关注
Dongsoo Ha
Dongsoo Ha
在 hanyang.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
On security and privacy issues of fog computing supported Internet of Things environment
K Lee, D Kim, D Ha, U Rajput, H Oh
2015 6th International Conference on the Network of the Future (NOF), 1-3, 2015
2092015
Repica: Rewriting position independent code of arm
D Ha, W Jin, H Oh
IEEE Access 6, 50488-50509, 2018
132018
Rumor propagation detection system in social network services
H Yang, J Zhong, D Ha, H Oh
Computational Social Networks: 5th International Conference, CSoNet 2016, Ho …, 2016
112016
Toward VANET Utopia: A new privacy preserving trustworthiness management scheme for VANET
J Son, D Kim, HG Oh, D Ha, W Lee
2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud …, 2016
42016
안드로이드 어플리케이션 역공학 보호기법
D Ha, K Lee, H Oh
Review of KIISC 25 (3), 19-28, 2015
22015
Study on Structure for Robust App Protection through Commercial Android App Hardening Service
D Ha, H Oh
Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018
2018
A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain
D Ha, H Oh
Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018
2018
A Method Verifying Execution Environment Integrity for Secure Execution of Packed Android Application
D Ha, H Oh
Journal of the Korea Institute of Information Security & Cryptology 28 (6 …, 2018
2018
A Hiding Original App Method by Altering Android DexClassLoader Execution Flow
H Jo, J Choi, D Ha, J Shin, H Oh
Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017
2017
Trust Evaluation Based Friend Recommendation in Proximity Based Mobile Social Network
F Abbas, U Rajput, H Eun, D Ha, T Moon, W Jin, H Back, H Jo, S Bang, ...
Computational Social Networks: 5th International Conference, CSoNet 2016, Ho …, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–10