Urmăriți
Eul Gyu Im
Eul Gyu Im
Hanyang University
Adresă de e-mail confirmată pe ehanyang.ac.kr - Pagina de pornire
Titlu
Citat de
Citat de
Anul
A multimodal deep learning method for android malware detection using various features
TG Kim, BJ Kang, M Rho, S Sezer, EG Im
IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018
4242018
Multiattribute SCADA-specific intrusion detection system for power networks
Y Yang, K McLaughlin, S Sezer, T Littler, EG Im, B Pranggono, HF Wang
IEEE Transactions on Power Delivery 29 (3), 1092-1102, 2014
1952014
Malware analysis using visualized images and entropy graphs
KS Han, JH Lim, B Kang, EG Im
International Journal of Information Security 14, 1-14, 2015
1692015
Malware analysis method using visualization of binary files
KS Han, JH Lim, EG Im
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 317-321, 2013
1092013
Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems
Y Yang, K McLaughlin, T Littler, S Sezer, EG Im, ZQ Yao, B Pranggono, ...
IET Digital Library, 2012
1062012
SVM training phase reduction using dataset feature filtering for malware detection
P O'Kane, S Sezer, K McLaughlin, EG Im
IEEE transactions on information forensics and security 8 (3), 500-509, 2013
872013
Malware analysis using visualized image matrices
KS Han, BJ Kang, EG Im
The Scientific World Journal 2014, 2014
842014
Ransomware detection using machine learning algorithms
SI Bae, GB Lee, EG Im
Concurrency and Computation: Practice and Experience 32 (18), e5422, 2020
832020
Software plagiarism detection: a graph-based approach
DK Chae, J Ha, SW Kim, BJ Kang, EG Im
Proceedings of the 22nd ACM international conference on Information …, 2013
742013
Malware classification method via binary content comparison
B Kang, T Kim, H Kwon, Y Choi, EG Im
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 316-321, 2012
512012
Malware Similarity Analysis using API Sequence Alignments.
IK Cho, TG Kim, YJ Shim, H Park, B Choi, EG Im
J. Internet Serv. Inf. Secur. 4 (4), 103-114, 2014
422014
Malware classification using instruction frequencies
KS Han, B Kang, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011
412011
Android malware classification method: Dalvik bytecode frequency analysis
B Kang, BJ Kang, J Kim, EG Im
Proceedings of the 2013 research in adaptive and convergent systems, 349-350, 2013
372013
Malware classification methods using API sequence characteristics
KS Han, IK Kim, EG Im
Proceedings of the International Conference on IT Convergence and Security …, 2012
352012
Extracting the representative API call patterns of malware families using recurrent neural network
I Kwon, EG Im
Proceedings of the international conference on research in adaptive and …, 2017
322017
Malware classification using byte sequence information
B Jung, T Kim, EG Im
Proceedings of the 2018 Conference on Research in Adaptive and Convergent …, 2018
292018
An Automatic Malware Classification System using String List and APIs
JW Park, ST Moon, GW Son, IK Kim, KS Han, EG Im, IG Kim
Journal of Security Engineering 8 (5), 611-626, 2011
292011
Binary executable file similarity calculation using function matching
TG Kim, YR Lee, BJ Kang, EG Im
The Journal of Supercomputing 75, 607-622, 2019
252019
Malware analysis and classification using sequence alignments
IK Cho, TG Kim, YJ Shim, M Ryu, EG Im
Intelligent Automation & Soft Computing 22 (3), 371-377, 2016
242016
Structural information based malicious app similarity calculation and clustering
J Kim, TG Kim, EG Im
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
242015
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20