Подписаться
BooJoong Kang
BooJoong Kang
Подтвержден адрес электронной почты в домене soton.ac.uk - Главная страница
Название
Процитировано
Процитировано
Год
Deep android malware detection
N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ...
Proceedings of the seventh ACM on conference on data and application …, 2017
6002017
A multimodal deep learning method for android malware detection using various features
TG Kim, BJ Kang, M Rho, S Sezer, EG Im
IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018
5832018
Malware analysis using visualized images and entropy graphs
KS Han, JH Lim, B Kang, EG Im
International Journal of Information Security 14, 1-14, 2015
2062015
N-opcode analysis for android malware classification and categorization
BJ Kang, SY Yerima, K McLaughlin, S Sezer
2016 International conference on cyber security and protection of digital …, 2016
1352016
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations
BJ Kang, P Maynard, K McLaughlin, S Sezer, F Andrén, C Seitl, F Kupzog, ...
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015
1162015
Malware analysis using visualized image matrices
KS Han, BJ Kang, EG Im
The Scientific World Journal 2014 (1), 132713, 2014
942014
Software plagiarism detection: a graph-based approach
DK Chae, J Ha, SW Kim, BJ Kang, EG Im
Proceedings of the 22nd ACM international conference on Information …, 2013
882013
N-gram opcode analysis for android malware detection
BJ Kang, SY Yerima, S Sezer, K McLaughlin
arXiv preprint arXiv:1612.01445, 2016
662016
Malware classification method via binary content comparison
B Kang, T Kim, H Kwon, Y Choi, EG Im
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 316-321, 2012
512012
Weighted harvest-then-transmit: UAV-enabled wireless powered communication networks
S Cho, K Lee, B Kang, K Koo, I Joe
IEEE Access 6, 72212-72224, 2018
432018
Towards a stateful analysis framework for smart grid network intrusion detection
BJ Kang, K McLaughlin, S Sezer
4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
432016
Android malware classification method: Dalvik bytecode frequency analysis
B Kang, BJ Kang, J Kim, EG Im
Proceedings of the 2013 research in adaptive and convergent systems, 349-350, 2013
422013
Malware classification using instruction frequencies
KS Han, B Kang, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011
422011
Binary executable file similarity calculation using function matching
TG Kim, YR Lee, BJ Kang, EG Im
The Journal of Supercomputing 75, 607-622, 2019
312019
Function matching-based binary-level software similarity calculation
YR Lee, BJ Kang, EG Im
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 322-327, 2013
292013
Secure communications in smart grid: Networking and protocols
K McLaughlin, I Friedberg, BJ Kang, P Maynard, S Sezer, G McWilliams
Smart Grid Security, 113-148, 2015
242015
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering
BJ Kang, KS Han, B Kang, EG Im
Digital Investigation 11 (4), 323-335, 2014
232014
Enforcing policy-based security models for embedded SoCs within the internet of things
M Hagan, F Siddiqui, S Sezer, BJ Kang, K McLaughlin
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
192018
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system
F Yao, SY Yerima, BJ Kang, S Sezer
2017 International Conference on Cyber Security And Protection Of Digital …, 2017
182017
Fast malware family detection method using control flow graphs
B Kang, HS Kim, T Kim, H Kwon, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011
172011
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20