Fast malware classification by automated behavioral graph matching Y Park, D Reeves, V Mulukutla, B Sundaravel Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 270 | 2010 |
Tracing traffic through intermediate hosts that repacketize flows YJ Pyun, YH Park, X Wang, DS Reeves, P Ning IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 159 | 2007 |
Deriving common malware behavior through graph clustering Y Park, D Reeves Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 153 | 2011 |
ECG Biometric Authentication: A Comparative Analysis M Ingale, R Cordeiro, S Thentu, Y Park, N Karimian ACCESS 8, 117853 - 117866, 2020 | 98 | 2020 |
CNN-based android malware detection M Ganesh, P Pednekar, P Prabhuswamy, DS Nair, Y Park, H Jeon 2017 international conference on software security and assurance (ICSSA), 60-65, 2017 | 78 | 2017 |
VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls Juan Dengy, Hongxin Huy, Hongda Liy, Zhizhong Pany, Kuang-Ching Wangy, Gail ... IEEE Conference on Network Function Virtualization & Software Defined …, 2015 | 67 | 2015 |
Software decoys for insider threat Y Park, SJ Stolfo Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 65 | 2012 |
Development of Cloud-based UAV Monitoring and Management System M Itkin, M Kim, Y Park Journal of Sensors 16, 2016 | 60 | 2016 |
P4guard: Designing p4 based firewall R Datta, S Choi, A Chowdhary, Y Park MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-6, 2018 | 56 | 2018 |
Machine-learning based Threat-aware System in Software Defined Networks C Song, Y Park, K Golani, Y Kim, K Bhatt, K Goswami 26th International Conference on Computer Communications and Networks (ICCCN …, 2017 | 56 | 2017 |
Impact of Reviewer Social Interaction on Online Consumer Review Fraud Detection K Goswami, Y Park, Chungsik Song Journal of Big Data, 2017 | 51 | 2017 |
Fast IP hopping randomization to secure hop-by-hop access in SDN SY Chang, Y Park, BBA Babu IEEE Transactions on Network and Service Management 16 (1), 308-320, 2018 | 50 | 2018 |
Eigenvalue analysis for metamorphic detection S Deshpande, Y Park, M Stamp Journal of computer virology and hacking techniques 10, 53-65, 2014 | 50 | 2014 |
Uncle-block attack: Blockchain mining threat beyond block withholding for rational and uncooperative miners SY Chang, Y Park, S Wuthier, CW Chen Applied Cryptography and Network Security: 17th International Conference …, 2019 | 43 | 2019 |
Chair, S AWK Chan, J Voas, X Bai, P Brune, H Cai, D Cao, Y Cao, JY Chung, ... Y., Sit, JW-H., Wong, EM-L., Lee, DT-F., & Fung, OW-M, 31-40, 2016 | 43 | 2016 |
A Sticky Policy Framework for Big Data Security YP Shuyu Li, Tao Zhang, Jerry Gao IEEE International Conference on Big Data Computing Service and Applications, 2015 | 41* | 2015 |
Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks SYC Hitesh Padekar, Younghee Park, Hongxin Hu ACM Symposium on Access Control Models and Technologies (SACMAT), 2016 | 36* | 2016 |
Hyperglycemia identification using ECG in deep learning era R Cordeiro, N Karimian, Y Park Sensors 21 (18), 6263, 2021 | 27 | 2021 |
Interval-based flow watermarking for tracing interactive traffic YJ Pyun, Y Park, DS Reeves, X Wang, P Ning Computer Networks 56 (5), 1646-1665, 2012 | 26 | 2012 |
Antibot: Clustering common semantic patterns for bot detection Y Park, Q Zhang, D Reeves, V Mulukutla 2010 IEEE 34th Annual Computer Software and Applications Conference, 262-272, 2010 | 26 | 2010 |