Byungho Min

Affiliations:
  • Macquarie University, Sydney, Australia


According to our database1, Byungho Min authored at least 16 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A novel malware for subversion of self-protection in anti-virus.
Softw. Pract. Exp., 2016

Rethinking Software Component Security: Software Component Level Integrity and Cross Verification.
Comput. J., 2016

Cascading attacks against smart grid using control command disaggregation and services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
Design, implementation and evaluation of a novel anti-virus parasitic malware.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT).
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Secure Dynamic Software Loading and Execution Using Cross Component Verification.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Antivirus security: naked during updates.
Softw. Pract. Exp., 2014

Design and Analysis of a New Feature-Distributed Malware.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Simple and Novel Technique for Counteracting Exploit Kits.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

10 Gb/s adaptive receive-side near-end and far-end crosstalk cancellation circuitry.
Proceedings of the IEEE 57th International Midwest Symposium on Circuits and Systems, 2014

Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Feature-Distributed Malware Attack: Risk and Defence.
Proceedings of the Computer Security - ESORICS 2014, 2014

A New Technique for Counteracting Web Browser Exploits.
Proceedings of the 23rd Australian Software Engineering Conference, 2014

2013
Design and Analysis of a Sophisticated Malware Attack Against Smart Grid.
Proceedings of the Information Security, 16th International Conference, 2013

2012
A 20 Gb/s triple-mode (PAM-2, PAM-4, and duobinary) transmitter.
Microelectron. J., 2012

2008
A compound framework for sports results prediction: A football case study.
Knowl. Based Syst., 2008


  Loading...