Boojoong Kang
Orcid: 0000-0001-5984-9867
According to our database1,
Boojoong Kang
authored at least 38 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Sixth Distributed Ledger Technology Workshop (DLT 2024), 2024
2023
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM.
Proceedings of the Ubiquitous Security, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Broadening The Solution Space of Feature Selection in Time-interval-based Malware Detection.
Proceedings of the 14th International Conference on Ambient Systems, 2023
2022
IEEE Access, 2022
2020
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2020
2019
J. Supercomput., 2019
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features.
IEEE Trans. Inf. Forensics Secur., 2019
Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control.
Proceedings of the Critical Information Infrastructures Security, 2019
2018
A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks.
EURASIP J. Wirel. Commun. Netw., 2018
IEEE Access, 2018
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
Credible, resilient, and scalable detection of software plagiarism using authority histograms.
Knowl. Based Syst., 2016
Int. J. Cyber Situational Aware., 2016
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
2015
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015
Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015
2014
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering.
Digit. Investig., 2014
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2012
Proceedings of the Research in Applied Computation Symposium, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Research in Applied Computation Symposium, 2011
Proceedings of the Research in Applied Computation Symposium, 2011