19 results on '"Kim, Huy Kang"'
Search Results
2. GUIDE: GAN-based UAV IDS Enhancement
3. volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model
4. Match experiences affect interest: Impacts of matchmaking and performance on churn in a competitive game
5. Unsupervised malicious domain detection with less labeling effort
6. TZMon: Improving mobile game security with ARM trustzone
7. AutoVAS: An automated vulnerability analysis system with a deep learning approach
8. Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks
9. Cybersecurity for autonomous vehicles: Review of attacks and defense
10. Cosine similarity based anomaly detection methodology for the CAN bus
11. De-Wipimization: Detection of data wiping traces for investigating NTFS file system
12. What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol
13. CAN-ADF: The controller area network attack detection framework
14. In-vehicle network intrusion detection using deep convolutional neural network
15. Ransomware protection using the moving target defense perspective
16. Anomaly intrusion detection method for vehicular networks based on survival analysis
17. Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
18. Online game bot detection based on party-play log analysis
19. DSS for computer security incident response applying CBR and collaborative response
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.