Mirang Park

According to our database1, Mirang Park authored at least 46 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar.
Future Internet, August, 2024

2022
Correction to: Proposal and evaluation for color constancy CAPTCHA.
Artif. Life Robotics, 2022

2021
Proposal and evaluation for color constancy CAPTCHA.
Artif. Life Robotics, 2021

Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.
Proceedings of the Advances in Information and Computer Security, 2021

Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
On a user authentication method to realise an authentication system using s-EMG.
Int. J. Grid Util. Comput., 2020

Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication.
Proceedings of the Advances in Internet, 2020

Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker.
Int. J. Netw. Comput., 2019

Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic.
Artif. Life Robotics, 2019

Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG.
Proceedings of the Advances in Networked-based Information Systems, 2019

Gait-Based Authentication for Smart Locks Using Accelerometers in Two Devices.
Proceedings of the Advances in Networked-based Information Systems, 2019

Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule.
Proceedings of the Advances in Networked-based Information Systems, 2019

Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files.
Proceedings of the Advances in Networked-based Information Systems, 2019

Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

2018
A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method.
J. Inf. Process., 2018

On applying support vector machines to a user authentication method using surface electromyogram signals.
Artif. Life Robotics, 2018

Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG.
Proceedings of the Advances in Network-Based Information Systems, 2018

Interactive Video CAPTCHA for Better Resistance to Automated Attack.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

An Examination of Pairing Method with Camera and Acceleration Sensor.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

A Proposal of New Reading Text CAPTCHA using Random Dot Patterns.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks.
Proceedings of the Advances in Internet, 2018

Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance.
Proceedings of the Advances in Internet, 2018

A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG.
Proceedings of the Advances in Internet, 2018

Evaluation of Index Poisoning Method in Large Scale Winny Network.
Proceedings of the Advances in Internet, 2018

2017
Evaluation of feature values of surface electromyograms for user authentication on mobile devices.
Artif. Life Robotics, 2017

Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation.
IEEE Access, 2017

Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method.
Proceedings of the Advances in Network-Based Information Systems, 2017

Empirical Evaluation of Rhythm-Based Authentication Method for Mobile Devices.
Proceedings of the Advances in Network-Based Information Systems, 2017

Development of a Monitoring System Based on Power Consumption.
Proceedings of the Advances in Network-Based Information Systems, 2017

2016
SGM: A Subgroup Management Scheme Using K-Means Clustering in M2M Systems.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Unsupervised SPITters Detection Scheme for Unbalanced Callers.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device.
J. Robotics Netw. Artif. Life, 2015

Security Evaluation System for Android Applications Using User's Reviews and Permissions.
J. Robotics Netw. Artif. Life, 2015

Proposal and Its Evaluation of Neighbors Based Routing for ad hoc networks.
J. Robotics Netw. Artif. Life, 2015

Proposal of Rhythm Authentication Method Using Users Classification by Self-Organizing Map.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Study of Filter Sharing Method Using Virtual Peers in P2P Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Content Access Control Scheme for P2P Networks Using a Reputation Value.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Proposal of a Puzzle Authentication Method with Shoulder-surfing Attack Resistance.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Investigation of the routing method based on the number of neighbor nodes.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

2006
A proposal and its evaluations of a re-keying system for dynamic secure group communications.
Syst. Comput. Jpn., 2006

A New User Authentication Protocol for Mobile Terminals in Wireless Network.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

2004
A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group Communications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...