43 results on '"Choi, Sunoh"'
Search Results
2. Deep Learning Based Malware Analysis
3. Hierarchical Similarity Hash for Fast Malware Detection
4. Analysis of Vulnerabilities in College Web-Based System
5. Anomaly Detection and Analysis in Nuclear Power Plants.
6. Deep Learning Based Malware Analysis
7. Oauth 2.0 Authentication with Blockchain-based ERC-721 Tokens
8. Hierarchical Similarity Hash for Fast Malware Detection
9. Stealing Wireless Router User Data Through Buffer Overflow Vulnerability and Tampering Firmware
10. Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows
11. Novel Feature Extraction Method for Detecting Malicious MQTT Traffic Using Seq2Seq
12. A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations
13. Similar Word Replacement Method for Improving News Commenter Analysis
14. Internet News User Analysis Using Deep Learning and Similarity Comparison
15. Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows
16. Malicious Powershell Detection Using Graph Convolution Network
17. Evaluations of AI‐based malicious PowerShell detection with feature optimizations
18. Malicious PowerShell Detection Using Attention against Adversarial Attacks
19. Combined kNN Classification and Hierarchical Similarity Hash for Fast Malware Detection
20. Attention-Based Automated Feature Extraction for Malware Analysis
21. Similarity Hash Index
22. Malware detection using malware image and deep learning
23. Cyber Black Box: Network intrusion forensics system for collecting and preserving evidence of attack
24. Cyber Blackbox for collecting network evidence
25. Network abnormal behaviour analysis system
26. Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence
27. Hierarchical network signature clustering and generation
28. A forensically robust data acquisition from a 10G line-rate network
29. Traffic storing and related information generation system for cyber attack analysis
30. Authenticated Top-K Aggregation in Distributed and Authenticated Top-K Aggregation in Distributed and
31. Introduction to a network forensics system for cyber incidents analysis
32. Transmitted file extraction and reconstruction from network packets
33. Secure kNN Query Processing in Untrusted Cloud Environments
34. Secure mutual proximity zone enclosure evaluation
35. Secure mutual proximity zone enclosure evaluation
36. Secure kNN Query Processing in Untrusted Cloud Environments
37. Secure sensor network SUM aggregation with detection of malicious nodes
38. Secure and resilient proximity-based access control
39. Secure sensor network SUM aggregation with detection of malicious nodes
40. Authenticated Top-K Aggregation in Distributed and Outsourced Databases
41. Energy efficient Network Mobility under Scatternet/WLAN coexistence
42. Efficient MD Coding Core Selection to Reduce the Bandwidth Consumption
43. Secure and Resilient Proximity-based Access Control.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.