Search

Your search keyword '"DaeHun Nyang"' showing total 99 results

Search Constraints

Start Over You searched for: Author "DaeHun Nyang" Remove constraint Author: "DaeHun Nyang" Topic business.industry Remove constraint Topic: business.industry
99 results on '"DaeHun Nyang"'

Search Results

1. A One-Page Text Entry Method Optimized for Rectangle Smartwatches

2. DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification

3. ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation

4. e-PoS: Making Proof-of-Stake Decentralized and Fair

5. Large-scale and Robust Code Authorship Identification with Deep Feature Learning

6. Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation

7. AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors

8. Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference

9. Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions

10. Exploring the Attack Surface of Blockchain: A Comprehensive Survey

11. Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet

12. Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service

13. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach

14. Systemically Evaluating the Robustness of ML-based IoT Malware Detectors

15. Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube

16. Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems

17. Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers

18. From Blue-Sky to Practical Adversarial Learning

19. DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

20. Measuring the Cost of Software Vulnerabilities

21. Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

22. Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks

23. An Analysis of Users Engagement on Twitter During the COVID-19 Pandemic: Topical Trends and Sentiments

24. Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks

25. A Privacy-Preserving Mobile Payment System for Mass Transit

27. Examining the Security of DDoS Detection Systems in Software Defined Networks

28. IoT malware ecosystem in the wild

29. Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks

30. Distributed Network Resource Sharing AP in Inter-WLAN Environments (poster)

31. Analyzing endpoints in the internet of things malware

32. Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems

34. Digital Legal Seal for Message Authentication Code

35. Matchmaker: Fuzzy Vault Scheme for Weighted Preference

36. SSD-assisted Ransomware Detection and Data Recovery Techniques

37. Large-Scale and Language-Oblivious Code Authorship Identification

38. Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT

39. Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks

40. SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery

41. Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions

43. Short Dynamic Group Signature Scheme Supporting Controllable Linkability

45. Evil-Twin Detection Scheme Using SVM with Multi-Factors

46. Transaction authentication using complementary colors

47. Understanding the effectiveness of typosquatting techniques

48. Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications

49. Understanding the Privacy Implications of DNSSEC Look-Aside Validation

50. Two-level network monitoring and management in WLAN using software-defined networking

Catalog

Books, media, physical & digital resources