31 results on '"Cho, Jaeik"'
Search Results
2. Smart seed selection-based effective black box fuzzing for IIoT protocol
3. A Network Data Abstraction Method for Data Set Verification
4. A Novel 8T XNOR-SRAM: Computing-in-Memory Design for Binary/Ternary Deep Neural Networks
5. A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing
6. Compact Single-Ended Transceivers Demonstrating Flexible Generation of 1/N-Rate Receiver Front-Ends for Short-Reach Links
7. A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model
8. Compact Single-Ended Transceivers Demonstrating Flexible Generation of 1/N-Rate Receiver Front-Ends for Short-Reach Links
9. Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection
10. A Layout Generator of Latch, Flip-Flop, and Shift Register for High-Speed Links
11. Power dissipation and area comparison of 512-bit and 1024-bit key AES
12. Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction
13. A Malware Detection and Extraction Method for the Related Information Using the ViT Attention Mechanism on Android Operating System.
14. A Study on High-Speed Outlier Detection Method of Network Abnormal Behavior Data Using Heterogeneous Multiple Classifiers
15. Dynamic learning model update of hybrid-classifiers for intrusion detection
16. A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed
17. A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model
18. Low Power Approximate Multiplier Using Error Tolerant Adder
19. Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection
20. Editorial of special section on enabling technologies for industrial and smart sensor internet of things systems
21. A Reliability Comparison Method for OSINT Validity Analysis
22. Guest Editorial: Information and Communication Security in Multimedia Applications
23. Feature Selection with PCA based on DNS Query for Malicious Domain Classification
24. A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed
25. Dynamic learning model update of hybrid-classifiers for intrusion detection
26. A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors
27. Enhanced Security Protocols for EPC Global Gen2 on Smart Grid Network
28. A statistical model for network data analysis: KDD CUP 99’ data evaluation and its comparing with MIT Lincoln Laboratory network data
29. Visualization of network components for attack analysis
30. An effective denial of service detection method using kernel based data
31. Study of fuzzy clustering methods for malicious codes using native API call frequency
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.