Eul-Gyu Im
Orcid: 0000-0002-4130-513XAffiliations:
- Hanyang University, Seoul, South Korea
According to our database1,
Eul-Gyu Im
authored at least 70 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the Ubiquitous Security, 2023
2022
IEEE Access, 2022
2020
Concurr. Comput. Pract. Exp., 2020
Concurr. Comput. Pract. Exp., 2020
2019
J. Supercomput., 2019
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features.
IEEE Trans. Inf. Forensics Secur., 2019
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019
Automatic hybrid analysis technique to improve botnet code coverage using fake server.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019
2018
Secur. Commun. Networks, 2018
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
2017
Extracting the Representative API Call Patterns of Malware Families Using Recurrent Neural Network.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017
2016
Credible, resilient, and scalable detection of software plagiarism using authority histograms.
Knowl. Based Syst., 2016
Intell. Autom. Soft Comput., 2016
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2016
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016
2015
Proceedings of the Rough Sets and Knowledge Technology - 10th International Conference, 2015
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
Extracting representative API patterns of malware families using multiple sequence alignments.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
2014
J. Internet Serv. Inf. Secur., 2014
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering.
Digit. Investig., 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Int. J. E Entrepreneurship Innov., 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the Research in Adaptive and Convergent Systems, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2012
Proceedings of the Research in Applied Computation Symposium, 2012
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Research in Applied Computation Symposium, 2011
Proceedings of the Research in Applied Computation Symposium, 2011
Proceedings of the International Conference on IT Convergence and Security, 2011
Proceedings of the International Conference on IT Convergence and Security, 2011
Proceedings of the International Conference on IT Convergence and Security, 2011
Proceedings of the International Conference on IT Convergence and Security, 2011
Proceedings of the International Conference on IT Convergence and Security, 2011
2010
IEEE Trans. Consumer Electron., 2010
Efficient shortest path finding of k-nearest neighbor objects in road network databases.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
2008
Proceedings of the Intelligence and Security Informatics, 2008
2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Survey on low power routing protocols in MANET from security viewpoints.
Proceedings of the 2007 International Conference on Wireless Networks, 2007
Proceedings of the Computational Science and Its Applications, 2007
2006
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Information System Modeling for Analysis of Propagation Effects and Levels of Damage.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
2005
IEICE Trans. Commun., 2005
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Intelligence and Security Informatics, 2005
2004
Proceedings of the Intelligence and Security Informatics, 2004
Proceedings of the Systems Modeling and Simulation: Theory and Applications, 2004
Proceedings of the Advances in Information Systems, Third International Conference, 2004
Proceedings of the Advances in Information Systems, Third International Conference, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003