Search Results - "Kim, Eui Tak"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Sumav: Fully automated malware labeling by Kim, Sangwon, Jung, Wookhyun, Lee, KyungMin, Oh, HyungGeun, Kim, Eui Tak

    Published in ICT express (01-12-2022)
    “…Multiple AV engines are used to ensure more effective system protection against malicious files. These AV engines are capable of distinguishing between benign…”
    Get full text
    Journal Article
  2. 2

    Android malware dataset construction methodology to minimize bias–variance​ tradeoff by Lee, Shinho, Jung, Wookhyun, Lee, Wonrak, Oh, Hyung Geun, Kim, Eui Tak

    Published in ICT express (01-09-2022)
    “…Recently, research on Android malware categorization and detection is increasingly directed toward proposing different learned models based on various features…”
    Get full text
    Journal Article
  3. 3

    Malware Response Naming Scheme for Security Control Service by Lee, Shinho, Jung, Wookhyun, Lee, Seohyun, Tak Kim, Eui

    “…The Computer Anti-virus Research Organization (CARO) malware naming scheme was created more than 30 years ago. During the 30 years, the malware naming scheme…”
    Get full text
    Conference Proceeding
  4. 4

    Sumav: A Scheme for Selecting a Keyword from Detection Names using Conditional Probability by Kim, Sangwon, Kim, Bora, Kim, Suyoung, Jung, Wookhyun, Lee, Buyngmoo, Tak Kim, Eui

    “…With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the…”
    Get full text
    Conference Proceeding
  5. 5

    Android Malware Similarity Clustering using Method based Opcode Sequence and Jaccard Index by Lee, Shinho, Jung, Wookhyun, Kim, Sangwon, Kim, Eui Tak

    “…Recently, Android malicious code shows a trend to spread a large number of variants in a short time. This type of malicious code is mainly produced by reusing…”
    Get full text
    Conference Proceeding
  6. 6

    Evaluation of Image Similarity Algorithms for Malware Fake-Icon Detection by Kim, Jun-Seob, Jung, Wookhyun, Kim, Sangwon, Lee, Shinho, Kim, Eui Tak

    “…Malware Creators have steadily used Social engineering attacks that induce people to execute malware by stealing icons of well-known programs or disguise…”
    Get full text
    Conference Proceeding
  7. 7

    Design of Integrated Messenger Anti-virus System using Chatbot Service by Lee, Shinho, Lee, Jungwoon, Lee, Wonrak, Lee, Seohyun, Kim, Suyoung, Kim, Eui Tak

    “…Today, people use various types of messengers having each own function regardless of PC or Mobile, and the number of messenger users is more and more…”
    Get full text
    Conference Proceeding