2013-10 | Android malware classification method: Dalvik bytecode frequency analysis | 임을규 |
2012-11 | Balanced Indexing Method for Efficient Intrusion Detection Systems | 임을규 |
2019-02 | Binary executable file similarity calculation using function matching | 임을규 |
2016-03 | Credible, resilient, and scalable detection of software plagiarism using authority histograms | 임을규 |
2018-12 | Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model | 임을규 |
2016-11 | A dynamic taint analysis method of control-dependent data | 임을규 |
2011-11 | Efficient Shortest Path Search in Large Road Network Environment: A Heuristic Approach | 임을규 |
2014-01 | Evading anti-debugging techniques with binary substitution | 임을규 |
2015-10 | Extracting representative API patterns of malware families using multiple sequence alignments | 임을규 |
2014-06 | Feature set reduction for the detection of packed executables | 임을규 |
2013-10 | Function matching-based binary-level software similarity calculation | 임을규 |
2011-03 | Impacts of aerosols on regional meteorology due to Siberian forest fires in May 2003 | 임을규 |
2016-06 | Malware Analysis and Classification Using Sequence Alignments | 임을규 |
2013-10 | Malware analysis method using visualization of binary files | 임을규 |
2014-07 | Malware Analysis Using Visualized Image Matrices | 임을규 |
2015-02 | Malware analysis using visualized images and entropy graphs | 임을규 |
2014-12 | Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering | 임을규 |
2012-06 | Malware classification methods using API sequence characteristics | 임을규 |
2014-02 | Malware detection: program run length against detection rate | 임을규 |
2011-08 | Meteorological responses to Mt. Baekdu volcanic eruption over east asia in an offline global climate-chemistry model: A pilot study | 임을규 |
2014-06 | Multiattribute SCADA-Specific Intrusion Detection System for Power Networks | 임을규 |
2019-03 | A Multimodal Deep Learning Method for Android Malware Detection Using Various Features | 임을규 |
2020-04 | Packer identification method based on byte sequences | 임을규 |
2012-04 | Peer-to-Peer BotNet Traffic Analysis and Detection | 임을규 |
2020-09 | Ransomware detection using machine learning algorithms | 임을규 |
2013-10 | Real-time malware detection framework in intrusion detection systems | 임을규 |
2011-06 | RFID Authentication Protocol for Low-cost RFID Tags | 임을규 |
2018-07 | RNN 알고리즘을 이용한 보행분석 기반 개인 인증방법 구현 | 임을규 |
2012-06 | Rule indexing for efficient intrusion detection systems | 임을규 |
2013-10 | Rule-based anti-anti-debugging system | 임을규 |