A multimodal deep learning method for android malware detection using various features TG Kim, BJ Kang, M Rho, S Sezer, EG Im IEEE Transactions on Information Forensics and Security 14 (3), 773-788, 2018 | 515 | 2018 |
Multiattribute SCADA-specific intrusion detection system for power networks Y Yang, K McLaughlin, S Sezer, T Littler, EG Im, B Pranggono, HF Wang IEEE Transactions on Power Delivery 29 (3), 1092-1102, 2014 | 201 | 2014 |
Malware analysis using visualized images and entropy graphs KS Han, JH Lim, B Kang, EG Im International Journal of Information Security 14, 1-14, 2015 | 191 | 2015 |
Ransomware detection using machine learning algorithms SI Bae, GB Lee, EG Im Concurrency and Computation: Practice and Experience 32 (18), e5422, 2020 | 129 | 2020 |
Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems Y Yang, K McLaughlin, T Littler, S Sezer, EG Im, ZQ Yao, B Pranggono, ... IET Digital Library, 2012 | 118 | 2012 |
Malware analysis method using visualization of binary files KS Han, JH Lim, EG Im Proceedings of the 2013 Research in Adaptive and Convergent Systems, 317-321, 2013 | 116 | 2013 |
Malware analysis using visualized image matrices KS Han, BJ Kang, EG Im The Scientific World Journal 2014 (1), 132713, 2014 | 90 | 2014 |
SVM training phase reduction using dataset feature filtering for malware detection P O'Kane, S Sezer, K McLaughlin, EG Im IEEE transactions on information forensics and security 8 (3), 500-509, 2013 | 90 | 2013 |
Software plagiarism detection: a graph-based approach DK Chae, J Ha, SW Kim, BJ Kang, EG Im Proceedings of the 22nd ACM international conference on Information …, 2013 | 81 | 2013 |
Malware classification method via binary content comparison B Kang, T Kim, H Kwon, Y Choi, EG Im Proceedings of the 2012 ACM Research in Applied Computation Symposium, 316-321, 2012 | 50 | 2012 |
Malware Similarity Analysis using API Sequence Alignments. IK Cho, TG Kim, YJ Shim, H Park, B Choi, EG Im J. Internet Serv. Inf. Secur. 4 (4), 103-114, 2014 | 46 | 2014 |
Malware classification using instruction frequencies KS Han, B Kang, EG Im Proceedings of the 2011 ACM Symposium on Research in Applied Computation …, 2011 | 41 | 2011 |
Extracting the representative API call patterns of malware families using recurrent neural network I Kwon, EG Im Proceedings of the international conference on research in adaptive and …, 2017 | 39 | 2017 |
Android malware classification method: Dalvik bytecode frequency analysis B Kang, BJ Kang, J Kim, EG Im Proceedings of the 2013 research in adaptive and convergent systems, 349-350, 2013 | 38 | 2013 |
Malware classification methods using API sequence characteristics KS Han, IK Kim, EG Im Proceedings of the International Conference on IT Convergence and Security …, 2012 | 37 | 2012 |
Malware classification using byte sequence information B Jung, T Kim, EG Im Proceedings of the 2018 Conference on Research in Adaptive and Convergent …, 2018 | 33 | 2018 |
Binary executable file similarity calculation using function matching TG Kim, YR Lee, BJ Kang, EG Im The Journal of Supercomputing 75, 607-622, 2019 | 30 | 2019 |
An Automatic Malware Classification System using String List and APIs JW Park, ST Moon, GW Son, IK Kim, KS Han, EG Im, IG Kim Journal of Security Engineering 8 (5), 611-626, 2011 | 29 | 2011 |
Malware analysis and classification using sequence alignments IK Cho, TG Kim, YJ Shim, M Ryu, EG Im Intelligent Automation & Soft Computing 22 (3), 371-377, 2016 | 27 | 2016 |
Extracting representative API patterns of malware families using multiple sequence alignments IK Cho, EG Im Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015 | 26 | 2015 |