Eul Gyu Im
Eul Gyu Im
Hanyang University
Verifierad e-postadress på ehanyang.ac.kr - Startsida
Titel
Citeras av
Citeras av
År
Multiattribute SCADA-specific intrusion detection system for power networks
Y Yang, K McLaughlin, S Sezer, T Littler, EG Im, B Pranggono, HF Wang
IEEE Transactions on Power Delivery 29 (3), 1092-1102, 2014
1372014
Malware analysis using visualized images and entropy graphs
KS Han, JH Lim, B Kang, EG Im
International Journal of Information Security 14 (1), 1-14, 2015
1062015
A multimodal deep learning method for android malware detection using various features
TG Kim, BJ Kang, M Rho, S Sezer, EG Im
IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018
1022018
Malware analysis method using visualization of binary files
KS Han, JH Lim, EG Im
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 317-321, 2013
702013
Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems
Y Yang, K McLaughlin, T Littler, S Sezer, EG Im, ZQ Yao, B Pranggono, ...
IET Digital Library, 2012
702012
SVM training phase reduction using dataset feature filtering for malware detection
P O'Kane, S Sezer, K McLaughlin, EG Im
IEEE transactions on information forensics and security 8 (3), 500-509, 2013
602013
Malware analysis using visualized image matrices
KS Han, BJ Kang, EG Im
The Scientific World Journal 2014, 2014
512014
Software plagiarism detection: a graph-based approach
DK Chae, J Ha, SW Kim, BJ Kang, EG Im
Proceedings of the 22nd ACM international conference on Information …, 2013
432013
Malware classification method via binary content comparison
B Kang, T Kim, H Kwon, Y Choi, EG Im
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 316-321, 2012
372012
Malware classification using instruction frequencies
KS Han, B Kang, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011
302011
Malware classification methods using API sequence characteristics
KS Han, IK Kim, EG Im
Proceedings of the International Conference on IT Convergence and Security …, 2012
272012
An automatic malware classification system using string list and apis
JW Park, ST Moon, GW Son, IK Kim, KS Han, EG Im, IG Kim
Journal of Security Engineering 8 (5), 611-626, 2011
262011
Android malware classification method: Dalvik bytecode frequency analysis
B Kang, BJ Kang, J Kim, EG Im
Proceedings of the 2013 research in adaptive and convergent systems, 349-350, 2013
242013
Malware Similarity Analysis using API Sequence Alignments.
IK Cho, TG Kim, YJ Shim, H Park, B Choi, EG Im
J. Internet Serv. Inf. Secur. 4 (4), 103-114, 2014
222014
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering
BJ Kang, KS Han, B Kang, EG Im
Digital Investigation 11 (4), 323-335, 2014
212014
Fast malware family detection method using control flow graphs
B Kang, HS Kim, T Kim, H Kwon, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011
172011
Safe patch distribution architecture in intranet environments
TS Sohn, JS Moon, CW Lee, EG Im, JT Seo
Proceedings of the International Conference on Security and Management, SAM …, 2003
162003
Structural information based malicious app similarity calculation and clustering
J Kim, TG Kim, EG Im
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
152015
Malware detection: program run length against detection rate
P Okane, S Sezer, K McLaughlin, EG Im
IET software 8 (1), 42-51, 2014
152014
Detection methods for malware variant using api call related graphs
KS Han, IK Kim, EG Im
Proceedings of the International Conference on IT Convergence and Security …, 2012
152012
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20