Urmăriți
Jehyun Lee
Jehyun Lee
Trustwave
Adresă de e-mail confirmată pe trustwave.com
Titlu
Citat de
Citat de
Anul
PsyBoG: A scalable botnet detection method for large-scale DNS traffic
J Kwon, J Lee, H Lee, A Perrig
Computer Networks 97, 48-73, 2016
1382016
GMAD: Graph-based Malware Activity Detection by DNS traffic analysis
J Lee, H Lee
Computer Communications 49, 33-47, 2014
662014
D-fence: A flexible, efficient, and comprehensive phishing email detection system
J Lee, F Tang, P Ye, F Abbasi, P Hay, DM Divakaran
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 578-597, 2021
442021
SRMT: A lightweight encryption scheme for secure real-time multimedia transmission
E Choo, J Lee, H Lee, G Nam
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
432007
Screening smartphone applications using malware family signatures
J Lee, S Lee, H Lee
computers & security 52, 234-249, 2015
402015
Tracking multiple C&C botnets by analyzing DNS traffic
J Lee, J Kwon, HJ Shin, H Lee
2010 6th IEEE Workshop on Secure Network Protocols, 67-72, 2010
392010
Scalable attack graph for risk assessment
J Lee, H Lee, HP In
2009 International Conference on Information Networking, 1-5, 2009
292009
PsyBoG: Power spectral density analysis for detecting botnet groups
J Kwon, J Kim, J Lee, H Lee, A Perrig
2014 9th International Conference on Malicious and Unwanted Software: The …, 2014
282014
Building robust phishing detection system: an empirical analysis
J Lee, P Ye, R Liu, DM Divakaran, MC Chan
NDSS MADWeb, 2020
232020
Hidden bot detection by tracing non-human generated traffic at the zombie host
J Kwon, J Lee, H Lee
International Conference on Information Security Practice and Experience …, 2011
212011
Droidgraph: discovering android malware by analyzing semantic behavior
J Kwon, J Jeong, J Lee, H Lee
2014 IEEE Conference on Communications and Network Security, 498-499, 2014
152014
Attacking logo-based phishing website detectors with adversarial perturbations
J Lee, Z Xin, MNP See, K Sabharwal, G Apruzzese, DM Divakaran
European Symposium on Research in Computer Security, 162-182, 2023
122023
Screening smartphone applications using behavioral signatures
S Lee, J Lee, H Lee
Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013
92013
Multimodal large language models for phishing webpage detection and identification
J Lee, P Lim, B Hooi, DM Divakaran
arXiv preprint arXiv:2408.05941, 2024
72024
Sierra: Ranking anomalous activities in enterprise networks
J Lee, F Tang, PM Thet, D Yeoh, M Rybczynski, DM Divakaran
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 44-59, 2022
72022
Metamorphic malware detection using subgraph matching
JH Kwon, JH Lee, HC Jeong, HJ Lee
Journal of the Korea Institute of Information Security & Cryptology 21 (2 …, 2011
62011
Broken integrity detection of video files in video event data recorders
C Lee, J Lee, Y Pyo, H Lee
KSII Transactions on Internet and Information Systems (TIIS) 10 (8), 3943-3957, 2016
52016
Splitsecond: flexible privilege separation of android apps
J Lee, AV Raja, D Gao
2019 17th International Conference on Privacy, Security and Trust (PST), 1-10, 2019
32019
On return oriented programming threats in android runtime
AV Raja, J Lee, D Gao
2017 15th Annual Conference on Privacy, Security and Trust (PST), 259-2598, 2017
32017
Instrumentation Performance Measurement Technique for Evaluating Efficiency of Binary Analysis Tools
M Lee, J Lee, H Kim, C Ryu
Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017
22017
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20