팔로우
Taeguen Kim
Taeguen Kim
sch.ac.kr의 이메일 확인됨
제목
인용
인용
연도
A multimodal deep learning method for android malware detection using various features
TG Kim, BJ Kang, M Rho, S Sezer, EG Im
IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018
4972018
Malware Similarity Analysis using API Sequence Alignments.
IK Cho, TG Kim, YJ Shim, H Park, B Choi, EG Im
J. Internet Serv. Inf. Secur. 4 (4), 103-114, 2014
452014
Malware classification using byte sequence information
B Jung, T Kim, EG Im
Proceedings of the 2018 Conference on Research in Adaptive and Convergent …, 2018
312018
Binary executable file similarity calculation using function matching
TG Kim, YR Lee, BJ Kang, EG Im
The Journal of Supercomputing 75, 607-622, 2019
292019
Malware analysis and classification using sequence alignments
IK Cho, TG Kim, YJ Shim, M Ryu, EG Im
Intelligent Automation & Soft Computing 22 (3), 371-377, 2016
272016
Structural information based malicious app similarity calculation and clustering
J Kim, TG Kim, EG Im
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
242015
Survey of dynamic taint analysis
J Kim, TG Kim, EG Im
2014 4th IEEE International Conference on Network Infrastructure and Digital …, 2014
212014
Fast malware family detection method using control flow graphs
B Kang, HS Kim, T Kim, H Kwon, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011
182011
Runtime detection framework for android malware
TG Kim, BJ Kang, EG Im
Mobile Information Systems 2018, 2018
142018
TASEL: dynamic taint analysis with selective control dependency
B Kang, TG Kim, BJ Kang, EG Im, M Ryu
Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014
122014
In-Kyoung Kim, and Eul Gyu Im," Malware detection method via major block comparison,"
TG Kim
Journal of Security Engineering 9 (5), 401-416, 2012
82012
Touch gesture data based authentication method for smartphone users
JG Park, TG Kim, EG Im
Proceedings of the International Conference on Research in Adaptive and …, 2016
42016
Analysis Method Reuse Code to Detect Variants of Malware
T Kim, E Im
Journal of The Korea Institute of information Security & Cryptology 24 (1 …, 2014
42014
Fast Malware Classification using Counting Bloom Filter1
BJ Kang, HS Kim, T Kim, H Kwon, EG Im
International Information Institute (Tokyo). Information 15 (7), 2879, 2012
42012
User authentication method using shaking actions in mobile devices
TK Lee, TG Kim, EG Im
Proceedings of the International Conference on Research in Adaptive and …, 2016
32016
Similarity calculation method for user-define functions to detect malware variants
TG Kim, JB Park, IG Cho, B Kang, EG Im, SY Kang
Proceedings of the 2014 Conference on Research in Adaptive and Convergent …, 2014
32014
악성코드 탐지 정확성 향상을 위한 행위 별 API List 비교 분석
김태근, 임을규
한국통신학회 학술대회논문집, 663-664, 2011
32011
An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network
T Kim, J Kim, I You
Electronics 12 (17), 3543, 2023
22023
User authentication method via speaker recognition and speech synthesis detection
H Park, TG Kim
Security and Communication Networks 2022, 1-10, 2022
22022
A study on selecting key Opcodes for malware classification and its Usefulness
JB Park, KS Han, TG Kim, EG Im
Journal of KIISE 42 (5), 558-565, 2015
22015
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20