Eul-Gyu Im

According to our database1, Eul-Gyu Im authored at least 66 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Binary executable file similarity calculation using function matching.
The Journal of Supercomputing, 2019

A Multimodal Deep Learning Method for Android Malware Detection Using Various Features.
IEEE Trans. Information Forensics and Security, 2019

DGA-based malware detection using DNS traffic analysis.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019

Automatic hybrid analysis technique to improve botnet code coverage using fake server.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019

2018
Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model.
Security and Communication Networks, 2018

Runtime Detection Framework for Android Malware.
Mobile Information Systems, 2018

Malware classification using byte sequence information.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

2017
Extracting the Representative API Call Patterns of Malware Families Using Recurrent Neural Network.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

2016
Credible, resilient, and scalable detection of software plagiarism using authority histograms.
Knowl. Based Syst., 2016

Malware Analysis and Classification Using Sequence Alignments.
Intelligent Automation & Soft Computing, 2016

Touch Gesture Data based Authentication Method for Smartphone Users.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

User Authentication Method using Shaking Actions in Mobile Devices.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

Mobile-based continuous user authentication system for cloud security.
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016

2015
Malware analysis using visualized images and entropy graphs.
Int. J. Inf. Sec., 2015

A Study on Similarity Calculation Method for API Invocation Sequences.
Proceedings of the Rough Sets and Knowledge Technology - 10th International Conference, 2015

Structural information based malicious app similarity calculation and clustering.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

Extracting representative API patterns of malware families using multiple sequence alignments.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2014
Malware Similarity Analysis using API Sequence Alignments.
J. Internet Serv. Inf. Secur., 2014

Malware detection: program run length against detection rate.
IET Software, 2014

Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering.
Digital Investigation, 2014

Analysis of binary code topology for dynamic analysis.
Proceedings of the Symposium on Applied Computing, 2014

Similarity calculation method for user-define functions to detect malware variants.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

TASEL: dynamic taint analysis with selective control dependency.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

2013
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection.
IEEE Trans. Information Forensics and Security, 2013

Android Permission System Violation: Case Study and Refinement.
IJEEI, 2013

Rule-based anti-anti-debugging system.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Function matching-based binary-level software similarity calculation.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Real-time malware detection framework in intrusion detection systems.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Android malware classification method: Dalvik bytecode frequency analysis.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Malware analysis method using visualization of binary files.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Software plagiarism detection: a graph-based approach.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Malware classification method via binary content comparison.
Proceedings of the Research in Applied Computation Symposium, 2012

SaaS-Driven Botnets.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Balanced Indexing Method for Efficient Intrusion Detection Systems.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Rule Indexing for Efficient Intrusion Detection Systems.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Fast malware family detection method using control flow graphs.
Proceedings of the Research in Applied Computation Symposium, 2011

Malware classification using instruction frequencies.
Proceedings of the Research in Applied Computation Symposium, 2011

An Analysis of Malware Attached in Spam.
Proceedings of the International Conference on IT Convergence and Security, 2011

Malware Classification Methods Using API Sequence Characteristics.
Proceedings of the International Conference on IT Convergence and Security, 2011

Detection Methods for Malware Variant Using API Call Related Graphs.
Proceedings of the International Conference on IT Convergence and Security, 2011

A Survey on P2P Botnet Detection.
Proceedings of the International Conference on IT Convergence and Security, 2011

A Study on Instruction Substitution Analysis of Metamorphic Malware.
Proceedings of the International Conference on IT Convergence and Security, 2011

2010
Efficient reuse of local regions in memory-limited mobile devices.
IEEE Trans. Consumer Electronics, 2010

Efficient shortest path finding of k-nearest neighbor objects in road network databases.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2008
Data Protection in Memory Using Byte Reordering.
Proceedings of the Intelligence and Security Informatics, 2008

2007
A Hybrid Model for Worm Simulations in a Large Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Effective Elimination of Redundant Packets in Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Survey on low power routing protocols in MANET from security viewpoints.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures.
Proceedings of the Computational Science and Its Applications, 2007

2006
Cascade Damage Estimation Model for Internet Attacks.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

A New Methodology of Analyzing Security Vulnerability for Network Services.
Proceedings of the Intelligence and Security Informatics, 2006

Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
Proceedings of the Intelligence and Security Informatics, 2006

Hybrid Modeling for Large-Scale Worm Propagation Simulations.
Proceedings of the Intelligence and Security Informatics, 2006

Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
Proceedings of the Computational Science and Its Applications, 2006

Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model.
Proceedings of the Computational Science and Its Applications, 2006

2005
Adaptation Policies for Web Server Intrusion-Tolerant System.
IEICE Transactions, 2005

Secure Contents Distribution Using Flash Memory Technology.
Proceedings of the Intelligence and Security Informatics, 2005

An Adaptive Approach to Handle DoS Attack for Web Services.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Vulnerability Analysis and Evaluation within an Intranet.
Proceedings of the Intelligence and Security Informatics, 2004

A Scalable, Ordered Scenario-Based Network Security Simulator.
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004

Adaptive Architecture for Web Server Survivability.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
Intrusion-Tolerant System Design for Web Server Survivability.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003

Distributed Garbage Collection by Timeouts and Backward Inquiry.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

A Flexible Framework for Replication in Distributed Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003


  Loading...