Boojoong Kang

Orcid: 0000-0001-5984-9867

According to our database1, Boojoong Kang authored at least 38 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-based DNS: Current Solutions and Challenges to Adoption.
Proceedings of the Sixth Distributed Ledger Technology Workshop (DLT 2024), 2024

2023
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM.
Proceedings of the Ubiquitous Security, 2023

The Effectiveness of Transformer-Based Models for BEC Attack Detection.
Proceedings of the Network and System Security - 17th International Conference, 2023

Broadening The Solution Space of Feature Selection in Time-interval-based Malware Detection.
Proceedings of the 14th International Conference on Ambient Systems, 2023

2022
Detection Method for Randomly Generated User IDs: Lift the Curse of Dimensionality.
IEEE Access, 2022

2020
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2020

2019
Binary executable file similarity calculation using function matching.
J. Supercomput., 2019

A Multimodal Deep Learning Method for Android Malware Detection Using Various Features.
IEEE Trans. Inf. Forensics Secur., 2019

Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control.
Proceedings of the Critical Information Infrastructures Security, 2019

2018
Runtime Detection Framework for Android Malware.
Mob. Inf. Syst., 2018

A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks.
EURASIP J. Wirel. Commun. Netw., 2018

Weighted Harvest-Then-Transmit: UAV-Enabled Wireless Powered Communication Networks.
IEEE Access, 2018

Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system.
Proceedings of the 2017 International Conference on Cyber Security And Protection Of Digital Services, 2017

Deep Android Malware Detection.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Credible, resilient, and scalable detection of software plagiarism using authority histograms.
Knowl. Based Syst., 2016

N-gram Opcode Analysis for Android Malware Detection.
Int. J. Cyber Situational Aware., 2016

Fuzzy Logic-based Implicit Authentication for Mobile Access Control.
CoRR, 2016

Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016

N-opcode analysis for android malware classification and categorization.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

2015
Malware analysis using visualized images and entropy graphs.
Int. J. Inf. Sec., 2015

PageRank in malware categorization.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

Event-Driven Implicit Authentication for Mobile Access Control.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations.
Proceedings of the 20th IEEE Conference on Emerging Technologies & Factory Automation, 2015

2014
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering.
Digit. Investig., 2014

Similarity calculation method for user-define functions to detect malware variants.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

TASEL: dynamic taint analysis with selective control dependency.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

2013
Rule-based anti-anti-debugging system.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Function matching-based binary-level software similarity calculation.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Android malware classification method: Dalvik bytecode frequency analysis.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Software plagiarism detection: a graph-based approach.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Malware classification method via binary content comparison.
Proceedings of the Research in Applied Computation Symposium, 2012

Balanced Indexing Method for Efficient Intrusion Detection Systems.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Rule Indexing for Efficient Intrusion Detection Systems.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Fast malware family detection method using control flow graphs.
Proceedings of the Research in Applied Computation Symposium, 2011

Malware classification using instruction frequencies.
Proceedings of the Research in Applied Computation Symposium, 2011


  Loading...