Cited By
View all- Dai TLi XHassanshahi BYap RLiang Z(2017)RoppDroidComputers and Security10.1016/j.cose.2017.04.00268:C(98-111)Online publication date: 1-Jul-2017
- Ul Haq MLiao LLerong M(2016)Design and implementation of sandbox technique for isolated applications2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference10.1109/ITNEC.2016.7560422(557-561)Online publication date: May-2016
- Ul Haq MLiao LMa L(2016)Transitioning Native Application into Virtual Machine by Using Hardware Virtualization Extensions2016 International Symposium on Computer, Consumer and Control (IS3C)10.1109/IS3C.2016.108(397-403)Online publication date: Jul-2016
- Show More Cited By