Attention-Based Automated Feature Extraction for Malware Analysis
Choi, Sunoh, Bae, Jangseong, Lee, Changki, Kim, Youngsoo, Kim, Jonghyun
Published in Sensors (Basel, Switzerland) (20.05.2020)
Published in Sensors (Basel, Switzerland) (20.05.2020)
Get full text
Journal Article
Secure kNN Query Processing in Untrusted Cloud Environments
Sunoh Choi, Ghinita, Gabriel, Hyo-Sang Lim, Bertino, Elisa
Published in IEEE transactions on knowledge and data engineering (01.11.2014)
Published in IEEE transactions on knowledge and data engineering (01.11.2014)
Get full text
Journal Article
Evaluations of AI‐based malicious PowerShell detection with feature optimizations
Song, Jihyeon, Kim, Jungtae, Choi, Sunoh, Kim, Jonghyun, Kim, Ikkyun
Published in ETRI journal (01.06.2021)
Published in ETRI journal (01.06.2021)
Get full text
Journal Article
A study of the relationship of malware detection mechanisms using Artificial Intelligence
Song, Jihyeon, Choi, Sunoh, Kim, Jungtae, Park, Kyungmin, Park, Cheolhee, Kim, Jonghyun, Kim, Ikkyun
Published in ICT express (01.06.2024)
Published in ICT express (01.06.2024)
Get full text
Journal Article
Evaluations of AI-based malicious PowerShell detection with feature optimizations
Song, Jihyeon, Kim, Jungtae, Choi, Sunoh, Kim, Jonghyun, Kim, Ikkyun
Published in ETRI journal (18.06.2021)
Get full text
Published in ETRI journal (18.06.2021)
Journal Article
Malware detection using malware image and deep learning
Sunoh Choi, Sungwook Jang, Youngsoo Kim, Jonghyun Kim
Published in 2017 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2017)
Published in 2017 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2017)
Get full text
Conference Proceeding
Network abnormal behaviour analysis system
Sunoh Choi, Yangseo Choi, Jooyoung Lee, Jonghyun Kim, Ikkyun Kim
Published in 2017 19th International Conference on Advanced Communication Technology (ICACT) (2017)
Published in 2017 19th International Conference on Advanced Communication Technology (ICACT) (2017)
Get full text
Conference Proceeding
Hierarchical network signature clustering and generation
Sunoh Choi, Jooyoung Lee, Yangseo Choi, Jonghyun Kim, Ikkyun Kim
Published in 2016 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2016)
Published in 2016 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2016)
Get full text
Conference Proceeding
A forensically robust data acquisition from a 10G line-rate network
Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim
Published in 2016 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2016)
Published in 2016 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2016)
Get full text
Conference Proceeding
Traffic storing and related information generation system for cyber attack analysis
Yangseo Choi, Joo-Young Lee, Sunoh Choi, Jong-Hyun Kim, Ikkyun Kim
Published in 2016 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2016)
Published in 2016 International Conference on Information and Communication Technology Convergence (ICTC) (01.10.2016)
Get full text
Conference Proceeding
Detection of Malicious PDF based on Document Structure Features and Stream Objects
Kang, Ah Reum, Jeong, Young-Seob, Kim, Se Lyeong, Kim, Jonghyun, Woo, Jiyoung, Choi, Sunoh
Published in 韓國컴퓨터情報學會論文誌 (2018)
Get full text
Published in 韓國컴퓨터情報學會論文誌 (2018)
Journal Article