for Android applications.
20. AAGC: an efficient associativity-aware garbage collection scheme for hybrid FTLs.
21. An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots.
22. Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering.
23. A Sufficient Condition for Rate Monotonic Schedulability Based on Response Time Analysis.
24. Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords.
25. Energy Consumption Optimization of Real-Time Embedded Systems.
26. Buffer Cache Level Encryption for Embedded Secure Operating System.
27. Noise insensitive demosaicing algorithm.
28. Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.
29. Predictability of Earliest Deadline Zero Laxity Algorithm for Multiprocessor Real-Time Systems.
30. Impact on the Writing Granularity for Incremental Checkpointing.
31. Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor.
32. BookmarkFeeder: A Web Agent with Implicit Feedback and URL-Based Recommendation.
33. RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks.
34. A kernel-based monitoring approach for analyzing malicious behavior on Android.
35. Real-time digital zooming for mobile consumer cameras using directionally adaptive image interpolation and restoration.
36. An off-line dynamic voltage scaling scheme in multiprocessor real-time scheduling.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.