Design and Implementation of Verification System for Malicious URL and Modified APK File on Cloud Platform
نویسندگان
چکیده
منابع مشابه
simulation and design of electronic processing circuit for restaurants e-procurement system
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
15 صفحه اولdevelopment and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولa study on construction of iranian life tables: the case study of modified brass logit system
چکیده ندارد.
15 صفحه اولcellular behavior and scanning electron microscope evaluation of pro-root mta, root mta and modified mta on fibroblast l929
چکیده ندارد.
15 صفحه اولHotel Information Platform Design and Implementation Based on Cloud Computing
In today’s information age, how to effectively integrate the information resources of tourism and leisure has received widespread attention in the tourism and leisure industry. This article analyzes platform user requirement for the current situation of single function of information service platform, and simple interactive as well as limited contents. The structure and function of hotel inform...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.4.921