Deep android malware detection N McLaughlin, J Martinez del Rincon, BJ Kang, S Yerima, P Miller, ... Proceedings of the seventh ACM on conference on data and application …, 2017 | 558 | 2017 |
A multimodal deep learning method for android malware detection using various features TG Kim, BJ Kang, M Rho, S Sezer, EG Im IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018 | 515 | 2018 |
Malware analysis using visualized images and entropy graphs KS Han, JH Lim, B Kang, EG Im International Journal of Information Security 14, 1-14, 2015 | 191 | 2015 |
N-opcode analysis for android malware classification and categorization BJ Kang, SY Yerima, K McLaughlin, S Sezer 2016 International conference on cyber security and protection of digital …, 2016 | 127 | 2016 |
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations BJ Kang, P Maynard, K McLaughlin, S Sezer, F Andrén, C Seitl, F Kupzog, ... 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation …, 2015 | 108 | 2015 |
Malware analysis using visualized image matrices KS Han, BJ Kang, EG Im The Scientific World Journal 2014 (1), 132713, 2014 | 90 | 2014 |
Software plagiarism detection: a graph-based approach DK Chae, J Ha, SW Kim, BJ Kang, EG Im Proceedings of the 22nd ACM international conference on Information …, 2013 | 81 | 2013 |
N-gram opcode analysis for android malware detection BJ Kang, SY Yerima, S Sezer, K McLaughlin arXiv preprint arXiv:1612.01445, 2016 | 59 | 2016 |
Malware classification method via binary content comparison B Kang, T Kim, H Kwon, Y Choi, EG Im Proceedings of the 2012 ACM Research in Applied Computation Symposium, 316-321, 2012 | 50 | 2012 |
Towards a stateful analysis framework for smart grid network intrusion detection BJ Kang, K McLaughlin, S Sezer 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016 | 43 | 2016 |
Malware classification using instruction frequencies KS Han, B Kang, EG Im Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011 | 41 | 2011 |
Weighted harvest-then-transmit: UAV-enabled wireless powered communication networks S Cho, K Lee, B Kang, K Koo, I Joe IEEE Access 6, 72212-72224, 2018 | 39 | 2018 |
Android malware classification method: Dalvik bytecode frequency analysis B Kang, BJ Kang, J Kim, EG Im Proceedings of the 2013 research in adaptive and convergent systems, 349-350, 2013 | 38 | 2013 |
Binary executable file similarity calculation using function matching TG Kim, YR Lee, BJ Kang, EG Im The Journal of Supercomputing 75, 607-622, 2019 | 30 | 2019 |
Function matching-based binary-level software similarity calculation YR Lee, BJ Kang, EG Im Proceedings of the 2013 Research in Adaptive and Convergent Systems, 322-327, 2013 | 24 | 2013 |
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering BJ Kang, KS Han, B Kang, EG Im Digital Investigation 11 (4), 323-335, 2014 | 23 | 2014 |
Secure communications in smart grid: Networking and protocols K McLaughlin, I Friedberg, BJ Kang, P Maynard, S Sezer, G McWilliams Smart Grid Security, 113-148, 2015 | 21 | 2015 |
Enforcing policy-based security models for embedded SoCs within the internet of things M Hagan, F Siddiqui, S Sezer, BJ Kang, K McLaughlin 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 | 18 | 2018 |
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system F Yao, SY Yerima, BJ Kang, S Sezer 2017 International Conference on Cyber Security And Protection Of Digital …, 2017 | 17 | 2017 |
Fast malware family detection method using control flow graphs B Kang, HS Kim, T Kim, H Kwon, EG Im Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011 | 17 | 2011 |