TaeGuen Kim

According to our database1, TaeGuen Kim authored at least 15 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Binary executable file similarity calculation using function matching.
The Journal of Supercomputing, 2019

A Multimodal Deep Learning Method for Android Malware Detection Using Various Features.
IEEE Trans. Information Forensics and Security, 2019

2018
Runtime Detection Framework for Android Malware.
Mobile Information Systems, 2018

Malware classification using byte sequence information.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

2016
Malware Analysis and Classification Using Sequence Alignments.
Intelligent Automation & Soft Computing, 2016

Touch Gesture Data based Authentication Method for Smartphone Users.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

User Authentication Method using Shaking Actions in Mobile Devices.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016

Mobile-based continuous user authentication system for cloud security.
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016

2015
A Study on Similarity Calculation Method for API Invocation Sequences.
Proceedings of the Rough Sets and Knowledge Technology - 10th International Conference, 2015

Structural information based malicious app similarity calculation and clustering.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2014
Malware Similarity Analysis using API Sequence Alignments.
J. Internet Serv. Inf. Secur., 2014

Similarity calculation method for user-define functions to detect malware variants.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

TASEL: dynamic taint analysis with selective control dependency.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

2013
Real-time malware detection framework in intrusion detection systems.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

2011
Fast malware family detection method using control flow graphs.
Proceedings of the Research in Applied Computation Symposium, 2011


  Loading...