System and method for modeling activity patterns of network traffic to detect botnets HC Jeong, CT Im, SG Ji, JH Oh, DW Kang, TJ Lee, YG Won US Patent App. 12/821,510, 2011 | 145 | 2011 |
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient T Lee, B Choi, Y Shin, J Kwak The Journal of Supercomputing 74, 3489-3503, 2018 | 46 | 2018 |
E-sfd: Explainable sensor fault detection in the ics anomaly detection system C Hwang, T Lee IEEE Access 9, 140470-140486, 2021 | 38 | 2021 |
Anomaly based unknown intrusion detection in endpoint environments S Kim, C Hwang, T Lee Electronics 9 (6), 1022, 2020 | 36 | 2020 |
Method of detecting anomalies suspected of attack, based on time series statistics YI Han, DH Yoo, HS Cho, BM Choi, NH Kim, TW Hwang, HK Kang, ... US Patent App. 14/639,357, 2016 | 28 | 2016 |
Blockchain-based iot device authentication scheme B Park, T Lee, J Kwak Journal of the Korea Institute of Information Security & Cryptology 27 (2 …, 2017 | 27 | 2017 |
Effective and reliable malware group classification for a massive malware environment T Lee, J Kwak International Journal of Distributed Sensor Networks 12 (5), 4601847, 2016 | 22 | 2016 |
Feature selection practice for unsupervised learning of credit card fraud detection H Lee, D Choi, H Yim, E Choi, W Go, T Lee, I Kim, K Lee Journal of Theoretical and Applied Information Technology 96 (2), 408-417, 2018 | 21 | 2018 |
Malicious traffic isolation system and method using botnet information HC Jeong, CT Im, SG Ji, JH Oh, DW Kang, TJ Lee, YG Won US Patent App. 12/821,549, 2011 | 21 | 2011 |
Cost-effective valuable data detection based on the reliability of artificial intelligence H Kim, Y Lee, E Lee, T Lee IEEE Access 9, 108959-108974, 2021 | 18 | 2021 |
A survey of fraud detection research based on transaction analysis and data mining technique SH Jeong, H Kim, Y Shin, T Lee, HK Kim Journal of The Korea Institute of Information Security & Cryptology 25 (6 …, 2015 | 17 | 2015 |
Platform-independent malware analysis applicable to windows and linux environments C Hwang, J Hwang, J Kwak, T Lee Electronics 9 (5), 793, 2020 | 15 | 2020 |
Birds of a Feature: Intrafamily Clustering for Version Identification of Packed Malware LH Park, J Yu, HK Kang, T Lee, T Kwon IEEE Systems Journal 14 (3), 4545-4556, 2020 | 15 | 2020 |
Semi-supervised based unknown attack detection in EDR environment C Hwang, D Kim, T Lee KSII Transactions on Internet and Information Systems (TIIS) 14 (12), 4909-4926, 2020 | 14 | 2020 |
Effective DGA-Domain detection and classification with TextCNN and additional features C Hwang, H Kim, H Lee, T Lee Electronics 9 (7), 1070, 2020 | 11 | 2020 |
A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique S Kim, J Ha, S Oh, T Lee Journal of the Korea Institute of Information Security & Cryptology 29 (4 …, 2019 | 11 | 2019 |
Apparatus and method for detecting fraudulent transaction using machine learning EY Choi, GO Woong, MJ Kim, TJ Lee US Patent App. 15/006,541, 2017 | 10 | 2017 |
A study on behavior-based mobile malware analysis system against evasion techniques M Kim, TJ Lee, Y Shin, HY Youm 2016 international conference on information networking (ICOIN), 455-457, 2016 | 10 | 2016 |
Detection of advanced persistent threat by analyzing the big data log J Kim, T Lee, H Kim, H Park Advanced Science and Technology Letters 29, 30-36, 2013 | 10 | 2013 |
Stacked-autoencoder based anomaly detection with industrial control system D Kim, C Hwang, T Lee Software Engineering, Artificial Intelligence, Networking and Parallel …, 2021 | 8 | 2021 |