SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection
O'Kane, P., Sezer, S., McLaughlin, K., Eul Gyu Im
Published in IEEE transactions on information forensics and security (01.03.2013)
Published in IEEE transactions on information forensics and security (01.03.2013)
Get full text
Journal Article
Impacts of aerosols on regional meteorology due to Siberian forest fires in May 2003
Youn, Daeok, Park, Rokjin J., Jeong, Jaein I., Moon, Byung-Kwon, Yeh, Sang-Wook, Kim, Young Ho, Woo, Jung-Hun, Im, Eul Gyu, Jeong, Jee-Hoon, Lee, Suk-Jo, Song, Chang-Keun
Published in Atmospheric environment (1994) (01.03.2011)
Published in Atmospheric environment (1994) (01.03.2011)
Get full text
Journal Article
Efficient reuse of local regions in memory-limited mobile devices
Kim, Seonggun, Kim, Taein, Im, Eul, Han, Hwansoo
Published in IEEE transactions on consumer electronics (01.08.2010)
Published in IEEE transactions on consumer electronics (01.08.2010)
Get full text
Journal Article
임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술
정병호, 김용혁, 배성일, 임을규, Jeoung, Byeoung Ho, Kim, Yong Hyuk, Bae, Sung il, Im, Eul Gyu
Published in 스마트미디어저널 (01.03.2018)
Published in 스마트미디어저널 (01.03.2018)
Get full text
Journal Article
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model
Chung, YoonJung, Kim, InJung, Lee, Chulsoo, Im, Eul Gyu, Won, Dongho
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Get full text
Book Chapter
Conference Proceeding
Cascade Damage Estimation Model for Internet Attacks
Lee, Taek, In, Hoh Peter, Im, Eul-Gyu, Lee, Heejo
Published in Intelligence and Security Informatics (2006)
Published in Intelligence and Security Informatics (2006)
Get full text
Book Chapter
Conference Proceeding
Information System Modeling for Analysis of Propagation Effects and Levels of Damage
Kim, InJung, Chung, YoonJung, Lee, YoungGyo, Im, Eul Gyu, Won, Dongho
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Get full text
Book Chapter
Conference Proceeding
A new methodology of analyzing security vulnerability for network services
YONG HO SONG, JUNG MIN PARK, PARK, Yongsu, EUL GYU IM
Published in Lecture notes in computer science (2006)
Published in Lecture notes in computer science (2006)
Get full text
Conference Proceeding
Hybrid modeling for large-scale worm propagation simulations
EUL GYU IM, JUNG TAEK SEO, KIM, Dong-Soo, YONG HO SONG, PARK, Yongsu
Published in Lecture notes in computer science (2006)
Published in Lecture notes in computer science (2006)
Get full text
Conference Proceeding
Malware analysis using visualized images and entropy graphs
Han, Kyoung Soo, Lim, Jae Hyun, Kang, Boojoong, Im, Eul Gyu
Published in International journal of information security (01.02.2015)
Published in International journal of information security (01.02.2015)
Get full text
Journal Article