Mirang Park
According to our database1,
Mirang Park
authored at least 46 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar.
Future Internet, August, 2024
2022
Artif. Life Robotics, 2022
2021
Proceedings of the Advances in Information and Computer Security, 2021
Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
2020
Int. J. Grid Util. Comput., 2020
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication.
Proceedings of the Advances in Internet, 2020
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
2019
Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker.
Int. J. Netw. Comput., 2019
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic.
Artif. Life Robotics, 2019
Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMG.
Proceedings of the Advances in Networked-based Information Systems, 2019
Proceedings of the Advances in Networked-based Information Systems, 2019
Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift Rule.
Proceedings of the Advances in Networked-based Information Systems, 2019
Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files.
Proceedings of the Advances in Networked-based Information Systems, 2019
Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
2018
A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method.
J. Inf. Process., 2018
On applying support vector machines to a user authentication method using surface electromyogram signals.
Artif. Life Robotics, 2018
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG.
Proceedings of the Advances in Network-Based Information Systems, 2018
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Advances in Internet, 2018
Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance.
Proceedings of the Advances in Internet, 2018
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG.
Proceedings of the Advances in Internet, 2018
Proceedings of the Advances in Internet, 2018
2017
Evaluation of feature values of surface electromyograms for user authentication on mobile devices.
Artif. Life Robotics, 2017
Novel Unsupervised SPITters Detection Scheme by Automatically Solving Unbalanced Situation.
IEEE Access, 2017
Highly Responsive Distributed Denial-of-Service Attacks Detection by Using Real-Time Burst Detection Method.
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
2016
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
An Authentication Method Independent of Tap Operation on the Touchscreen of a Mobile Device.
J. Robotics Netw. Artif. Life, 2015
Security Evaluation System for Android Applications Using User's Reviews and Permissions.
J. Robotics Netw. Artif. Life, 2015
J. Robotics Netw. Artif. Life, 2015
Proposal of Rhythm Authentication Method Using Users Classification by Self-Organizing Map.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014
2006
A proposal and its evaluations of a re-keying system for dynamic secure group communications.
Syst. Comput. Jpn., 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006
2004
A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group Communications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004