Vulnerability Detection of International Mobile Equipment Identity Number of Smartphone and Automated Reporting of Changed IMEI Number K Kumar, P Kaur International Journal of Computer Science and Mobile Computing 4 (5), 527-533, 2015 | 17 | 2015 |
A Comparative Analysis of Static Java Bytecode Software Watermarking Algorithms K Krishan, V Kehar, P Kaur IEEE African Journal of Computing & ICT 8 (4), 201-208, 2015 | 6* | 2015 |
A Generalized Process of Reverse Engineering in Software Protection & Security K Kumar, P Kaur International Journal of Computer Science and Mobile Computing 4 (5), 534-544, 2015 | 6 | 2015 |
A Thorough Investigation of Code Obfuscation Techniques for Software Protection K Kumar, P Kaur International Journal of Computer Sciences and Engineering 3 (5), 158-164, 2015 | 6 | 2015 |
An Evaluation of Dynamic Java Bytecode Software Watermarking Algorithms K Kumar, V Kehar, P Kaur International Journal of Security and Its Applications 10 (7), 147-156, 2016 | 4 | 2016 |
A Comparative Analysis of Static and Dynamic Java Bytecode Watermarking Algorithms K Kumar, P Kaur Advances in Intelligent Systems and Computing book series 731, 319-334, 2018 | 3 | 2018 |
Symbiotic Organisms Search Response to Distributed Database Queries S Atinderpal, K Krishan, VS Rajinder Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities …, 2016 | 2* | 2016 |