17 results on '"Ryul Kim"'
Search Results
2. A malware detection system based on heterogeneous information network.
3. Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph.
4. Intrusion Detection System based on Complex Event Processing in RFID middleware.
5. K-strings algorithm, a new approach based on Kmeans.
6. A new approach to the edit distance with block swaps using DAWG.
7. Application of sim-hash algorithm and big data analysis in spam email detection system.
8. Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android apps.
9. A better edit distance measure allowing for block swaps.
10. Combining principal component analysis, decision tree and naïve Bayesian algorithm for adaptive intrusion detection.
11. Improving a hierarchical pattern matching algorithm using cache-aware Aho-Corasick automata.
12. Performance analysis of security enforcement on Android operating system.
13. Measuring similarities among intrusion detection rules on the MapReduce environment.
14. Improved signature based intrusion detection using clustering rule for decision tree.
15. A hybrid design of online execution class and encryption-based copyright protection for Android apps.
16. Proceedings of the 2015 Conference on research in adaptive and convergent systems, RACS 2015, Prague, Czech Republic, October 9-12, 2015
17. Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, RACS 2014, Towson, Maryland, USA, October 5-8, 2014
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.