Browsing byAuthor양대헌

Jump to:
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 1 to 23 of 23

Issue DateTitleAuthor(s)Type
2021A network-independent tool-based usable authentication system for Internet of Things devices양대헌Article
2022A One-Page Text Entry Method Optimized for Rectangle Smartwatches양대헌Article
2020Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions양대헌Article
2020AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors양대헌Article
2021Contra-∗: Mechanisms for countering spam attacks on blockchain's memory pools양대헌Article
2023Count-Min HyperLogLog강신정Master's Thesis
2022DDoS Detection System in Programmable Switches with Machine Learning Model using Entropy of Traffics김시안Master's Thesis
2022DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification양대헌Article
2021E-PoS: Making Proof-of-Stake Decentralized and Fair양대헌Article
2020Exploring the Attack Surface of Blockchain: A Comprehensive Survey양대헌Article
2021Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube양대헌Conference Paper
2022Investigating the effect of traffic sampling on machine learning-based network intrusion detection approaches양대헌Article
2021Large-scale and Robust Code Authorship Identification with Deep Feature Learning양대헌Article
2020Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation양대헌Article
2021Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems양대헌Conference Paper
2022Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions양대헌Article
2023RRSE-M강주희Master's Thesis
2021Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey양대헌Article
2022ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation양대헌Article
2021SSD-Assisted Ransomware Detection and Data Recovery Techniques양대헌Article
2022Understanding Internet of Things malware by analyzing endpoints in their static artifacts양대헌Article
2020Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet양대헌Article
2022WBC image classification and generative models based on convolutional neural network양대헌Article

BROWSE