关注
taejin Lee
taejin Lee
在 hoseo.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
System and method for modeling activity patterns of network traffic to detect botnets
HC Jeong, CT Im, SG Ji, JH Oh, DW Kang, TJ Lee, YG Won
US Patent App. 12/821,510, 2011
1452011
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient
T Lee, B Choi, Y Shin, J Kwak
The Journal of Supercomputing 74, 3489-3503, 2018
462018
E-sfd: Explainable sensor fault detection in the ics anomaly detection system
C Hwang, T Lee
IEEE Access 9, 140470-140486, 2021
382021
Anomaly based unknown intrusion detection in endpoint environments
S Kim, C Hwang, T Lee
Electronics 9 (6), 1022, 2020
362020
Method of detecting anomalies suspected of attack, based on time series statistics
YI Han, DH Yoo, HS Cho, BM Choi, NH Kim, TW Hwang, HK Kang, ...
US Patent App. 14/639,357, 2016
282016
Blockchain-based iot device authentication scheme
B Park, T Lee, J Kwak
Journal of the Korea Institute of Information Security & Cryptology 27 (2 …, 2017
272017
Effective and reliable malware group classification for a massive malware environment
T Lee, J Kwak
International Journal of Distributed Sensor Networks 12 (5), 4601847, 2016
222016
Feature selection practice for unsupervised learning of credit card fraud detection
H Lee, D Choi, H Yim, E Choi, W Go, T Lee, I Kim, K Lee
Journal of Theoretical and Applied Information Technology 96 (2), 408-417, 2018
212018
Malicious traffic isolation system and method using botnet information
HC Jeong, CT Im, SG Ji, JH Oh, DW Kang, TJ Lee, YG Won
US Patent App. 12/821,549, 2011
212011
Cost-effective valuable data detection based on the reliability of artificial intelligence
H Kim, Y Lee, E Lee, T Lee
IEEE Access 9, 108959-108974, 2021
182021
A survey of fraud detection research based on transaction analysis and data mining technique
SH Jeong, H Kim, Y Shin, T Lee, HK Kim
Journal of The Korea Institute of Information Security & Cryptology 25 (6 …, 2015
172015
Platform-independent malware analysis applicable to windows and linux environments
C Hwang, J Hwang, J Kwak, T Lee
Electronics 9 (5), 793, 2020
152020
Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware
LH Park, J Yu, HK Kang, T Lee, T Kwon
IEEE Systems Journal 14 (3), 4545-4556, 2020
152020
Semi-supervised based unknown attack detection in EDR environment
C Hwang, D Kim, T Lee
KSII Transactions on Internet and Information Systems (TIIS) 14 (12), 4909-4926, 2020
142020
Effective DGA-Domain detection and classification with TextCNN and additional features
C Hwang, H Kim, H Lee, T Lee
Electronics 9 (7), 1070, 2020
112020
A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique
S Kim, J Ha, S Oh, T Lee
Journal of the Korea Institute of Information Security & Cryptology 29 (4 …, 2019
112019
Apparatus and method for detecting fraudulent transaction using machine learning
EY Choi, GO Woong, MJ Kim, TJ Lee
US Patent App. 15/006,541, 2017
102017
A study on behavior-based mobile malware analysis system against evasion techniques
M Kim, TJ Lee, Y Shin, HY Youm
2016 international conference on information networking (ICOIN), 455-457, 2016
102016
Detection of advanced persistent threat by analyzing the big data log
J Kim, T Lee, H Kim, H Park
Advanced Science and Technology Letters 29, 30-36, 2013
102013
Stacked-autoencoder based anomaly detection with industrial control system
D Kim, C Hwang, T Lee
Software Engineering, Artificial Intelligence, Networking and Parallel …, 2021
82021
系统目前无法执行此操作,请稍后再试。
文章 1–20