default search action
Boojoong Kang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]George Giamouridis, BooJoong Kang, Leonardo Aniello:
Blockchain-based DNS: Current Solutions and Challenges to Adoption. DLT 2024 - 2023
- [c26]Zao Yang, BooJoong Kang:
Broadening The Solution Space of Feature Selection in Time-interval-based Malware Detection. ANT/EDI40 2023: 769-775 - [c25]Amirah Almutairi, BooJoong Kang, Nawfal F. Fadhel:
The Effectiveness of Transformer-Based Models for BEC Attack Detection. NSS 2023: 77-90 - [c24]Amirah Almutairi, BooJoong Kang, Nawfal Al Hashimy:
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM. UbiSec 2023: 17-30 - 2022
- [j10]Inwoo Ro, Boojoong Kang, Choonghyun Seo, Eul Gyu Im:
Detection Method for Randomly Generated User IDs: Lift the Curse of Dimensionality. IEEE Access 10: 86020-86028 (2022) - 2020
- [c23]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems. ISGT 2020: 1-5 - [c22]Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David M. Laverty, Sakir Sezer:
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things. WF-IoT 2020: 1-6
2010 – 2019
- 2019
- [j9]TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. IEEE Trans. Inf. Forensics Secur. 14(3): 773-788 (2019) - [j8]TaeGuen Kim, Yeo Reum Lee, BooJoong Kang, Eul Gyu Im:
Binary executable file similarity calculation using function matching. J. Supercomput. 75(2): 607-622 (2019) - [c21]BooJoong Kang, David Umsonst, Mario Faschang, Christian Seitl, Ivo Friedberg, Friederich Kupzog, Henrik Sandberg, Kieran McLaughlin:
Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control. CRITIS 2019: 97-109 - 2018
- [j7]Sungryung Cho, Kyungrak Lee, Boojoong Kang, Kwangmin Koo, Inwhee Joe:
Weighted Harvest-Then-Transmit: UAV-Enabled Wireless Powered Communication Networks. IEEE Access 6: 72212-72224 (2018) - [j6]Sungryung Cho, Kyungrak Lee, BooJoong Kang, Inwhee Joe:
A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks. EURASIP J. Wirel. Commun. Netw. 2018: 9 (2018) - [j5]TaeGuen Kim, Boojoong Kang, Eul Gyu Im:
Runtime Detection Framework for Android Malware. Mob. Inf. Syst. 2018: 8094314:1-8094314:15 (2018) - [c20]Matthew Hagan, Fahad Siddiqui, Sakir Sezer, BooJoong Kang, Kieran McLaughlin:
Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things. DSC 2018: 1-8 - [c19]Matthew Hagan, BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. PST 2018: 1-5 - 2017
- [c18]Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Deep Android Malware Detection. CODASPY 2017: 301-308 - [c17]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. Cyber Security 2017: 1-7 - [i6]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System. CoRR abs/1705.06715 (2017) - 2016
- [j4]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. Int. J. Cyber Situational Aware. 1(1): 231-255 (2016) - [j3]Dong-Kyu Chae, Jiwoon Ha, Sang-Wook Kim, Boojoong Kang, Eul Gyu Im, Sunju Park:
Credible, resilient, and scalable detection of software plagiarism using authority histograms. Knowl. Based Syst. 95: 114-124 (2016) - [c16]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode analysis for android malware classification and categorization. Cyber Security And Protection Of Digital Services 2016: 1-7 - [c15]BooJoong Kang, Kieran McLaughlin, Sakir Sezer:
Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection. ICS-CSR 2016 - [i5]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Event-Driven Implicit Authentication for Mobile Access Control. CoRR abs/1607.08101 (2016) - [i4]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
N-opcode Analysis for Android Malware Classification and Categorization. CoRR abs/1607.08149 (2016) - [i3]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in Malware Categorization. CoRR abs/1608.00866 (2016) - [i2]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Fuzzy Logic-based Implicit Authentication for Mobile Access Control. CoRR abs/1611.03343 (2016) - [i1]BooJoong Kang, Suleiman Y. Yerima, Sakir Sezer, Kieran McLaughlin:
N-gram Opcode Analysis for Android Malware Detection. CoRR abs/1612.01445 (2016) - 2015
- [j2]Kyoung-Soo Han, Jae Hyun Lim, Boojoong Kang, Eul Gyu Im:
Malware analysis using visualized images and entropy graphs. Int. J. Inf. Sec. 14(1): 1-14 (2015) - [c14]BooJoong Kang, Peter Maynard, Kieran McLaughlin, Sakir Sezer, Filip Andren, Christian Seitl, Friederich Kupzog, Thomas I. Strasser:
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations. ETFA 2015: 1-8 - [c13]Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer:
Event-Driven Implicit Authentication for Mobile Access Control. NGMAST 2015: 248-255 - [c12]BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer:
PageRank in malware categorization. RACS 2015: 291-295 - 2014
- [j1]Boojoong Kang, Kyoung-Soo Han, Byeongho Kang, Eul Gyu Im:
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering. Digit. Investig. 11(4): 323-335 (2014) - [c11]TaeGuen Kim, Jung Bin Park, In Gyeom Cho, Boojoong Kang, Eul Gyu Im, Sooyong Kang:
Similarity calculation method for user-define functions to detect malware variants. RACS 2014: 236-241 - [c10]Byeongho Kang, TaeGuen Kim, Boojoong Kang, Eul Gyu Im, Minsoo Ryu:
TASEL: dynamic taint analysis with selective control dependency. RACS 2014: 272-277 - 2013
- [c9]Dong-Kyu Chae, Jiwoon Ha, Sang-Wook Kim, Boojoong Kang, Eul Gyu Im:
Software plagiarism detection: a graph-based approach. CIKM 2013: 1577-1580 - [c8]Yeo Reum Lee, Boojoong Kang, Eul Gyu Im:
Function matching-based binary-level software similarity calculation. RACS 2013: 322-327 - [c7]Byeongho Kang, Boojoong Kang, Jungtae Kim, Eul Gyu Im:
Android malware classification method: Dalvik bytecode frequency analysis. RACS 2013: 349-350 - [c6]JaeKeun Lee, Boojoong Kang, Eul Gyu Im:
Rule-based anti-anti-debugging system. RACS 2013: 353-354 - 2012
- [c5]Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im:
Balanced Indexing Method for Efficient Intrusion Detection Systems. ICISC 2012: 37-48 - [c4]Boojoong Kang, TaeGuen Kim, Heejun Kwon, Yangseo Choi, Eul Gyu Im:
Malware classification method via binary content comparison. RACS 2012: 316-321 - 2011
- [c3]Boojoong Kang, Hye Seon Kim, TaeGuen Kim, Heejun Kwon, Eul Gyu Im:
Fast malware family detection method using control flow graphs. RACS 2011: 287-292 - [c2]Kyoung-Soo Han, Boojoong Kang, Eul Gyu Im:
Malware classification using instruction frequencies. RACS 2011: 298-300 - [c1]Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im:
Rule Indexing for Efficient Intrusion Detection Systems. WISA 2011: 136-141
Coauthor Index
aka: Eul Gyu Im
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint