Robust bootstrapping memory analysis against anti-forensics
Lee, Kyoungho, Hwang, Hyunuk, Kim, Kibom, Noh, BongNam
Published in Digital investigation (07.08.2016)
Published in Digital investigation (07.08.2016)
Get full text
Journal Article
Network Anomaly Detection Based on Clustering of Sequence Patterns
Noh, Sang-Kyun, Kim, Yong-Min, Kim, DongKook, Noh, Bong-Nam
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Get full text
Book Chapter
Conference Proceeding
The Activity Analysis of Malicious HTTP-Based Botnets Using Degree of Periodic Repeatability
Jae-Seo Lee, HyunCheol Jeong, Jun-Hyung Park, Minsoo Kim, Bong-Nam Noh
Published in 2008 International Conference on Security Technology (01.12.2008)
Published in 2008 International Conference on Security Technology (01.12.2008)
Get full text
Conference Proceeding
Modeling of Network Intrusions Based on the Multiple Transition Probability
Noh, Sang-Kyun, Kim, DongKook, Kim, Yong-Min, Noh, Bong-Nam
Published in Advances in Information and Computer Security (2006)
Published in Advances in Information and Computer Security (2006)
Get full text
Book Chapter
Conference Proceeding
Network Intrusion Detection Using Statistical Probability Distribution
MUN, Gil-Jong, KIM, Yong-Min, KIM, Dongkook, NOH, Bong-Nam
Published in Lecture notes in computer science (2006)
Get full text
Published in Lecture notes in computer science (2006)
Conference Proceeding
A Security Architecture for Adapting Multiple Access Control Models to Operating Systems
Kim, Jung-Sun, Lee, SeungYong, Kim, Minsoo, Seo, Jae-Hyun, Noh, Bong-Nam
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Get full text
Book Chapter
Conference Proceeding
Auto-generation of detection rules with tree induction algorithm
KIM, Minsoo, SEO, Jae-Hyun, CHEONG, Il-Ahn, NOH, Bong-Nam
Published in Lecture notes in computer science (2005)
Get full text
Published in Lecture notes in computer science (2005)
Conference Proceeding
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach
Mun, Gil-Jong, Kim, Yong-Min, Kim, DongKook, Noh, Bong-Nam
Published in Information Security and Cryptology (2005)
Published in Information Security and Cryptology (2005)
Get full text
Book Chapter
Conference Proceeding
Analysis of HTTP2P botnet: case study waledac
Dae-il Jang, Minsoo Kim, Hyun-chul Jung, Bong-Nam Noh
Published in 2009 IEEE 9th Malaysia International Conference on Communications (MICC) (01.12.2009)
Published in 2009 IEEE 9th Malaysia International Conference on Communications (MICC) (01.12.2009)
Get full text
Conference Proceeding
An efficient similarity measure for clustering of categorical sequences
NOH, Sang-Kyun, KIM, Yong-Min, KIM, Dongkook, NOH, Bong-Nam
Published in Lecture notes in computer science (2006)
Published in Lecture notes in computer science (2006)
Get full text
Conference Proceeding
Detection of Parameter Manipulation Using Global Sequence Alignment
Jae-Chul Park, Bong-Nam Noh
Published in International Conference on Next Generation Web Services Practices (01.09.2006)
Published in International Conference on Next Generation Web Services Practices (01.09.2006)
Get full text
Conference Proceeding
Android platform based linux kernel rootkit
Dong-Hoon You, Bong-Nam Noh
Published in 2011 6th International Conference on Malicious and Unwanted Software (01.10.2011)
Published in 2011 6th International Conference on Malicious and Unwanted Software (01.10.2011)
Get full text
Conference Proceeding
A Similarity based Technique for Detecting Malicious Executable files for Computer Forensics
Jun-Hyung Park, Minsoo Kim, Bong-Nam Noh, Joshi, J.B.D.
Published in 2006 IEEE International Conference on Information Reuse & Integration (01.09.2006)
Published in 2006 IEEE International Conference on Information Reuse & Integration (01.09.2006)
Get full text
Conference Proceeding
A fuzzy logic based expert system as a network forensics
KIM, Jung-Sun, KIM, Dong-Geun, NOH, Bong-Nam
Published in 2004 IEEE International Conference on Fuzzy Systems (IEEE Cat. No.04CH37542) (2004)
Published in 2004 IEEE International Conference on Fuzzy Systems (IEEE Cat. No.04CH37542) (2004)
Get full text
Conference Proceeding
Detecting P2P Botnets Using a Multi-phased Flow Model
Sang-Kyun Noh, Joo-Hyung Oh, Jae-Seo Lee, Bong-Nam Noh, Hyun-Cheol Jeong
Published in 2009 Third International Conference on Digital Society (01.02.2009)
Published in 2009 Third International Conference on Digital Society (01.02.2009)
Get full text
Conference Proceeding
Evasion technique and detection of malicious botnet
Dae-il Jang, Kang-yu Cho, Minsoo Kim, Hyun-chul Jung, Bong-Nam Noh
Published in 2010 International Conference for Internet Technology and Secured Transactions (01.11.2010)
Get full text
Published in 2010 International Conference for Internet Technology and Secured Transactions (01.11.2010)
Conference Proceeding