477 results on '"Kyungho Lee"'
Search Results
52. A Systematic Literature Review on the Mobile Malware Detection Methods.
53. ART: Automated Reclassification for Threat Actors based on ATT&CK Matrix Similarity.
54. Honeypot System for Automatic Reporting of Illegal Online Gambling Sites Utilizing SMS Spam.
55. A single chip PPG sensor with enhanced IR sensitivity for low power and small size.
56. Analysis of the Asymmetrical Relationships between State Actors and APT Threat Groups.
57. A Statistical Approach Towards Fraud Detection in the Horse Racing.
58. Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis.
59. The Gravy Value: A Set of Features for Pinpointing BOT Detection Method.
60. A 400-to-1000nm 24μ W Monolithic PPG Sensor with 0.3A/W Spectral Responsivity for Miniature Wearables.
61. Factors Affecting Corporate Security Policy Effectiveness in Telecommuting.
62. Learning time-critical responses for interactive character control.
63. 22.2 An 8.5Gb/s/pin 12Gb-LPDDR5 SDRAM with a Hybrid-Bank Architecture using Skew-Tolerant, Low-Power and Speed-Boosting Techniques in a 2nd generation 10nm DRAM Process.
64. A 0.6 ㎛ Small Pixel for High Resolution CMOS Image Sensor with Full Well Capacity of 10, 000e- by Dual Vertical Transfer Gate Technology.
65. Understanding the Deployment Cost of Cloud Computing Services for the Higher Education Institutions.
66. Developing Empathy for People with Bipolar Disorder Through Interactive Performance.
67. Turn On the Lights: User Behavior in Game Environment Using CPTED.
68. A Model for Detecting Cryptocurrency Transactions with Discernible Purpose.
69. Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid.
70. Evaluating Cybersecurity Capacity Building of ASEAN Plus Three through Social Network Analysis
71. The Emerging Media Art Performance of Eine Kleine Nachtmusik.
72. Complex Network of Damage Assessment Using GMM Based FAIR.
73. Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System.
74. DDoS Mitigation: Decentralized CDN Using Private Blockchain.
75. Splitting of Hydrogen Atoms into Proton–Electron Pairs at BaO–Ru Interfaces for Promoting Ammonia Synthesis under Mild Conditions
76. T Cell Nrf2/Keap1 Gene Editing Using CRISPR/Cas9 and Experimental Kidney Ischemia-Reperfusion Injury
77. SoK: A Systematic Review of Insider Threat Detection.
78. Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model.
79. Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness.
80. All-Directional Dual Pixel Auto Focus Technology in CMOS Image Sensors.
81. An indoor positioning system using pedestrian dead reckoning with WiFi and map-matching aided.
82. FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device.
83. Breaking Text CAPTCHA by Repeated Information.
84. Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident.
85. Cyber situational awareness enhancement with regular expressions and an evaluation methodology.
86. A study on the priority decision making of IT goals in COBIT 5 goals cascade.
87. Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders.
88. Money Laundering in the Bitcoin Network: Perspective of Mixing Services.
89. Understanding the Stability of Deep Control Policies for Biped Locomotion.
90. Situational Awareness Framework for Threat Intelligence Measurement of Android Malware.
91. An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation.
92. Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media.
93. An Analysis of Economic Impact on IoT Industry under GDPR.
94. Advanced approach to information security management system utilizing maturity models in critical infrastructure.
95. Immune Checkpoint Molecule TIGIT Regulates Kidney T Cell Functions and Contributes to AKI
96. Data De-identification Framework
97. A Study on the Method of Restoring Marker-based on Machine Learning for the Utilization of Augmented Reality Registration on Ship
98. An analysis of economic impact on IoT under GDPR.
99. Piping auto-routing using key-node generation method in ships
100. Comparing security vulnerability by operating system environment.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.