Segui
Hyunjae Kang
Hyunjae Kang
Altri nomi현재 강, Janet Kang
Postdoctoral Researcher at School of EECS, University of Queensland
Email verificata su uq.edu.au
Titolo
Citata da
Citata da
Anno
IoT network intrusion dataset
H Kang, DH Ahn, GM Lee, JD Yoo, KH Park, HK Kim
IEEE Dataport 10, q70p-q449, 2019
1932019
Detecting and classifying android malware using static analysis along with creator information
H Kang, J Jang, A Mohaisen, HK Kim
International Journal of Distributed Sensor Networks 11 (6), 479174, 2015
1892015
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
682016
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
Digital Investigation 14, 17-35, 2015
672015
Car hacking and defense competition on in-vehicle network
H Kang, BI Kwak, YH Lee, H Lee, H Lee, HK Kim
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 25, 2021
562021
Car hacking: Attack defense challenge 2020 dataset
H Kang, BI Kwak, YH Lee, H Lee, H Lee, HK Kim
(No Title), 2021
402021
Androtracker: Creator information based android malware classification system
HJ Kang, J Jang, A Mohaisen, HK Kim
information security applications-15th international workshop, WISA 8909, 545, 2014
192014
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux
S Jeong, M Ryu, H Kang, HK Kim
Proceedings of the Thirteenth ACM Conference on Data and Application …, 2023
72023
Panop: Mimicry-resistant ann-based distributed nids for iot networks
H Kim, S Ahn, WR Ha, H Kang, DS Kim, HK Kim, Y Paek
IEEE Access 9, 111853-111864, 2021
62021
CANival: A multimodal approach to intrusion detection on the vehicle CAN bus
H Kang, T Vo, HK Kim, JB Hong
Vehicular Communications 50, 100845, 2024
22024
Match experiences affect interest: Impacts of matchmaking and performance on churn in a competitive game
H Kang, C Suh, HK Kim
Heliyon 10 (3), 2024
2024
Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts
J Woo, HJ Kang, AR Kang, H Kwon, HK Kim
Information Security and Cryptology--ICISC 2013: 16th International …, 2014
2014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–12