Jungsuk Song

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2020
CDMC'19 - The 10th International Cybersecurity Data Mining Competition.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

2017
An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment.
Symmetry, 2017

2013
Toward a more practical unsupervised anomaly detection system.
Inf. Sci., 2013

2011
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads.
IEICE Trans. Inf. Syst., 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

Correlation Analysis between Spamming Botnets and Malware Infected Hosts.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010

An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

How to Locate a Target Binary Process and Its Derivatives in System Emulator.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Heuristic-Based Feature Selection Method for Clustering Spam Emails.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010

Working Towards a Primary Binary Analysis System.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM.
IEICE Trans. Commun., 2009

A Methodology for Analyzing Overall Flow of Spam-Based Attacks.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

2008
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System.
IEICE Trans. Inf. Syst., 2008

A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

2007
A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System.
Proceedings of the Advances in Databases: Concepts, 2007

A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts.
Proceedings of the Advances in Computer Science, 2007

2006
A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment.
Proceedings of the Advances in Hybrid Information Technology, 2006

User Centric Intelligent IPMPS in Ubi-Home.
Proceedings of the Computational Science and Its Applications, 2006

2004
Extensible Index Technique for Storing and Retrieving XML Documents.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004


  Loading...