A survey of deep learning-based network anomaly detection
Kwon, Donghwoon, Kim, Hyunjoo, Kim, Jinoh, Suh, Sang C., Kim, Ikkyun, Kim, Kuinam J.
Published in Cluster computing (01.01.2019)
Published in Cluster computing (01.01.2019)
Get full text
Journal Article
Evaluations of AI‐based malicious PowerShell detection with feature optimizations
Song, Jihyeon, Kim, Jungtae, Choi, Sunoh, Kim, Jonghyun, Kim, Ikkyun
Published in ETRI journal (01.06.2021)
Published in ETRI journal (01.06.2021)
Get full text
Journal Article
A study of the relationship of malware detection mechanisms using Artificial Intelligence
Song, Jihyeon, Choi, Sunoh, Kim, Jungtae, Park, Kyungmin, Park, Cheolhee, Kim, Jonghyun, Kim, Ikkyun
Published in ICT express (01.06.2024)
Published in ICT express (01.06.2024)
Get full text
Journal Article
An Empirical Evaluation of Deep Learning for Network Anomaly Detection
Malaiya, Ritesh K., Kwon, Donghwoon, Suh, Sang C., Kim, Hyunjoo, Kim, Ikkyun, Kim, Jinoh
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
Clustering-based label estimation for network anomaly detection
Baek, Sunhee, Kwon, Donghwoon, Suh, Sang C., Kim, Hyunjoo, Kim, Ikkyun, Kim, Jinoh
Published in Digital communications and networks (01.02.2021)
Published in Digital communications and networks (01.02.2021)
Get full text
Journal Article
PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording
Shin, Seon-Ho, Lee, Jooyoung, Jeong, Ji-Man, Kim, HyunBong, Kim, Jong-Hyun, Kim, Ikkyun, Yoon, MyungKeun
Published in IEEE network (01.11.2016)
Published in IEEE network (01.11.2016)
Get full text
Journal Article
Evaluations of AI-based malicious PowerShell detection with feature optimizations
Song, Jihyeon, Kim, Jungtae, Choi, Sunoh, Kim, Jonghyun, Kim, Ikkyun
Published in ETRI journal (18.06.2021)
Get full text
Published in ETRI journal (18.06.2021)
Journal Article
Hash Table with Expanded-Key for High-Speed Networking
SHIN, Seon-Ho, LEE, Jooyoung, KIM, Jong-Hyun, KIM, Ikkyun, YOON, MyungKeun
Published in IEICE Transactions on Information and Systems (01.03.2016)
Published in IEICE Transactions on Information and Systems (01.03.2016)
Get full text
Journal Article
Hash Table with Expanded-Key for High-Speed Networking
Shin, Seon-Ho, Lee, Jooyoung, Kim, Jong-Hyun, Kim, Ikkyun, Yoon, Myungkeun
Published in IEICE transactions on information and systems (01.01.2016)
Published in IEICE transactions on information and systems (01.01.2016)
Get full text
Journal Article
Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks
Sunhee Baek, Donghwoon Kwon, Jinoh Kim, Suh, Sang C., Hyunjoo Kim, Ikkyun Kim
Published in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (01.06.2017)
Published in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (01.06.2017)
Get full text
Conference Proceeding
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique
Daewon Kim, Ikkyun Kim, Jintae Oh, Hyunsook Cho
Published in 2009 IEEE International Conference on Communications (01.06.2009)
Published in 2009 IEEE International Conference on Communications (01.06.2009)
Get full text
Conference Proceeding
A lightweight network anomaly detection technique
Jinoh Kim, Yoo, Wucherl, Sim, Alex, Suh, Sang C., Ikkyun Kim
Published in 2017 International Conference on Computing, Networking and Communications (ICNC) (13.03.2017)
Published in 2017 International Conference on Computing, Networking and Communications (ICNC) (13.03.2017)
Get full text
Conference Proceeding
Tracing Stored Program Counter to Detect Polymorphic Shellcode
KIM, Daewon, KIM, Ikkyun, OH, Jintae, JANG, Jongsoo
Published in IEICE Transactions on Information and Systems (2008)
Published in IEICE Transactions on Information and Systems (2008)
Get full text
Journal Article
An approach to online network monitoring using clustered patterns
Jinoh Kim, Sim, Alex, Suh, Sang C., Ikkyun Kim
Published in 2017 International Conference on Computing, Networking and Communications (ICNC) (13.03.2017)
Published in 2017 International Conference on Computing, Networking and Communications (ICNC) (13.03.2017)
Get full text
Conference Proceeding
Anomaly detection method using network pattern analysis of process
Get full text
Conference Proceeding