A multimodal deep learning method for android malware detection using various features TG Kim, BJ Kang, M Rho, S Sezer, EG Im IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018 | 587 | 2018 |
Malware Similarity Analysis using API Sequence Alignments. IK Cho, TG Kim, YJ Shim, H Park, B Choi, EG Im J. Internet Serv. Inf. Secur. 4 (4), 103-114, 2014 | 47 | 2014 |
Malware classification using byte sequence information B Jung, T Kim, EG Im Proceedings of the 2018 Conference on Research in Adaptive and Convergent …, 2018 | 39 | 2018 |
Binary executable file similarity calculation using function matching TG Kim, YR Lee, BJ Kang, EG Im The Journal of Supercomputing 75, 607-622, 2019 | 31 | 2019 |
Survey of dynamic taint analysis J Kim, TG Kim, EG Im 2014 4th IEEE International Conference on Network Infrastructure and Digital …, 2014 | 31 | 2014 |
Malware analysis and classification using sequence alignments IK Cho, TG Kim, YJ Shim, M Ryu, EG Im Intelligent Automation & Soft Computing 22 (3), 371-377, 2016 | 30 | 2016 |
Structural information based malicious app similarity calculation and clustering J Kim, TG Kim, EG Im Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015 | 25 | 2015 |
Fast malware family detection method using control flow graphs B Kang, HS Kim, T Kim, H Kwon, EG Im Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011 | 17 | 2011 |
Runtime detection framework for android malware TG Kim, BJ Kang, EG Im Mobile Information Systems 2018 (1), 8094314, 2018 | 14 | 2018 |
TASEL: dynamic taint analysis with selective control dependency B Kang, TG Kim, BJ Kang, EG Im, M Ryu Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014 | 13 | 2014 |
An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network T Kim, J Kim, I You Electronics 12 (17), 3543, 2023 | 12 | 2023 |
In-Kyoung Kim, and Eul Gyu Im," Malware detection method via major block comparison," TG Kim Journal of Security Engineering 9 (5), 401-416, 2012 | 8 | 2012 |
User authentication method via speaker recognition and speech synthesis detection H Park, TG Kim Security and Communication Networks 2022 (1), 5755785, 2022 | 6 | 2022 |
User authentication method using shaking actions in mobile devices TK Lee, TG Kim, EG Im Proceedings of the International Conference on Research in Adaptive and …, 2016 | 4 | 2016 |
Touch gesture data based authentication method for smartphone users JG Park, TG Kim, EG Im Proceedings of the International Conference on Research in Adaptive and …, 2016 | 4 | 2016 |
A study on selecting key Opcodes for malware classification and its Usefulness JB Park, KS Han, TG Kim, EG Im Journal of KIISE 42 (5), 558-565, 2015 | 4 | 2015 |
Similarity calculation method for user-define functions to detect malware variants TG Kim, JB Park, IG Cho, B Kang, EG Im, SY Kang Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014 | 4 | 2014 |
Analysis Method Reuse Code to Detect Variants of Malware T Kim, E Im Journal of The Korea Institute of information Security & Cryptology 24 (1 …, 2014 | 4 | 2014 |
Fast Malware Classification using Counting Bloom Filter1 BJ Kang, HS Kim, T Kim, H Kwon, EG Im International Information Institute (Tokyo). Information 15 (7), 2879, 2012 | 4 | 2012 |
SMDFbs: Specification-Based Misbehavior Detection for False Base Stations H Park, PVB Astillo, Y Ko, Y Park, T Kim, I You Sensors 23 (23), 9504, 2023 | 3 | 2023 |