Seguir
Taeguen Kim
Taeguen Kim
Dirección de correo verificada de korea.ac.kr
Título
Citado por
Citado por
Año
A multimodal deep learning method for android malware detection using various features
TG Kim, BJ Kang, M Rho, S Sezer, EG Im
IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018
5872018
Malware Similarity Analysis using API Sequence Alignments.
IK Cho, TG Kim, YJ Shim, H Park, B Choi, EG Im
J. Internet Serv. Inf. Secur. 4 (4), 103-114, 2014
472014
Malware classification using byte sequence information
B Jung, T Kim, EG Im
Proceedings of the 2018 Conference on Research in Adaptive and Convergent …, 2018
392018
Binary executable file similarity calculation using function matching
TG Kim, YR Lee, BJ Kang, EG Im
The Journal of Supercomputing 75, 607-622, 2019
312019
Survey of dynamic taint analysis
J Kim, TG Kim, EG Im
2014 4th IEEE International Conference on Network Infrastructure and Digital …, 2014
312014
Malware analysis and classification using sequence alignments
IK Cho, TG Kim, YJ Shim, M Ryu, EG Im
Intelligent Automation & Soft Computing 22 (3), 371-377, 2016
302016
Structural information based malicious app similarity calculation and clustering
J Kim, TG Kim, EG Im
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
252015
Fast malware family detection method using control flow graphs
B Kang, HS Kim, T Kim, H Kwon, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011
172011
Runtime detection framework for android malware
TG Kim, BJ Kang, EG Im
Mobile Information Systems 2018 (1), 8094314, 2018
142018
TASEL: dynamic taint analysis with selective control dependency
B Kang, TG Kim, BJ Kang, EG Im, M Ryu
Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014
132014
An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network
T Kim, J Kim, I You
Electronics 12 (17), 3543, 2023
122023
In-Kyoung Kim, and Eul Gyu Im," Malware detection method via major block comparison,"
TG Kim
Journal of Security Engineering 9 (5), 401-416, 2012
82012
User authentication method via speaker recognition and speech synthesis detection
H Park, TG Kim
Security and Communication Networks 2022 (1), 5755785, 2022
62022
User authentication method using shaking actions in mobile devices
TK Lee, TG Kim, EG Im
Proceedings of the International Conference on Research in Adaptive and …, 2016
42016
Touch gesture data based authentication method for smartphone users
JG Park, TG Kim, EG Im
Proceedings of the International Conference on Research in Adaptive and …, 2016
42016
A study on selecting key Opcodes for malware classification and its Usefulness
JB Park, KS Han, TG Kim, EG Im
Journal of KIISE 42 (5), 558-565, 2015
42015
Similarity calculation method for user-define functions to detect malware variants
TG Kim, JB Park, IG Cho, B Kang, EG Im, SY Kang
Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014
42014
Analysis Method Reuse Code to Detect Variants of Malware
T Kim, E Im
Journal of The Korea Institute of information Security & Cryptology 24 (1 …, 2014
42014
Fast Malware Classification using Counting Bloom Filter1
BJ Kang, HS Kim, T Kim, H Kwon, EG Im
International Information Institute (Tokyo). Information 15 (7), 2879, 2012
42012
SMDFbs: Specification-Based Misbehavior Detection for False Base Stations
H Park, PVB Astillo, Y Ko, Y Park, T Kim, I You
Sensors 23 (23), 9504, 2023
32023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20