


default search action
BibTeX records: Eul-Gyu Im
@article{DBLP:journals/access/JooKHIK25, author = {Jeonghyeon Joo and Hyojune Kim and Hyuck Han and Eul Gyu Im and Sooyong Kang}, title = {Highly Parallel Regular Expression Matching Using a Real Processing-in-Memory System}, journal = {{IEEE} Access}, volume = {13}, pages = {18937--18951}, year = {2025}, url = {https://doi.org/10.1109/ACCESS.2025.3532944}, doi = {10.1109/ACCESS.2025.3532944}, timestamp = {Fri, 14 Feb 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JooKHIK25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/RaiI23, author = {Andri Rai and Eul Gyu Im}, editor = {Guojun Wang and Haozhe Wang and Geyong Min and Nektarios Georgalas and Weizhi Meng}, title = {Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection}, booktitle = {Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {2034}, pages = {219--235}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1274-8\_15}, doi = {10.1007/978-981-97-1274-8\_15}, timestamp = {Thu, 20 Feb 2025 13:59:49 +0100}, biburl = {https://dblp.org/rec/conf/ubisec/RaiI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RoKSI22, author = {Inwoo Ro and Boojoong Kang and Choonghyun Seo and Eul Gyu Im}, title = {Detection Method for Randomly Generated User IDs: Lift the Curse of Dimensionality}, journal = {{IEEE} Access}, volume = {10}, pages = {86020--86028}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3198687}, doi = {10.1109/ACCESS.2022.3198687}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/RoKSI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/JungBCI20, author = {ByeongHo Jung and Seong Il Bae and Chang Choi and Eul Gyu Im}, title = {Packer identification method based on byte sequences}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {8}, year = {2020}, url = {https://doi.org/10.1002/cpe.5082}, doi = {10.1002/CPE.5082}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/JungBCI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/BaeLI20, author = {Seong Il Bae and Gyu Bin Lee and Eul Gyu Im}, title = {Ransomware detection using machine learning algorithms}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {18}, year = {2020}, url = {https://doi.org/10.1002/cpe.5422}, doi = {10.1002/CPE.5422}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/BaeLI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KimKRSI19, author = {TaeGuen Kim and BooJoong Kang and Mina Rho and Sakir Sezer and Eul Gyu Im}, title = {A Multimodal Deep Learning Method for Android Malware Detection Using Various Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {3}, pages = {773--788}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2866319}, doi = {10.1109/TIFS.2018.2866319}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/KimKRSI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimLKI19, author = {TaeGuen Kim and Yeo Reum Lee and BooJoong Kang and Eul Gyu Im}, title = {Binary executable file similarity calculation using function matching}, journal = {J. Supercomput.}, volume = {75}, number = {2}, pages = {607--622}, year = {2019}, url = {https://doi.org/10.1007/s11227-016-1941-2}, doi = {10.1007/S11227-016-1941-2}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KimLKI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/BaeKI19, author = {Seong Il Bae and Soo Han Kim and Eul Gyu Im}, editor = {Chih{-}Cheng Hung and Qianbin Chen and Xianzhong Xie and Christian Esposito and Jun Huang and Juw Won Park and Qinghua Zhang}, title = {Automatic hybrid analysis technique to improve botnet code coverage using fake server}, booktitle = {Proceedings of the Conference on Research in Adaptive and Convergent Systems, {RACS} 2019, Chongqing, China, September 24-27, 2019}, pages = {276--282}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338840.3355670}, doi = {10.1145/3338840.3355670}, timestamp = {Wed, 17 Aug 2022 11:16:50 +0200}, biburl = {https://dblp.org/rec/conf/racs/BaeKI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/LeeCI19, author = {Jong Youn Lee and Jun Young Chang and Eul Gyu Im}, editor = {Chih{-}Cheng Hung and Qianbin Chen and Xianzhong Xie and Christian Esposito and Jun Huang and Juw Won Park and Qinghua Zhang}, title = {DGA-based malware detection using {DNS} traffic analysis}, booktitle = {Proceedings of the Conference on Research in Adaptive and Convergent Systems, {RACS} 2019, Chongqing, China, September 24-27, 2019}, pages = {283--288}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338840.3355672}, doi = {10.1145/3338840.3355672}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/LeeCI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/KimKI18, author = {TaeGuen Kim and Boojoong Kang and Eul Gyu Im}, title = {Runtime Detection Framework for Android Malware}, journal = {Mob. Inf. Syst.}, volume = {2018}, pages = {8094314:1--8094314:15}, year = {2018}, url = {https://doi.org/10.1155/2018/8094314}, doi = {10.1155/2018/8094314}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/KimKI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RoHI18, author = {Inwoo Ro and Joong Soo Han and Eul Gyu Im}, title = {Detection Method for Distributed Web-Crawlers: {A} Long-Tail Threshold Model}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {9065424:1--9065424:7}, year = {2018}, url = {https://doi.org/10.1155/2018/9065424}, doi = {10.1155/2018/9065424}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/RoHI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/JungKI18, author = {Byungho Jung and TaeGuen Kim and Eul Gyu Im}, editor = {Chih{-}Cheng Hung and Lamjed Ben Said}, title = {Malware classification using byte sequence information}, booktitle = {Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, {RACS} 2018, Honolulu, HI, USA, October 09-12, 2018}, pages = {143--148}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264746.3264775}, doi = {10.1145/3264746.3264775}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/JungKI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KwonI17, author = {Iltaek Kwon and Eul Gyu Im}, title = {Extracting the Representative {API} Call Patterns of Malware Families Using Recurrent Neural Network}, booktitle = {Proceedings of the International Conference on Research in Adaptive and Convergent Systems, {RACS} 2017, Krakow, Poland, September 20-23, 2017}, pages = {202--207}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3129676.3129712}, doi = {10.1145/3129676.3129712}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/KwonI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/ChoKSRI16, author = {In Kyeom Cho and TaeGuen Kim and Yu Jin Shim and Minsoo Ryu and Eul Gyu Im}, title = {Malware Analysis and Classification Using Sequence Alignments}, journal = {Intell. Autom. Soft Comput.}, volume = {22}, number = {3}, pages = {371--377}, year = {2016}, url = {https://doi.org/10.1080/10798587.2015.1118916}, doi = {10.1080/10798587.2015.1118916}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iasc/ChoKSRI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/ChaeHKKIP16, author = {Dong{-}Kyu Chae and Jiwoon Ha and Sang{-}Wook Kim and Boojoong Kang and Eul Gyu Im and Sunju Park}, title = {Credible, resilient, and scalable detection of software plagiarism using authority histograms}, journal = {Knowl. Based Syst.}, volume = {95}, pages = {114--124}, year = {2016}, url = {https://doi.org/10.1016/j.knosys.2015.12.009}, doi = {10.1016/J.KNOSYS.2015.12.009}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/ChaeHKKIP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnidc/LiW0I16, author = {Qing Li and Le Wang and TaeGuen Kim and Eul Gyu Im}, title = {Mobile-based continuous user authentication system for cloud security}, booktitle = {{IEEE} International Conference on Network Infrastructure and Digital Content, {IC-NIDC} 2016, Beijing, China, September 23-25, 2016}, pages = {176--179}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICNIDC.2016.7974559}, doi = {10.1109/ICNIDC.2016.7974559}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icnidc/LiW0I16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/ParkKI16, author = {JunGyu Park and TaeGuen Kim and Eul Gyu Im}, title = {Touch Gesture Data based Authentication Method for Smartphone Users}, booktitle = {Proceedings of the International Conference on Research in Adaptive and Convergent Systems, {RACS} 2016, Odense, Denmark, October 11-14, 2016}, pages = {136--141}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2987386.2987410}, doi = {10.1145/2987386.2987410}, timestamp = {Tue, 06 Nov 2018 11:07:49 +0100}, biburl = {https://dblp.org/rec/conf/racs/ParkKI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/LeeKI16, author = {Tae Kyong Lee and TaeGuen Kim and Eul Gyu Im}, title = {User Authentication Method using Shaking Actions in Mobile Devices}, booktitle = {Proceedings of the International Conference on Research in Adaptive and Convergent Systems, {RACS} 2016, Odense, Denmark, October 11-14, 2016}, pages = {142--147}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2987386.2987411}, doi = {10.1145/2987386.2987411}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/LeeKI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HanLKI15, author = {Kyoung{-}Soo Han and Jae Hyun Lim and Boojoong Kang and Eul Gyu Im}, title = {Malware analysis using visualized images and entropy graphs}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0242-0}, doi = {10.1007/S10207-014-0242-0}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HanLKI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/ChoI15, author = {In Kyeom Cho and Eul Gyu Im}, editor = {Esmaeil S. Nadimi and Tom{\'{a}}s Cern{\'{y}} and Sung{-}Ryul Kim and Wei Wang}, title = {Extracting representative {API} patterns of malware families using multiple sequence alignments}, booktitle = {Proceedings of the 2015 Conference on research in adaptive and convergent systems, {RACS} 2015, Prague, Czech Republic, October 9-12, 2015}, pages = {308--313}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2811411.2811543}, doi = {10.1145/2811411.2811543}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/ChoI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KimKI15, author = {Junhyoung Kim and TaeGuen Kim and Eul Gyu Im}, editor = {Esmaeil S. Nadimi and Tom{\'{a}}s Cern{\'{y}} and Sung{-}Ryul Kim and Wei Wang}, title = {Structural information based malicious app similarity calculation and clustering}, booktitle = {Proceedings of the 2015 Conference on research in adaptive and convergent systems, {RACS} 2015, Prague, Czech Republic, October 9-12, 2015}, pages = {314--318}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2811411.2811545}, doi = {10.1145/2811411.2811545}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/KimKI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rskt/ShimKI15, author = {Yu Jin Shim and TaeGuen Kim and Eul Gyu Im}, editor = {Davide Ciucci and Guoyin Wang and Sushmita Mitra and Wei{-}Zhi Wu}, title = {A Study on Similarity Calculation Method for {API} Invocation Sequences}, booktitle = {Rough Sets and Knowledge Technology - 10th International Conference, {RSKT} 2015, held as part of the International Joint Conference on Rough Sets, {IJCRS} 2015, Tianjin, China, November 20-23, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9436}, pages = {492--501}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25754-9\_43}, doi = {10.1007/978-3-319-25754-9\_43}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/rskt/ShimKI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KangHKI14, author = {Boojoong Kang and Kyoung{-}Soo Han and Byeongho Kang and Eul Gyu Im}, title = {Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {323--335}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.06.003}, doi = {10.1016/J.DIIN.2014.06.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KangHKI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iee/OKaneSMI14, author = {Philip O'Kane and Sakir Sezer and Kieran McLaughlin and Eul Gyu Im}, title = {Malware detection: program run length against detection rate}, journal = {{IET} Softw.}, volume = {8}, number = {1}, pages = {42--51}, year = {2014}, url = {https://doi.org/10.1049/iet-sen.2013.0020}, doi = {10.1049/IET-SEN.2013.0020}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iee/OKaneSMI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ChoKSPCI14, author = {In Kyeom Cho and TaeGuen Kim and Yu Jin Shim and Haeryong Park and Bomin Choi and Eul Gyu Im}, title = {Malware Similarity Analysis using {API} Sequence Alignments}, journal = {J. Internet Serv. Inf. Secur.}, volume = {4}, number = {4}, pages = {103--114}, year = {2014}, url = {https://doi.org/10.22667/JISIS.2014.11.31.103}, doi = {10.22667/JISIS.2014.11.31.103}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ChoKSPCI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KimPCKIK14, author = {TaeGuen Kim and Jung Bin Park and In Gyeom Cho and Boojoong Kang and Eul Gyu Im and Sooyong Kang}, editor = {Chao Lu and Esmaeil S. Nadimi and Sung{-}Ryul Kim and Wei Wang}, title = {Similarity calculation method for user-define functions to detect malware variants}, booktitle = {Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, {RACS} 2014, Towson, Maryland, USA, October 5-8, 2014}, pages = {236--241}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663761.2664222}, doi = {10.1145/2663761.2664222}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/racs/KimPCKIK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KangKKIR14, author = {Byeongho Kang and TaeGuen Kim and Boojoong Kang and Eul Gyu Im and Minsoo Ryu}, editor = {Chao Lu and Esmaeil S. Nadimi and Sung{-}Ryul Kim and Wei Wang}, title = {{TASEL:} dynamic taint analysis with selective control dependency}, booktitle = {Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, {RACS} 2014, Towson, Maryland, USA, October 5-8, 2014}, pages = {272--277}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663761.2664219}, doi = {10.1145/2663761.2664219}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/KangKKIR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KangI14, author = {Byeongho Kang and Eul Gyu Im}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Analysis of binary code topology for dynamic analysis}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1731--1732}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2559912}, doi = {10.1145/2554850.2559912}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/KangI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijeei/HanLJI13, author = {Kyoung{-}Soo Han and Yeo Reum Lee and Biao Jiang and Eul Gyu Im}, title = {Android Permission System Violation: Case Study and Refinement}, journal = {Int. J. {E} Entrepreneurship Innov.}, volume = {4}, number = {1}, pages = {16--27}, year = {2013}, url = {https://doi.org/10.4018/jeei.2013010102}, doi = {10.4018/JEEI.2013010102}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijeei/HanLJI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OKaneSMI13, author = {Philip O'Kane and Sakir Sezer and Kieran McLaughlin and Eul Gyu Im}, title = {{SVM} Training Phase Reduction Using Dataset Feature Filtering for Malware Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {3}, pages = {500--509}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2242890}, doi = {10.1109/TIFS.2013.2242890}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OKaneSMI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/ChaeHKKI13, author = {Dong{-}Kyu Chae and Jiwoon Ha and Sang{-}Wook Kim and Boojoong Kang and Eul Gyu Im}, editor = {Qi He and Arun Iyengar and Wolfgang Nejdl and Jian Pei and Rajeev Rastogi}, title = {Software plagiarism detection: a graph-based approach}, booktitle = {22nd {ACM} International Conference on Information and Knowledge Management, CIKM'13, San Francisco, CA, USA, October 27 - November 1, 2013}, pages = {1577--1580}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2505515.2507848}, doi = {10.1145/2505515.2507848}, timestamp = {Sat, 01 Mar 2025 10:58:19 +0100}, biburl = {https://dblp.org/rec/conf/cikm/ChaeHKKI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/HanLI13, author = {Kyoung{-}Soo Han and Jae Hyun Lim and Eul Gyu Im}, editor = {Ching Y. Suen and Amir G. Aghdam and Minyi Guo and Jiman Hong and Esmaeil S. Nadimi}, title = {Malware analysis method using visualization of binary files}, booktitle = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013}, pages = {317--321}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513228.2513294}, doi = {10.1145/2513228.2513294}, timestamp = {Fri, 21 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/racs/HanLI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/LeeKI13, author = {Yeo Reum Lee and Boojoong Kang and Eul Gyu Im}, editor = {Ching Y. Suen and Amir G. Aghdam and Minyi Guo and Jiman Hong and Esmaeil S. Nadimi}, title = {Function matching-based binary-level software similarity calculation}, booktitle = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013}, pages = {322--327}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513228.2513300}, doi = {10.1145/2513228.2513300}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/LeeKI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KangKKI13, author = {Byeongho Kang and Boojoong Kang and Jungtae Kim and Eul Gyu Im}, editor = {Ching Y. Suen and Amir G. Aghdam and Minyi Guo and Jiman Hong and Esmaeil S. Nadimi}, title = {Android malware classification method: Dalvik bytecode frequency analysis}, booktitle = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013}, pages = {349--350}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513228.2513295}, doi = {10.1145/2513228.2513295}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/KangKKI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KimKI13, author = {Sunwoo Kim and TaeGuen Kim and Eul Gyu Im}, editor = {Ching Y. Suen and Amir G. Aghdam and Minyi Guo and Jiman Hong and Esmaeil S. Nadimi}, title = {Real-time malware detection framework in intrusion detection systems}, booktitle = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013}, pages = {351--352}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513228.2513297}, doi = {10.1145/2513228.2513297}, timestamp = {Sun, 22 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/racs/KimKI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/LeeKI13a, author = {JaeKeun Lee and Boojoong Kang and Eul Gyu Im}, editor = {Ching Y. Suen and Amir G. Aghdam and Minyi Guo and Jiman Hong and Esmaeil S. Nadimi}, title = {Rule-based anti-anti-debugging system}, booktitle = {Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013}, pages = {353--354}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513228.2513301}, doi = {10.1145/2513228.2513301}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/LeeKI13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KangKYI12, author = {Boojoong Kang and Hye Seon Kim and Ji Su Yang and Eul Gyu Im}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Balanced Indexing Method for Efficient Intrusion Detection Systems}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {37--48}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_4}, doi = {10.1007/978-3-642-37682-5\_4}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KangKYI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/JiangIK12, author = {Biao Jiang and Eul Gyu Im and Yunmo Koo}, editor = {Michael Chau and G. Alan Wang and Wei Thoo Yue and Hsinchun Chen}, title = {SaaS-Driven Botnets}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7299}, pages = {198--206}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30428-6\_17}, doi = {10.1007/978-3-642-30428-6\_17}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/paisi/JiangIK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KangKKCI12, author = {Boojoong Kang and TaeGuen Kim and Heejun Kwon and Yangseo Choi and Eul Gyu Im}, editor = {Yookun Cho and Rex E. Gantenbein and Tei{-}Wei Kuo and Vahid Tarokh}, title = {Malware classification method via binary content comparison}, booktitle = {Research in Applied Computation Symposium, {RACS} '12, San Antonio, TX, USA, October 23-26, 2012}, pages = {316--321}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2401603.2401672}, doi = {10.1145/2401603.2401672}, timestamp = {Sat, 10 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/racs/KangKKCI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HanI11, author = {Kyoung{-}Soo Han and Eul Gyu Im}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Survey on {P2P} Botnet Detection}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {589--593}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_56}, doi = {10.1007/978-94-007-2911-7\_56}, timestamp = {Tue, 01 Feb 2022 08:29:46 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HanI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HanCI11, author = {Kyoung{-}Soo Han and Kyoung{-}Yong Chung and Eul Gyu Im}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Study on Instruction Substitution Analysis of Metamorphic Malware}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {595--599}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_57}, doi = {10.1007/978-94-007-2911-7\_57}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HanCI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ImH11, author = {Eul Gyu Im and Kyoung{-}Soo Han}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {An Analysis of Malware Attached in Spam}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {601--605}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_58}, doi = {10.1007/978-94-007-2911-7\_58}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ImH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HanKI11, author = {Kyoung{-}Soo Han and In{-}Kyoung Kim and Eul Gyu Im}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Detection Methods for Malware Variant Using {API} Call Related Graphs}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {607--611}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_59}, doi = {10.1007/978-94-007-2911-7\_59}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HanKI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HanKI11a, author = {Kyoung{-}Soo Han and In{-}Kyoung Kim and Eul Gyu Im}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Malware Classification Methods Using {API} Sequence Characteristics}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {613--626}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_60}, doi = {10.1007/978-94-007-2911-7\_60}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HanKI11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/KangKKKI11, author = {Boojoong Kang and Hye Seon Kim and TaeGuen Kim and Heejun Kwon and Eul Gyu Im}, editor = {Rex E. Gantenbein and Tei{-}Wei Kuo}, title = {Fast malware family detection method using control flow graphs}, booktitle = {Research in Applied Computation Symposium, {RACS} '11, Miami, FL, USA, October 19-22, 2011}, pages = {287--292}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2103380.2103439}, doi = {10.1145/2103380.2103439}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/KangKKKI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/HanKI11, author = {Kyoung{-}Soo Han and Boojoong Kang and Eul Gyu Im}, editor = {Rex E. Gantenbein and Tei{-}Wei Kuo}, title = {Malware classification using instruction frequencies}, booktitle = {Research in Applied Computation Symposium, {RACS} '11, Miami, FL, USA, October 19-22, 2011}, pages = {298--300}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2103380.2103441}, doi = {10.1145/2103380.2103441}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/racs/HanKI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangKYI11, author = {Boojoong Kang and Hye Seon Kim and Ji Su Yang and Eul Gyu Im}, editor = {Souhwan Jung and Moti Yung}, title = {Rule Indexing for Efficient Intrusion Detection Systems}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {136--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_11}, doi = {10.1007/978-3-642-27890-7\_11}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangKYI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/KimKIH10, author = {Seonggun Kim and Taein Kim and Eul Gyu Im and Hwansoo Han}, title = {Efficient reuse of local regions in memory-limited mobile devices}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {56}, number = {3}, pages = {1297--1303}, year = {2010}, url = {https://doi.org/10.1109/TCE.2010.5606262}, doi = {10.1109/TCE.2010.5606262}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/KimKIH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ShinLKLI10, author = {Sung{-}Hyun Shin and Sang{-}Chul Lee and Sang{-}Wook Kim and Junghoon Lee and Eul Gyu Im}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Efficient shortest path finding of k-nearest neighbor objects in road network databases}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {1661--1665}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774446}, doi = {10.1145/1774088.1774446}, timestamp = {Mon, 14 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ShinLKLI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JangHI08, author = {Hyun Jun Jang and Dae Won Hwang and Eul{-}Gyu Im}, editor = {Christopher C. Yang and Hsinchun Chen and Michael Chau and Kuiyu Chang and Sheau{-}Dong Lang and Patrick S. Chen and Raymond Hsieh and Daniel Zeng and Fei{-}Yue Wang and Kathleen M. Carley and Wenji Mao and Justin Zhan}, title = {Data Protection in Memory Using Byte Reordering}, booktitle = {Intelligence and Security Informatics, {IEEE} {ISI} 2008 International Workshops: PAISI, PACCF, and {SOCO} 2008, Taipei, Taiwan, June 17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5075}, pages = {62--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69304-8\_7}, doi = {10.1007/978-3-540-69304-8\_7}, timestamp = {Mon, 15 May 2023 16:24:40 +0200}, biburl = {https://dblp.org/rec/conf/isi/JangHI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KimLI07, author = {InJung Kim and Cheol Won Lee and Eul{-}Gyu Im}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4706}, pages = {75--84}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74477-1\_7}, doi = {10.1007/978-3-540-74477-1\_7}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KimLI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/ChoI07, author = {Che Ik Cho and Eul{-}Gyu Im}, editor = {Hamid R. Arabnia and Victor A. Clincy and Laurence Tianruo Yang}, title = {Survey on low power routing protocols in {MANET} from security viewpoints}, booktitle = {Proceedings of the 2007 International Conference on Wireless Networks, June 25-28, 2007, Las Vegas, Nevada, {USA}}, pages = {118--124}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Mon, 09 Feb 2009 10:38:02 +0100}, biburl = {https://dblp.org/rec/conf/icwn/ChoI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/YunKIS07, author = {Hyo Jung Yun and Ki Nam Kim and Eul{-}Gyu Im and Yong Ho Song}, title = {Effective Elimination of Redundant Packets in Wireless Sensor Networks}, booktitle = {2007 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2007), 26-28 April 2007, Seoul, Korea}, pages = {214--219}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MUE.2007.122}, doi = {10.1109/MUE.2007.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/YunKIS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ImKNJ07, author = {Eul{-}Gyu Im and Jung Sik Kim and In Woo Noh and Hyun Jun Jang}, editor = {Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang and Qing Yang and Xueqi Cheng and Jue Wang and Fei{-}Yue Wang and Hsinchun Chen}, title = {A Hybrid Model for Worm Simulations in a Large Network}, booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI} 2007, Chengdu, China, April 11-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4430}, pages = {301--306}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71549-8\_32}, doi = {10.1007/978-3-540-71549-8\_32}, timestamp = {Fri, 18 Oct 2019 12:58:35 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ImKNJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KimCLIW06, author = {InJung Kim and Yoon Jung Chung and YoungGyo Lee and Eul{-}Gyu Im and Dongho Won}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Information System Modeling for Analysis of Propagation Effects and Levels of Damage}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {54--63}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_7}, doi = {10.1007/11751595\_7}, timestamp = {Sat, 24 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KimCLIW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ChungKLIW06, author = {Yoon Jung Chung and InJung Kim and Chulsoo Lee and Eul{-}Gyu Im and Dongho Won}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3983}, pages = {777--786}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751632\_84}, doi = {10.1007/11751632\_84}, timestamp = {Sat, 24 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ChungKLIW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ImSKSP06, author = {Eul{-}Gyu Im and Jung{-}Taek Seo and Dong{-}Soo Kim and Yong Ho Song and Yongsu Park}, editor = {Sharad Mehrotra and Daniel Dajun Zeng and Hsinchun Chen and Bhavani Thuraisingham and Fei{-}Yue Wang}, title = {Hybrid Modeling for Large-Scale Worm Propagation Simulations}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3975}, pages = {572--577}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760146\_59}, doi = {10.1007/11760146\_59}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/isi/ImSKSP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ParkSI06, author = {Yongsu Park and Yong Ho Song and Eul{-}Gyu Im}, editor = {Sharad Mehrotra and Daniel Dajun Zeng and Hsinchun Chen and Bhavani Thuraisingham and Fei{-}Yue Wang}, title = {Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3975}, pages = {731--732}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760146\_109}, doi = {10.1007/11760146\_109}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/ParkSI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SongPPI06, author = {Yong Ho Song and Jung Min Park and Yongsu Park and Eul{-}Gyu Im}, editor = {Sharad Mehrotra and Daniel Dajun Zeng and Hsinchun Chen and Bhavani Thuraisingham and Fei{-}Yue Wang}, title = {A New Methodology of Analyzing Security Vulnerability for Network Services}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3975}, pages = {737--738}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760146\_112}, doi = {10.1007/11760146\_112}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SongPPI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/LeeIIL06, author = {Taek Lee and Hoh Peter In and Eul{-}Gyu Im and Heejo Lee}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Cascade Damage Estimation Model for Internet Attacks}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {163--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_23}, doi = {10.1007/11734628\_23}, timestamp = {Fri, 18 Oct 2019 12:58:35 +0200}, biburl = {https://dblp.org/rec/conf/wisi/LeeIIL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ImICS05, author = {Eul{-}Gyu Im and Hoh Peter In and Dae{-}Sik Choi and Yong Ho Song}, title = {Adaptation Policies for Web Server Intrusion-Tolerant System}, journal = {{IEICE} Trans. Commun.}, volume = {88-B}, number = {8}, pages = {3462--3465}, year = {2005}, url = {https://doi.org/10.1093/ietcom/e88-b.8.3462}, doi = {10.1093/IETCOM/E88-B.8.3462}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ImICS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ImS05, author = {Eul{-}Gyu Im and Yong Ho Song}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {An Adaptive Approach to Handle DoS Attack for Web Services}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {634--635}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_83}, doi = {10.1007/11427995\_83}, timestamp = {Fri, 18 Oct 2019 12:58:35 +0200}, biburl = {https://dblp.org/rec/conf/isi/ImS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SongI05, author = {Yong Ho Song and Eul{-}Gyu Im}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {Secure Contents Distribution Using Flash Memory Technology}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {650--651}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_91}, doi = {10.1007/11427995\_91}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/SongI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/advis/ParkCISK04, author = {Eung Ki Park and Dae{-}Sik Choi and Eul{-}Gyu Im and Jung{-}Taek Seo and Dongkyu Kim}, editor = {Tatyana M. Yakhno}, title = {Adaptive Architecture for Web Server Survivability}, booktitle = {Advances in Information Systems, Third International Conference, {ADVIS} 2004, Izmir, Turkey, October 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3261}, pages = {172--180}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30198-1\_18}, doi = {10.1007/978-3-540-30198-1\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/advis/ParkCISK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/advis/InMZI04, author = {Hoh Peter In and Konstantinos A. Meintanis and Ming Zhang and Eul{-}Gyu Im}, editor = {Tatyana M. Yakhno}, title = {Kaliphimos: {A} Community-Based Peer-to-Peer Group Management Scheme}, booktitle = {Advances in Information Systems, Third International Conference, {ADVIS} 2004, Izmir, Turkey, October 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3261}, pages = {533--542}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30198-1\_54}, doi = {10.1007/978-3-540-30198-1\_54}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/advis/InMZI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiasim/YunPII04, author = {Joo Beom Yun and Eung Ki Park and Eul{-}Gyu Im and Hoh Peter In}, editor = {Doo{-}Kwon Baik}, title = {A Scalable, Ordered Scenario-Based Network Security Simulator}, booktitle = {Systems Modeling and Simulation: Theory and Applications, Third Asian Simulation Conference, AsiaSim 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3398}, pages = {487--494}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30585-9\_54}, doi = {10.1007/978-3-540-30585-9\_54}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/asiasim/YunPII04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ParkSIL04, author = {Eung Ki Park and Jung{-}Taek Seo and Eul{-}Gyu Im and Cheolwon Lee}, editor = {Hsinchun Chen and Reagan W. Moore and Daniel Dajun Zeng and John Leavitt}, title = {Vulnerability Analysis and Evaluation within an Intranet}, booktitle = {Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, {ISI} 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3073}, pages = {514--515}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25952-7\_45}, doi = {10.1007/978-3-540-25952-7\_45}, timestamp = {Tue, 24 May 2022 18:11:09 +0200}, biburl = {https://dblp.org/rec/conf/isi/ParkSIL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/RyuIN03, author = {Sung{-}Wook Ryu and Eul{-}Gyu Im and B. Clifford Neuman}, title = {Distributed Garbage Collection by Timeouts and Backward Inquiry}, booktitle = {27th International Computer Software and Applications Conference {(COMPSAC} 2003): Design and Assessment of Trustworthy Software-Based Systems, 3-6 November 2003, Dallas, TX, USA, Proceedings}, pages = {426--432}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CMPSAC.2003.1245375}, doi = {10.1109/CMPSAC.2003.1245375}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/RyuIN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ImN03, author = {Eul{-}Gyu Im and B. Clifford Neuman}, title = {A Flexible Framework for Replication in Distributed Systems}, booktitle = {27th International Computer Software and Applications Conference {(COMPSAC} 2003): Design and Assessment of Trustworthy Software-Based Systems, 3-6 November 2003, Dallas, TX, USA, Proceedings}, pages = {486--491}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CMPSAC.2003.1245384}, doi = {10.1109/CMPSAC.2003.1245384}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ImN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/SohnMLIS03, author = {Taeshik Shon and Jongsub Moon and Cheolwon Lee and Eul{-}Gyu Im and Jung{-}Taek Seo}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {Safe Patch Distribution Architecture in Intranet Environments}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2}, pages = {455--460}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Fri, 10 Aug 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/SohnMLIS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiIL03, author = {Dae{-}Sik Choi and Eul{-}Gyu Im and Cheol Won Lee}, editor = {Kijoon Chae and Moti Yung}, title = {Intrusion-Tolerant System Design for Web Server Survivability}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {124--134}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_10}, doi = {10.1007/978-3-540-24591-9\_10}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiIL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.