Search

Your search keyword '"Kangbin Yim"' showing total 359 results

Search Constraints

Start Over You searched for: Author "Kangbin Yim" Remove constraint Author: "Kangbin Yim"
359 results on '"Kangbin Yim"'

Search Results

1. CF-AIDS: Comprehensive Frequency-Agnostic Intrusion Detection System on In-Vehicle Network

2. Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies

3. LPMSAEF: Lightweight process mining-based software architecture evaluation framework for security and performance analysis

4. Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes

5. Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT

6. Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT

7. Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption

8. CANPerFL: Improve In-Vehicle Intrusion Detection Performance by Sharing Knowledge

9. Analysis of Key Storage Mechanism of Asymmetric Key-Related Functions in CNG Crypto Library

10. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services

11. Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing

12. Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

13. BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems

14. Machine Learning Based File Entropy Analysis for Ransomware Detection in Backup Systems

15. TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network

16. A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments

17. Better Not to Use Vulnerability’s Reference for Exploitability Prediction

18. Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication

19. A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing

Catalog

Books, media, physical & digital resources