Name
Affiliation
Papers
BOOJOONG KANG
Hanyang University, Seoul, Korea
25
Collaborators
Citations 
PageRank 
36
118
11.55
Referers 
Referees 
References 
377
595
258
Search Limit
100595
Title
Citations
PageRank
Year
Detection Method for Randomly Generated User IDs: Lift the Curse of Dimensionality00.342022
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features.180.672019
Binary executable file similarity calculation using function matching.10.352019
Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection.10.352018
Weighted Harvest-Then-Transmit: UAV-Enabled Wireless Powered Communication Networks.00.342018
A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks.00.342018
Runtime Detection Framework for Android Malware.00.342018
Credible, resilient, and scalable detection of software plagiarism using authority histograms.10.422016
Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection.70.462016
N-opcode analysis for android malware classification and categorization60.432016
PageRank in malware categorization00.342015
Event-Driven Implicit Authentication for Mobile Access Control20.382015
Malware analysis using visualized images and entropy graphs.190.852015
Similarity calculation method for user-define functions to detect malware variants20.402014
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering.20.402014
TASEL: dynamic taint analysis with selective control dependency30.402014
Function matching-based binary-level software similarity calculation50.472013
Rule-based anti-anti-debugging system10.392013
Android malware classification method: Dalvik bytecode frequency analysis120.652013
Software plagiarism detection: a graph-based approach130.762013
Malware classification method via binary content comparison130.692012
Balanced indexing method for efficient intrusion detection systems00.342012
Fast malware family detection method using control flow graphs30.432011
Rule indexing for efficient intrusion detection systems10.382011
Malware classification using instruction frequencies80.642011