| contributor author | Chen, Feifei | |
| contributor author | Sang, Nong | |
| contributor author | Gao, Changxin | |
| contributor author | Kuang, Xiaoqin | |
| date accessioned | 2020-03-12T22:49:31Z | |
| date available | 2020-03-12T22:49:31Z | |
| date issued | 2014 | |
| identifier other | 7025304.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1095860?show=full | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Discovering distinctive action parts for action recognition | |
| type | Conference Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8236211 | |
| subject keywords | Android (operating system) | |
| subject keywords | n electronic messaging | |
| subject keywords | n invasive software | |
| subject keywords | n smart phones | |
| subject keywords | n Android-based smart phones | |
| subject keywords | n SMS-based malware | |
| subject keywords | n airport check-in system | |
| subject keywords | n analytical analysis | |
| subject keywords | n defense-in-depth strategy | |
| subject keywords | n detection time | |
| subject keywords | n execution cost | |
| subject keywords | n intrusion ambushing system | |
| subject keywords | n malicious SMS prevention | |
| subject keywords | n operating system | |
| subject keywords | n optimal performance | |
| subject keywords | n security features | |
| subject keywords | n security framework | |
| subject keywords | n third line-of-defense strategy | |
| subject keywords | n warfare kill zone | |
| subject keywords | n Airpor | |
| identifier doi | 10.1109/IWCMC.2014.6906414 | |
| journal title | mage Processing (ICIP), 2014 IEEE International Conference on | |
| filesize | 495067 | |
| citations | 0 | |