Æȷοì
BooJoong Kang
BooJoong Kang
soton.ac.ukÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Deep android malware detection
N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ...
Proceedings of the seventh ACM on conference on data and application ¡¦, 2017
5402017
A multimodal deep learning method for android malware detection using various features
TG Kim, BJ Kang, M Rho, S Sezer, EG Im
IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018
4842018
Malware analysis using visualized images and entropy graphs
KS Han, JH Lim, B Kang, EG Im
International Journal of Information Security 14, 1-14, 2015
1822015
N-opcode analysis for android malware classification and categorization
BJ Kang, SY Yerima, K McLaughlin, S Sezer
2016 International conference on cyber security and protection of digital ¡¦, 2016
1162016
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations
BJ Kang, P Maynard, K McLaughlin, S Sezer, F Andrén, C Seitl, F Kupzog, ...
2015 IEEE 20th Conference on Emerging Technologies & Factory Automation ¡¦, 2015
1052015
Malware analysis using visualized image matrices
KS Han, BJ Kang, EG Im
The Scientific World Journal 2014, 2014
842014
Software plagiarism detection: a graph-based approach
DK Chae, J Ha, SW Kim, BJ Kang, EG Im
Proceedings of the 22nd ACM international conference on Information ¡¦, 2013
782013
N-gram opcode analysis for android malware detection
BJ Kang, SY Yerima, S Sezer, K McLaughlin
arXiv preprint arXiv:1612.01445, 2016
592016
Malware classification method via binary content comparison
B Kang, T Kim, H Kwon, Y Choi, EG Im
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 316-321, 2012
502012
Towards a stateful analysis framework for smart grid network intrusion detection
BJ Kang, K McLaughlin, S Sezer
4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
412016
Malware classification using instruction frequencies
KS Han, B Kang, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation ¡¦, 2011
412011
Weighted harvest-then-transmit: UAV-enabled wireless powered communication networks
S Cho, K Lee, B Kang, K Koo, I Joe
IEEE Access 6, 72212-72224, 2018
382018
Android malware classification method: Dalvik bytecode frequency analysis
B Kang, BJ Kang, J Kim, EG Im
Proceedings of the 2013 research in adaptive and convergent systems, 349-350, 2013
372013
Binary executable file similarity calculation using function matching
TG Kim, YR Lee, BJ Kang, EG Im
The Journal of Supercomputing 75, 607-622, 2019
282019
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering
BJ Kang, KS Han, B Kang, EG Im
Digital Investigation 11 (4), 323-335, 2014
242014
Function matching-based binary-level software similarity calculation
YR Lee, BJ Kang, EG Im
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 322-327, 2013
242013
Secure communications in smart grid: Networking and protocols
K McLaughlin, I Friedberg, BJ Kang, P Maynard, S Sezer, G McWilliams
Smart Grid Security, 113-148, 2015
202015
Fast malware family detection method using control flow graphs
B Kang, HS Kim, T Kim, H Kwon, EG Im
Proceedings of the 2011 ACM Symposium on Research in Applied Computation ¡¦, 2011
182011
Enforcing policy-based security models for embedded SoCs within the internet of things
M Hagan, F Siddiqui, S Sezer, BJ Kang, K McLaughlin
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
172018
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system
F Yao, SY Yerima, BJ Kang, S Sezer
2017 International Conference on Cyber Security And Protection Of Digital ¡¦, 2017
172017
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20