BibTeX records: Eul-Gyu Im

download as .bib file

@article{DBLP:journals/access/JooKHIK25,
  author       = {Jeonghyeon Joo and
                  Hyojune Kim and
                  Hyuck Han and
                  Eul Gyu Im and
                  Sooyong Kang},
  title        = {Highly Parallel Regular Expression Matching Using a Real Processing-in-Memory
                  System},
  journal      = {{IEEE} Access},
  volume       = {13},
  pages        = {18937--18951},
  year         = {2025},
  url          = {https://doi.org/10.1109/ACCESS.2025.3532944},
  doi          = {10.1109/ACCESS.2025.3532944},
  timestamp    = {Fri, 14 Feb 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JooKHIK25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ubisec/RaiI23,
  author       = {Andri Rai and
                  Eul Gyu Im},
  editor       = {Guojun Wang and
                  Haozhe Wang and
                  Geyong Min and
                  Nektarios Georgalas and
                  Weizhi Meng},
  title        = {Multi-NetDroid: Multi-layer Perceptron Neural Network for Android
                  Malware Detection},
  booktitle    = {Ubiquitous Security - Third International Conference, UbiSec 2023,
                  Exeter, UK, November 1-3, 2023, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {2034},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1274-8\_15},
  doi          = {10.1007/978-981-97-1274-8\_15},
  timestamp    = {Thu, 20 Feb 2025 13:59:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ubisec/RaiI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RoKSI22,
  author       = {Inwoo Ro and
                  Boojoong Kang and
                  Choonghyun Seo and
                  Eul Gyu Im},
  title        = {Detection Method for Randomly Generated User IDs: Lift the Curse of
                  Dimensionality},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {86020--86028},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3198687},
  doi          = {10.1109/ACCESS.2022.3198687},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RoKSI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/JungBCI20,
  author       = {ByeongHo Jung and
                  Seong Il Bae and
                  Chang Choi and
                  Eul Gyu Im},
  title        = {Packer identification method based on byte sequences},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {8},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5082},
  doi          = {10.1002/CPE.5082},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/JungBCI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/BaeLI20,
  author       = {Seong Il Bae and
                  Gyu Bin Lee and
                  Eul Gyu Im},
  title        = {Ransomware detection using machine learning algorithms},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {18},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5422},
  doi          = {10.1002/CPE.5422},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/BaeLI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KimKRSI19,
  author       = {TaeGuen Kim and
                  BooJoong Kang and
                  Mina Rho and
                  Sakir Sezer and
                  Eul Gyu Im},
  title        = {A Multimodal Deep Learning Method for Android Malware Detection Using
                  Various Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {3},
  pages        = {773--788},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2866319},
  doi          = {10.1109/TIFS.2018.2866319},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/KimKRSI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimLKI19,
  author       = {TaeGuen Kim and
                  Yeo Reum Lee and
                  BooJoong Kang and
                  Eul Gyu Im},
  title        = {Binary executable file similarity calculation using function matching},
  journal      = {J. Supercomput.},
  volume       = {75},
  number       = {2},
  pages        = {607--622},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11227-016-1941-2},
  doi          = {10.1007/S11227-016-1941-2},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KimLKI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/BaeKI19,
  author       = {Seong Il Bae and
                  Soo Han Kim and
                  Eul Gyu Im},
  editor       = {Chih{-}Cheng Hung and
                  Qianbin Chen and
                  Xianzhong Xie and
                  Christian Esposito and
                  Jun Huang and
                  Juw Won Park and
                  Qinghua Zhang},
  title        = {Automatic hybrid analysis technique to improve botnet code coverage
                  using fake server},
  booktitle    = {Proceedings of the Conference on Research in Adaptive and Convergent
                  Systems, {RACS} 2019, Chongqing, China, September 24-27, 2019},
  pages        = {276--282},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338840.3355670},
  doi          = {10.1145/3338840.3355670},
  timestamp    = {Wed, 17 Aug 2022 11:16:50 +0200},
  biburl       = {https://dblp.org/rec/conf/racs/BaeKI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/LeeCI19,
  author       = {Jong Youn Lee and
                  Jun Young Chang and
                  Eul Gyu Im},
  editor       = {Chih{-}Cheng Hung and
                  Qianbin Chen and
                  Xianzhong Xie and
                  Christian Esposito and
                  Jun Huang and
                  Juw Won Park and
                  Qinghua Zhang},
  title        = {DGA-based malware detection using {DNS} traffic analysis},
  booktitle    = {Proceedings of the Conference on Research in Adaptive and Convergent
                  Systems, {RACS} 2019, Chongqing, China, September 24-27, 2019},
  pages        = {283--288},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338840.3355672},
  doi          = {10.1145/3338840.3355672},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/LeeCI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/KimKI18,
  author       = {TaeGuen Kim and
                  Boojoong Kang and
                  Eul Gyu Im},
  title        = {Runtime Detection Framework for Android Malware},
  journal      = {Mob. Inf. Syst.},
  volume       = {2018},
  pages        = {8094314:1--8094314:15},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/8094314},
  doi          = {10.1155/2018/8094314},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/KimKI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RoHI18,
  author       = {Inwoo Ro and
                  Joong Soo Han and
                  Eul Gyu Im},
  title        = {Detection Method for Distributed Web-Crawlers: {A} Long-Tail Threshold
                  Model},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {9065424:1--9065424:7},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/9065424},
  doi          = {10.1155/2018/9065424},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/RoHI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/JungKI18,
  author       = {Byungho Jung and
                  TaeGuen Kim and
                  Eul Gyu Im},
  editor       = {Chih{-}Cheng Hung and
                  Lamjed Ben Said},
  title        = {Malware classification using byte sequence information},
  booktitle    = {Proceedings of the 2018 Conference on Research in Adaptive and Convergent
                  Systems, {RACS} 2018, Honolulu, HI, USA, October 09-12, 2018},
  pages        = {143--148},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264746.3264775},
  doi          = {10.1145/3264746.3264775},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/JungKI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KwonI17,
  author       = {Iltaek Kwon and
                  Eul Gyu Im},
  title        = {Extracting the Representative {API} Call Patterns of Malware Families
                  Using Recurrent Neural Network},
  booktitle    = {Proceedings of the International Conference on Research in Adaptive
                  and Convergent Systems, {RACS} 2017, Krakow, Poland, September 20-23,
                  2017},
  pages        = {202--207},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3129676.3129712},
  doi          = {10.1145/3129676.3129712},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KwonI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iasc/ChoKSRI16,
  author       = {In Kyeom Cho and
                  TaeGuen Kim and
                  Yu Jin Shim and
                  Minsoo Ryu and
                  Eul Gyu Im},
  title        = {Malware Analysis and Classification Using Sequence Alignments},
  journal      = {Intell. Autom. Soft Comput.},
  volume       = {22},
  number       = {3},
  pages        = {371--377},
  year         = {2016},
  url          = {https://doi.org/10.1080/10798587.2015.1118916},
  doi          = {10.1080/10798587.2015.1118916},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iasc/ChoKSRI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/ChaeHKKIP16,
  author       = {Dong{-}Kyu Chae and
                  Jiwoon Ha and
                  Sang{-}Wook Kim and
                  Boojoong Kang and
                  Eul Gyu Im and
                  Sunju Park},
  title        = {Credible, resilient, and scalable detection of software plagiarism
                  using authority histograms},
  journal      = {Knowl. Based Syst.},
  volume       = {95},
  pages        = {114--124},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.knosys.2015.12.009},
  doi          = {10.1016/J.KNOSYS.2015.12.009},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/ChaeHKKIP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnidc/LiW0I16,
  author       = {Qing Li and
                  Le Wang and
                  TaeGuen Kim and
                  Eul Gyu Im},
  title        = {Mobile-based continuous user authentication system for cloud security},
  booktitle    = {{IEEE} International Conference on Network Infrastructure and Digital
                  Content, {IC-NIDC} 2016, Beijing, China, September 23-25, 2016},
  pages        = {176--179},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNIDC.2016.7974559},
  doi          = {10.1109/ICNIDC.2016.7974559},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icnidc/LiW0I16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/ParkKI16,
  author       = {JunGyu Park and
                  TaeGuen Kim and
                  Eul Gyu Im},
  title        = {Touch Gesture Data based Authentication Method for Smartphone Users},
  booktitle    = {Proceedings of the International Conference on Research in Adaptive
                  and Convergent Systems, {RACS} 2016, Odense, Denmark, October 11-14,
                  2016},
  pages        = {136--141},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2987386.2987410},
  doi          = {10.1145/2987386.2987410},
  timestamp    = {Tue, 06 Nov 2018 11:07:49 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/ParkKI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/LeeKI16,
  author       = {Tae Kyong Lee and
                  TaeGuen Kim and
                  Eul Gyu Im},
  title        = {User Authentication Method using Shaking Actions in Mobile Devices},
  booktitle    = {Proceedings of the International Conference on Research in Adaptive
                  and Convergent Systems, {RACS} 2016, Odense, Denmark, October 11-14,
                  2016},
  pages        = {142--147},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2987386.2987411},
  doi          = {10.1145/2987386.2987411},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/LeeKI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HanLKI15,
  author       = {Kyoung{-}Soo Han and
                  Jae Hyun Lim and
                  Boojoong Kang and
                  Eul Gyu Im},
  title        = {Malware analysis using visualized images and entropy graphs},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {1--14},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0242-0},
  doi          = {10.1007/S10207-014-0242-0},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HanLKI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/ChoI15,
  author       = {In Kyeom Cho and
                  Eul Gyu Im},
  editor       = {Esmaeil S. Nadimi and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Sung{-}Ryul Kim and
                  Wei Wang},
  title        = {Extracting representative {API} patterns of malware families using
                  multiple sequence alignments},
  booktitle    = {Proceedings of the 2015 Conference on research in adaptive and convergent
                  systems, {RACS} 2015, Prague, Czech Republic, October 9-12, 2015},
  pages        = {308--313},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2811411.2811543},
  doi          = {10.1145/2811411.2811543},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/ChoI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KimKI15,
  author       = {Junhyoung Kim and
                  TaeGuen Kim and
                  Eul Gyu Im},
  editor       = {Esmaeil S. Nadimi and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Sung{-}Ryul Kim and
                  Wei Wang},
  title        = {Structural information based malicious app similarity calculation
                  and clustering},
  booktitle    = {Proceedings of the 2015 Conference on research in adaptive and convergent
                  systems, {RACS} 2015, Prague, Czech Republic, October 9-12, 2015},
  pages        = {314--318},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2811411.2811545},
  doi          = {10.1145/2811411.2811545},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KimKI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rskt/ShimKI15,
  author       = {Yu Jin Shim and
                  TaeGuen Kim and
                  Eul Gyu Im},
  editor       = {Davide Ciucci and
                  Guoyin Wang and
                  Sushmita Mitra and
                  Wei{-}Zhi Wu},
  title        = {A Study on Similarity Calculation Method for {API} Invocation Sequences},
  booktitle    = {Rough Sets and Knowledge Technology - 10th International Conference,
                  {RSKT} 2015, held as part of the International Joint Conference on
                  Rough Sets, {IJCRS} 2015, Tianjin, China, November 20-23, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9436},
  pages        = {492--501},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25754-9\_43},
  doi          = {10.1007/978-3-319-25754-9\_43},
  timestamp    = {Tue, 20 Aug 2024 07:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/rskt/ShimKI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KangHKI14,
  author       = {Boojoong Kang and
                  Kyoung{-}Soo Han and
                  Byeongho Kang and
                  Eul Gyu Im},
  title        = {Malware categorization using dynamic mnemonic frequency analysis with
                  redundancy filtering},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {323--335},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.06.003},
  doi          = {10.1016/J.DIIN.2014.06.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KangHKI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/OKaneSMI14,
  author       = {Philip O'Kane and
                  Sakir Sezer and
                  Kieran McLaughlin and
                  Eul Gyu Im},
  title        = {Malware detection: program run length against detection rate},
  journal      = {{IET} Softw.},
  volume       = {8},
  number       = {1},
  pages        = {42--51},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-sen.2013.0020},
  doi          = {10.1049/IET-SEN.2013.0020},
  timestamp    = {Wed, 09 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iee/OKaneSMI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ChoKSPCI14,
  author       = {In Kyeom Cho and
                  TaeGuen Kim and
                  Yu Jin Shim and
                  Haeryong Park and
                  Bomin Choi and
                  Eul Gyu Im},
  title        = {Malware Similarity Analysis using {API} Sequence Alignments},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {103--114},
  year         = {2014},
  url          = {https://doi.org/10.22667/JISIS.2014.11.31.103},
  doi          = {10.22667/JISIS.2014.11.31.103},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ChoKSPCI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KimPCKIK14,
  author       = {TaeGuen Kim and
                  Jung Bin Park and
                  In Gyeom Cho and
                  Boojoong Kang and
                  Eul Gyu Im and
                  Sooyong Kang},
  editor       = {Chao Lu and
                  Esmaeil S. Nadimi and
                  Sung{-}Ryul Kim and
                  Wei Wang},
  title        = {Similarity calculation method for user-define functions to detect
                  malware variants},
  booktitle    = {Proceedings of the 2014 Conference on Research in Adaptive and Convergent
                  Systems, {RACS} 2014, Towson, Maryland, USA, October 5-8, 2014},
  pages        = {236--241},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663761.2664222},
  doi          = {10.1145/2663761.2664222},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/racs/KimPCKIK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KangKKIR14,
  author       = {Byeongho Kang and
                  TaeGuen Kim and
                  Boojoong Kang and
                  Eul Gyu Im and
                  Minsoo Ryu},
  editor       = {Chao Lu and
                  Esmaeil S. Nadimi and
                  Sung{-}Ryul Kim and
                  Wei Wang},
  title        = {{TASEL:} dynamic taint analysis with selective control dependency},
  booktitle    = {Proceedings of the 2014 Conference on Research in Adaptive and Convergent
                  Systems, {RACS} 2014, Towson, Maryland, USA, October 5-8, 2014},
  pages        = {272--277},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663761.2664219},
  doi          = {10.1145/2663761.2664219},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KangKKIR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KangI14,
  author       = {Byeongho Kang and
                  Eul Gyu Im},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {Analysis of binary code topology for dynamic analysis},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1731--1732},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2559912},
  doi          = {10.1145/2554850.2559912},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KangI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijeei/HanLJI13,
  author       = {Kyoung{-}Soo Han and
                  Yeo Reum Lee and
                  Biao Jiang and
                  Eul Gyu Im},
  title        = {Android Permission System Violation: Case Study and Refinement},
  journal      = {Int. J. {E} Entrepreneurship Innov.},
  volume       = {4},
  number       = {1},
  pages        = {16--27},
  year         = {2013},
  url          = {https://doi.org/10.4018/jeei.2013010102},
  doi          = {10.4018/JEEI.2013010102},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijeei/HanLJI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OKaneSMI13,
  author       = {Philip O'Kane and
                  Sakir Sezer and
                  Kieran McLaughlin and
                  Eul Gyu Im},
  title        = {{SVM} Training Phase Reduction Using Dataset Feature Filtering for
                  Malware Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {3},
  pages        = {500--509},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2242890},
  doi          = {10.1109/TIFS.2013.2242890},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OKaneSMI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/ChaeHKKI13,
  author       = {Dong{-}Kyu Chae and
                  Jiwoon Ha and
                  Sang{-}Wook Kim and
                  Boojoong Kang and
                  Eul Gyu Im},
  editor       = {Qi He and
                  Arun Iyengar and
                  Wolfgang Nejdl and
                  Jian Pei and
                  Rajeev Rastogi},
  title        = {Software plagiarism detection: a graph-based approach},
  booktitle    = {22nd {ACM} International Conference on Information and Knowledge Management,
                  CIKM'13, San Francisco, CA, USA, October 27 - November 1, 2013},
  pages        = {1577--1580},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2505515.2507848},
  doi          = {10.1145/2505515.2507848},
  timestamp    = {Sat, 01 Mar 2025 10:58:19 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/ChaeHKKI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/HanLI13,
  author       = {Kyoung{-}Soo Han and
                  Jae Hyun Lim and
                  Eul Gyu Im},
  editor       = {Ching Y. Suen and
                  Amir G. Aghdam and
                  Minyi Guo and
                  Jiman Hong and
                  Esmaeil S. Nadimi},
  title        = {Malware analysis method using visualization of binary files},
  booktitle    = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC,
                  Canada, October 1-4, 2013},
  pages        = {317--321},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513228.2513294},
  doi          = {10.1145/2513228.2513294},
  timestamp    = {Fri, 21 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/racs/HanLI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/LeeKI13,
  author       = {Yeo Reum Lee and
                  Boojoong Kang and
                  Eul Gyu Im},
  editor       = {Ching Y. Suen and
                  Amir G. Aghdam and
                  Minyi Guo and
                  Jiman Hong and
                  Esmaeil S. Nadimi},
  title        = {Function matching-based binary-level software similarity calculation},
  booktitle    = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC,
                  Canada, October 1-4, 2013},
  pages        = {322--327},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513228.2513300},
  doi          = {10.1145/2513228.2513300},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/LeeKI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KangKKI13,
  author       = {Byeongho Kang and
                  Boojoong Kang and
                  Jungtae Kim and
                  Eul Gyu Im},
  editor       = {Ching Y. Suen and
                  Amir G. Aghdam and
                  Minyi Guo and
                  Jiman Hong and
                  Esmaeil S. Nadimi},
  title        = {Android malware classification method: Dalvik bytecode frequency analysis},
  booktitle    = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC,
                  Canada, October 1-4, 2013},
  pages        = {349--350},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513228.2513295},
  doi          = {10.1145/2513228.2513295},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KangKKI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KimKI13,
  author       = {Sunwoo Kim and
                  TaeGuen Kim and
                  Eul Gyu Im},
  editor       = {Ching Y. Suen and
                  Amir G. Aghdam and
                  Minyi Guo and
                  Jiman Hong and
                  Esmaeil S. Nadimi},
  title        = {Real-time malware detection framework in intrusion detection systems},
  booktitle    = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC,
                  Canada, October 1-4, 2013},
  pages        = {351--352},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513228.2513297},
  doi          = {10.1145/2513228.2513297},
  timestamp    = {Sun, 22 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/racs/KimKI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/LeeKI13a,
  author       = {JaeKeun Lee and
                  Boojoong Kang and
                  Eul Gyu Im},
  editor       = {Ching Y. Suen and
                  Amir G. Aghdam and
                  Minyi Guo and
                  Jiman Hong and
                  Esmaeil S. Nadimi},
  title        = {Rule-based anti-anti-debugging system},
  booktitle    = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC,
                  Canada, October 1-4, 2013},
  pages        = {353--354},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513228.2513301},
  doi          = {10.1145/2513228.2513301},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/LeeKI13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KangKYI12,
  author       = {Boojoong Kang and
                  Hye Seon Kim and
                  Ji Su Yang and
                  Eul Gyu Im},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Balanced Indexing Method for Efficient Intrusion Detection Systems},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {37--48},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_4},
  doi          = {10.1007/978-3-642-37682-5\_4},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KangKYI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/JiangIK12,
  author       = {Biao Jiang and
                  Eul Gyu Im and
                  Yunmo Koo},
  editor       = {Michael Chau and
                  G. Alan Wang and
                  Wei Thoo Yue and
                  Hsinchun Chen},
  title        = {SaaS-Driven Botnets},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7299},
  pages        = {198--206},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30428-6\_17},
  doi          = {10.1007/978-3-642-30428-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/JiangIK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KangKKCI12,
  author       = {Boojoong Kang and
                  TaeGuen Kim and
                  Heejun Kwon and
                  Yangseo Choi and
                  Eul Gyu Im},
  editor       = {Yookun Cho and
                  Rex E. Gantenbein and
                  Tei{-}Wei Kuo and
                  Vahid Tarokh},
  title        = {Malware classification method via binary content comparison},
  booktitle    = {Research in Applied Computation Symposium, {RACS} '12, San Antonio,
                  TX, USA, October 23-26, 2012},
  pages        = {316--321},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2401603.2401672},
  doi          = {10.1145/2401603.2401672},
  timestamp    = {Sat, 10 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/racs/KangKKCI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HanI11,
  author       = {Kyoung{-}Soo Han and
                  Eul Gyu Im},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Survey on {P2P} Botnet Detection},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {589--593},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_56},
  doi          = {10.1007/978-94-007-2911-7\_56},
  timestamp    = {Tue, 01 Feb 2022 08:29:46 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HanI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HanCI11,
  author       = {Kyoung{-}Soo Han and
                  Kyoung{-}Yong Chung and
                  Eul Gyu Im},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Study on Instruction Substitution Analysis of Metamorphic Malware},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {595--599},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_57},
  doi          = {10.1007/978-94-007-2911-7\_57},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HanCI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ImH11,
  author       = {Eul Gyu Im and
                  Kyoung{-}Soo Han},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {An Analysis of Malware Attached in Spam},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {601--605},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_58},
  doi          = {10.1007/978-94-007-2911-7\_58},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ImH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HanKI11,
  author       = {Kyoung{-}Soo Han and
                  In{-}Kyoung Kim and
                  Eul Gyu Im},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Detection Methods for Malware Variant Using {API} Call Related Graphs},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {607--611},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_59},
  doi          = {10.1007/978-94-007-2911-7\_59},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HanKI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HanKI11a,
  author       = {Kyoung{-}Soo Han and
                  In{-}Kyoung Kim and
                  Eul Gyu Im},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Malware Classification Methods Using {API} Sequence Characteristics},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {613--626},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_60},
  doi          = {10.1007/978-94-007-2911-7\_60},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HanKI11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/KangKKKI11,
  author       = {Boojoong Kang and
                  Hye Seon Kim and
                  TaeGuen Kim and
                  Heejun Kwon and
                  Eul Gyu Im},
  editor       = {Rex E. Gantenbein and
                  Tei{-}Wei Kuo},
  title        = {Fast malware family detection method using control flow graphs},
  booktitle    = {Research in Applied Computation Symposium, {RACS} '11, Miami, FL,
                  USA, October 19-22, 2011},
  pages        = {287--292},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2103380.2103439},
  doi          = {10.1145/2103380.2103439},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/KangKKKI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/HanKI11,
  author       = {Kyoung{-}Soo Han and
                  Boojoong Kang and
                  Eul Gyu Im},
  editor       = {Rex E. Gantenbein and
                  Tei{-}Wei Kuo},
  title        = {Malware classification using instruction frequencies},
  booktitle    = {Research in Applied Computation Symposium, {RACS} '11, Miami, FL,
                  USA, October 19-22, 2011},
  pages        = {298--300},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2103380.2103441},
  doi          = {10.1145/2103380.2103441},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/racs/HanKI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangKYI11,
  author       = {Boojoong Kang and
                  Hye Seon Kim and
                  Ji Su Yang and
                  Eul Gyu Im},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Rule Indexing for Efficient Intrusion Detection Systems},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {136--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_11},
  doi          = {10.1007/978-3-642-27890-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KangKYI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/KimKIH10,
  author       = {Seonggun Kim and
                  Taein Kim and
                  Eul Gyu Im and
                  Hwansoo Han},
  title        = {Efficient reuse of local regions in memory-limited mobile devices},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {56},
  number       = {3},
  pages        = {1297--1303},
  year         = {2010},
  url          = {https://doi.org/10.1109/TCE.2010.5606262},
  doi          = {10.1109/TCE.2010.5606262},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/KimKIH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ShinLKLI10,
  author       = {Sung{-}Hyun Shin and
                  Sang{-}Chul Lee and
                  Sang{-}Wook Kim and
                  Junghoon Lee and
                  Eul Gyu Im},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Efficient shortest path finding of k-nearest neighbor objects in road
                  network databases},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {1661--1665},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774446},
  doi          = {10.1145/1774088.1774446},
  timestamp    = {Mon, 14 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ShinLKLI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JangHI08,
  author       = {Hyun Jun Jang and
                  Dae Won Hwang and
                  Eul{-}Gyu Im},
  editor       = {Christopher C. Yang and
                  Hsinchun Chen and
                  Michael Chau and
                  Kuiyu Chang and
                  Sheau{-}Dong Lang and
                  Patrick S. Chen and
                  Raymond Hsieh and
                  Daniel Zeng and
                  Fei{-}Yue Wang and
                  Kathleen M. Carley and
                  Wenji Mao and
                  Justin Zhan},
  title        = {Data Protection in Memory Using Byte Reordering},
  booktitle    = {Intelligence and Security Informatics, {IEEE} {ISI} 2008 International
                  Workshops: PAISI, PACCF, and {SOCO} 2008, Taipei, Taiwan, June 17,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5075},
  pages        = {62--68},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69304-8\_7},
  doi          = {10.1007/978-3-540-69304-8\_7},
  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JangHI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KimLI07,
  author       = {InJung Kim and
                  Cheol Won Lee and
                  Eul{-}Gyu Im},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4706},
  pages        = {75--84},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74477-1\_7},
  doi          = {10.1007/978-3-540-74477-1\_7},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KimLI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/ChoI07,
  author       = {Che Ik Cho and
                  Eul{-}Gyu Im},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy and
                  Laurence Tianruo Yang},
  title        = {Survey on low power routing protocols in {MANET} from security viewpoints},
  booktitle    = {Proceedings of the 2007 International Conference on Wireless Networks,
                  June 25-28, 2007, Las Vegas, Nevada, {USA}},
  pages        = {118--124},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Mon, 09 Feb 2009 10:38:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/ChoI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/YunKIS07,
  author       = {Hyo Jung Yun and
                  Ki Nam Kim and
                  Eul{-}Gyu Im and
                  Yong Ho Song},
  title        = {Effective Elimination of Redundant Packets in Wireless Sensor Networks},
  booktitle    = {2007 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2007), 26-28 April 2007, Seoul, Korea},
  pages        = {214--219},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MUE.2007.122},
  doi          = {10.1109/MUE.2007.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/YunKIS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ImKNJ07,
  author       = {Eul{-}Gyu Im and
                  Jung Sik Kim and
                  In Woo Noh and
                  Hyun Jun Jang},
  editor       = {Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang and
                  Qing Yang and
                  Xueqi Cheng and
                  Jue Wang and
                  Fei{-}Yue Wang and
                  Hsinchun Chen},
  title        = {A Hybrid Model for Worm Simulations in a Large Network},
  booktitle    = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI}
                  2007, Chengdu, China, April 11-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4430},
  pages        = {301--306},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71549-8\_32},
  doi          = {10.1007/978-3-540-71549-8\_32},
  timestamp    = {Fri, 18 Oct 2019 12:58:35 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ImKNJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KimCLIW06,
  author       = {InJung Kim and
                  Yoon Jung Chung and
                  YoungGyo Lee and
                  Eul{-}Gyu Im and
                  Dongho Won},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {Information System Modeling for Analysis of Propagation Effects and
                  Levels of Damage},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {54--63},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_7},
  doi          = {10.1007/11751595\_7},
  timestamp    = {Sat, 24 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KimCLIW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ChungKLIW06,
  author       = {Yoon Jung Chung and
                  InJung Kim and
                  Chulsoo Lee and
                  Eul{-}Gyu Im and
                  Dongho Won},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {Design of an On-Line Intrusion Forecast System with a Weather Forecasting
                  Model},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3983},
  pages        = {777--786},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751632\_84},
  doi          = {10.1007/11751632\_84},
  timestamp    = {Sat, 24 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ChungKLIW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ImSKSP06,
  author       = {Eul{-}Gyu Im and
                  Jung{-}Taek Seo and
                  Dong{-}Soo Kim and
                  Yong Ho Song and
                  Yongsu Park},
  editor       = {Sharad Mehrotra and
                  Daniel Dajun Zeng and
                  Hsinchun Chen and
                  Bhavani Thuraisingham and
                  Fei{-}Yue Wang},
  title        = {Hybrid Modeling for Large-Scale Worm Propagation Simulations},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA,
                  USA, May 23-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3975},
  pages        = {572--577},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760146\_59},
  doi          = {10.1007/11760146\_59},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ImSKSP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ParkSI06,
  author       = {Yongsu Park and
                  Yong Ho Song and
                  Eul{-}Gyu Im},
  editor       = {Sharad Mehrotra and
                  Daniel Dajun Zeng and
                  Hsinchun Chen and
                  Bhavani Thuraisingham and
                  Fei{-}Yue Wang},
  title        = {Design of a Reliable Hardware Stack to Defend Against Frame Pointer
                  Overwrite Attacks},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA,
                  USA, May 23-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3975},
  pages        = {731--732},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760146\_109},
  doi          = {10.1007/11760146\_109},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ParkSI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SongPPI06,
  author       = {Yong Ho Song and
                  Jung Min Park and
                  Yongsu Park and
                  Eul{-}Gyu Im},
  editor       = {Sharad Mehrotra and
                  Daniel Dajun Zeng and
                  Hsinchun Chen and
                  Bhavani Thuraisingham and
                  Fei{-}Yue Wang},
  title        = {A New Methodology of Analyzing Security Vulnerability for Network
                  Services},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA,
                  USA, May 23-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3975},
  pages        = {737--738},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760146\_112},
  doi          = {10.1007/11760146\_112},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SongPPI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/LeeIIL06,
  author       = {Taek Lee and
                  Hoh Peter In and
                  Eul{-}Gyu Im and
                  Heejo Lee},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Cascade Damage Estimation Model for Internet Attacks},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {163--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_23},
  doi          = {10.1007/11734628\_23},
  timestamp    = {Fri, 18 Oct 2019 12:58:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisi/LeeIIL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ImICS05,
  author       = {Eul{-}Gyu Im and
                  Hoh Peter In and
                  Dae{-}Sik Choi and
                  Yong Ho Song},
  title        = {Adaptation Policies for Web Server Intrusion-Tolerant System},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {88-B},
  number       = {8},
  pages        = {3462--3465},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietcom/e88-b.8.3462},
  doi          = {10.1093/IETCOM/E88-B.8.3462},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ImICS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ImS05,
  author       = {Eul{-}Gyu Im and
                  Yong Ho Song},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {An Adaptive Approach to Handle DoS Attack for Web Services},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {634--635},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_83},
  doi          = {10.1007/11427995\_83},
  timestamp    = {Fri, 18 Oct 2019 12:58:35 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ImS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SongI05,
  author       = {Yong Ho Song and
                  Eul{-}Gyu Im},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {Secure Contents Distribution Using Flash Memory Technology},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {650--651},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_91},
  doi          = {10.1007/11427995\_91},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SongI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/advis/ParkCISK04,
  author       = {Eung Ki Park and
                  Dae{-}Sik Choi and
                  Eul{-}Gyu Im and
                  Jung{-}Taek Seo and
                  Dongkyu Kim},
  editor       = {Tatyana M. Yakhno},
  title        = {Adaptive Architecture for Web Server Survivability},
  booktitle    = {Advances in Information Systems, Third International Conference, {ADVIS}
                  2004, Izmir, Turkey, October 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3261},
  pages        = {172--180},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30198-1\_18},
  doi          = {10.1007/978-3-540-30198-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/advis/ParkCISK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/advis/InMZI04,
  author       = {Hoh Peter In and
                  Konstantinos A. Meintanis and
                  Ming Zhang and
                  Eul{-}Gyu Im},
  editor       = {Tatyana M. Yakhno},
  title        = {Kaliphimos: {A} Community-Based Peer-to-Peer Group Management Scheme},
  booktitle    = {Advances in Information Systems, Third International Conference, {ADVIS}
                  2004, Izmir, Turkey, October 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3261},
  pages        = {533--542},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30198-1\_54},
  doi          = {10.1007/978-3-540-30198-1\_54},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/advis/InMZI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiasim/YunPII04,
  author       = {Joo Beom Yun and
                  Eung Ki Park and
                  Eul{-}Gyu Im and
                  Hoh Peter In},
  editor       = {Doo{-}Kwon Baik},
  title        = {A Scalable, Ordered Scenario-Based Network Security Simulator},
  booktitle    = {Systems Modeling and Simulation: Theory and Applications, Third Asian
                  Simulation Conference, AsiaSim 2004, Jeju Island, Korea, October 4-6,
                  2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3398},
  pages        = {487--494},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30585-9\_54},
  doi          = {10.1007/978-3-540-30585-9\_54},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/asiasim/YunPII04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ParkSIL04,
  author       = {Eung Ki Park and
                  Jung{-}Taek Seo and
                  Eul{-}Gyu Im and
                  Cheolwon Lee},
  editor       = {Hsinchun Chen and
                  Reagan W. Moore and
                  Daniel Dajun Zeng and
                  John Leavitt},
  title        = {Vulnerability Analysis and Evaluation within an Intranet},
  booktitle    = {Intelligence and Security Informatics, Second Symposium on Intelligence
                  and Security Informatics, {ISI} 2004, Tucson, AZ, USA, June 10-11,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3073},
  pages        = {514--515},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25952-7\_45},
  doi          = {10.1007/978-3-540-25952-7\_45},
  timestamp    = {Tue, 24 May 2022 18:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ParkSIL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/RyuIN03,
  author       = {Sung{-}Wook Ryu and
                  Eul{-}Gyu Im and
                  B. Clifford Neuman},
  title        = {Distributed Garbage Collection by Timeouts and Backward Inquiry},
  booktitle    = {27th International Computer Software and Applications Conference {(COMPSAC}
                  2003): Design and Assessment of Trustworthy Software-Based Systems,
                  3-6 November 2003, Dallas, TX, USA, Proceedings},
  pages        = {426--432},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CMPSAC.2003.1245375},
  doi          = {10.1109/CMPSAC.2003.1245375},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/RyuIN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ImN03,
  author       = {Eul{-}Gyu Im and
                  B. Clifford Neuman},
  title        = {A Flexible Framework for Replication in Distributed Systems},
  booktitle    = {27th International Computer Software and Applications Conference {(COMPSAC}
                  2003): Design and Assessment of Trustworthy Software-Based Systems,
                  3-6 November 2003, Dallas, TX, USA, Proceedings},
  pages        = {486--491},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CMPSAC.2003.1245384},
  doi          = {10.1109/CMPSAC.2003.1245384},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ImN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/SohnMLIS03,
  author       = {Taeshik Shon and
                  Jongsub Moon and
                  Cheolwon Lee and
                  Eul{-}Gyu Im and
                  Jung{-}Taek Seo},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {Safe Patch Distribution Architecture in Intranet Environments},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2},
  pages        = {455--460},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Fri, 10 Aug 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/SohnMLIS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiIL03,
  author       = {Dae{-}Sik Choi and
                  Eul{-}Gyu Im and
                  Cheol Won Lee},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Intrusion-Tolerant System Design for Web Server Survivability},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {124--134},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_10},
  doi          = {10.1007/978-3-540-24591-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiIL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}