default search action
Eul-Gyu Im
Person information
- affiliation: Hanyang University, Seoul, South Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c53]Andri Rai, Eul Gyu Im:
Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection. UbiSec 2023: 219-235 - 2022
- [j17]Inwoo Ro, Boojoong Kang, Choonghyun Seo, Eul Gyu Im:
Detection Method for Randomly Generated User IDs: Lift the Curse of Dimensionality. IEEE Access 10: 86020-86028 (2022) - 2020
- [j16]ByeongHo Jung, Seong Il Bae, Chang Choi, Eul Gyu Im:
Packer identification method based on byte sequences. Concurr. Comput. Pract. Exp. 32(8) (2020) - [j15]Seong Il Bae, Gyu Bin Lee, Eul Gyu Im:
Ransomware detection using machine learning algorithms. Concurr. Comput. Pract. Exp. 32(18) (2020)
2010 – 2019
- 2019
- [j14]TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. IEEE Trans. Inf. Forensics Secur. 14(3): 773-788 (2019) - [j13]TaeGuen Kim, Yeo Reum Lee, BooJoong Kang, Eul Gyu Im:
Binary executable file similarity calculation using function matching. J. Supercomput. 75(2): 607-622 (2019) - [c52]Seong Il Bae, Soo Han Kim, Eul Gyu Im:
Automatic hybrid analysis technique to improve botnet code coverage using fake server. RACS 2019: 276-282 - [c51]Jong Youn Lee, Jun Young Chang, Eul Gyu Im:
DGA-based malware detection using DNS traffic analysis. RACS 2019: 283-288 - 2018
- [j12]TaeGuen Kim, Boojoong Kang, Eul Gyu Im:
Runtime Detection Framework for Android Malware. Mob. Inf. Syst. 2018: 8094314:1-8094314:15 (2018) - [j11]Inwoo Ro, Joong Soo Han, Eul Gyu Im:
Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model. Secur. Commun. Networks 2018: 9065424:1-9065424:7 (2018) - [c50]Byungho Jung, TaeGuen Kim, Eul Gyu Im:
Malware classification using byte sequence information. RACS 2018: 143-148 - 2017
- [c49]Iltaek Kwon, Eul Gyu Im:
Extracting the Representative API Call Patterns of Malware Families Using Recurrent Neural Network. RACS 2017: 202-207 - 2016
- [j10]In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Minsoo Ryu, Eul Gyu Im:
Malware Analysis and Classification Using Sequence Alignments. Intell. Autom. Soft Comput. 22(3): 371-377 (2016) - [j9]Dong-Kyu Chae, Jiwoon Ha, Sang-Wook Kim, Boojoong Kang, Eul Gyu Im, Sunju Park:
Credible, resilient, and scalable detection of software plagiarism using authority histograms. Knowl. Based Syst. 95: 114-124 (2016) - [c48]Qing Li, Le Wang, TaeGuen Kim, Eul Gyu Im:
Mobile-based continuous user authentication system for cloud security. IC-NIDC 2016: 176-179 - [c47]JunGyu Park, TaeGuen Kim, Eul Gyu Im:
Touch Gesture Data based Authentication Method for Smartphone Users. RACS 2016: 136-141 - [c46]Tae Kyong Lee, TaeGuen Kim, Eul Gyu Im:
User Authentication Method using Shaking Actions in Mobile Devices. RACS 2016: 142-147 - 2015
- [j8]Kyoung-Soo Han, Jae Hyun Lim, Boojoong Kang, Eul Gyu Im:
Malware analysis using visualized images and entropy graphs. Int. J. Inf. Sec. 14(1): 1-14 (2015) - [c45]In Kyeom Cho, Eul Gyu Im:
Extracting representative API patterns of malware families using multiple sequence alignments. RACS 2015: 308-313 - [c44]Junhyoung Kim, TaeGuen Kim, Eul Gyu Im:
Structural information based malicious app similarity calculation and clustering. RACS 2015: 314-318 - [c43]Yu Jin Shim, TaeGuen Kim, Eul Gyu Im:
A Study on Similarity Calculation Method for API Invocation Sequences. RSKT 2015: 492-501 - 2014
- [j7]Boojoong Kang, Kyoung-Soo Han, Byeongho Kang, Eul Gyu Im:
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering. Digit. Investig. 11(4): 323-335 (2014) - [j6]Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
Malware detection: program run length against detection rate. IET Softw. 8(1): 42-51 (2014) - [j5]In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, Eul Gyu Im:
Malware Similarity Analysis using API Sequence Alignments. J. Internet Serv. Inf. Secur. 4(4): 103-114 (2014) - [c42]TaeGuen Kim, Jung Bin Park, In Gyeom Cho, Boojoong Kang, Eul Gyu Im, Sooyong Kang:
Similarity calculation method for user-define functions to detect malware variants. RACS 2014: 236-241 - [c41]Byeongho Kang, TaeGuen Kim, Boojoong Kang, Eul Gyu Im, Minsoo Ryu:
TASEL: dynamic taint analysis with selective control dependency. RACS 2014: 272-277 - [c40]Byeongho Kang, Eul Gyu Im:
Analysis of binary code topology for dynamic analysis. SAC 2014: 1731-1732 - 2013
- [j4]Kyoung-Soo Han, Yeo Reum Lee, Biao Jiang, Eul Gyu Im:
Android Permission System Violation: Case Study and Refinement. Int. J. E Entrepreneurship Innov. 4(1): 16-27 (2013) - [j3]Philip O'Kane, Sakir Sezer, Kieran McLaughlin, Eul Gyu Im:
SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection. IEEE Trans. Inf. Forensics Secur. 8(3): 500-509 (2013) - [c39]Dong-Kyu Chae, Jiwoon Ha, Sang-Wook Kim, Boojoong Kang, Eul Gyu Im:
Software plagiarism detection: a graph-based approach. CIKM 2013: 1577-1580 - [c38]Kyoung-Soo Han, Jae Hyun Lim, Eul Gyu Im:
Malware analysis method using visualization of binary files. RACS 2013: 317-321 - [c37]Yeo Reum Lee, Boojoong Kang, Eul Gyu Im:
Function matching-based binary-level software similarity calculation. RACS 2013: 322-327 - [c36]Byeongho Kang, Boojoong Kang, Jungtae Kim, Eul Gyu Im:
Android malware classification method: Dalvik bytecode frequency analysis. RACS 2013: 349-350 - [c35]Sunwoo Kim, TaeGuen Kim, Eul Gyu Im:
Real-time malware detection framework in intrusion detection systems. RACS 2013: 351-352 - [c34]JaeKeun Lee, Boojoong Kang, Eul Gyu Im:
Rule-based anti-anti-debugging system. RACS 2013: 353-354 - 2012
- [c33]Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im:
Balanced Indexing Method for Efficient Intrusion Detection Systems. ICISC 2012: 37-48 - [c32]Biao Jiang, Eul Gyu Im, Yunmo Koo:
SaaS-Driven Botnets. PAISI 2012: 198-206 - [c31]Boojoong Kang, TaeGuen Kim, Heejun Kwon, Yangseo Choi, Eul Gyu Im:
Malware classification method via binary content comparison. RACS 2012: 316-321 - 2011
- [c30]Kyoung-Soo Han, Eul Gyu Im:
A Survey on P2P Botnet Detection. ICITCS 2011: 589-593 - [c29]Kyoung-Soo Han, Kyoung-Yong Chung, Eul Gyu Im:
A Study on Instruction Substitution Analysis of Metamorphic Malware. ICITCS 2011: 595-599 - [c28]Eul Gyu Im, Kyoung-Soo Han:
An Analysis of Malware Attached in Spam. ICITCS 2011: 601-605 - [c27]Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im:
Detection Methods for Malware Variant Using API Call Related Graphs. ICITCS 2011: 607-611 - [c26]Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im:
Malware Classification Methods Using API Sequence Characteristics. ICITCS 2011: 613-626 - [c25]Boojoong Kang, Hye Seon Kim, TaeGuen Kim, Heejun Kwon, Eul Gyu Im:
Fast malware family detection method using control flow graphs. RACS 2011: 287-292 - [c24]Kyoung-Soo Han, Boojoong Kang, Eul Gyu Im:
Malware classification using instruction frequencies. RACS 2011: 298-300 - [c23]Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im:
Rule Indexing for Efficient Intrusion Detection Systems. WISA 2011: 136-141 - 2010
- [j2]Seonggun Kim, Taein Kim, Eul Gyu Im, Hwansoo Han:
Efficient reuse of local regions in memory-limited mobile devices. IEEE Trans. Consumer Electron. 56(3): 1297-1303 (2010) - [c22]Sung-Hyun Shin, Sang-Chul Lee, Sang-Wook Kim, Junghoon Lee, Eul Gyu Im:
Efficient shortest path finding of k-nearest neighbor objects in road network databases. SAC 2010: 1661-1665
2000 – 2009
- 2008
- [c21]Hyun Jun Jang, Dae Won Hwang, Eul-Gyu Im:
Data Protection in Memory Using Byte Reordering. ISI Workshops 2008: 62-68 - 2007
- [c20]InJung Kim, Cheol Won Lee, Eul-Gyu Im:
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. ICCSA (2) 2007: 75-84 - [c19]Che Ik Cho, Eul-Gyu Im:
Survey on low power routing protocols in MANET from security viewpoints. ICWN 2007: 118-124 - [c18]Hyo Jung Yun, Ki Nam Kim, Eul-Gyu Im, Yong Ho Song:
Effective Elimination of Redundant Packets in Wireless Sensor Networks. MUE 2007: 214-219 - [c17]Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang:
A Hybrid Model for Worm Simulations in a Large Network. PAISI 2007: 301-306 - 2006
- [c16]InJung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won:
Information System Modeling for Analysis of Propagation Effects and Levels of Damage. ICCSA (3) 2006: 54-63 - [c15]Yoon Jung Chung, InJung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won:
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. ICCSA (4) 2006: 777-786 - [c14]Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations. ISI 2006: 572-577 - [c13]Yongsu Park, Yong Ho Song, Eul-Gyu Im:
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. ISI 2006: 731-732 - [c12]Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im:
A New Methodology of Analyzing Security Vulnerability for Network Services. ISI 2006: 737-738 - [c11]Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee:
Cascade Damage Estimation Model for Internet Attacks. WISI 2006: 163-164 - 2005
- [j1]Eul-Gyu Im, Hoh Peter In, Dae-Sik Choi, Yong Ho Song:
Adaptation Policies for Web Server Intrusion-Tolerant System. IEICE Trans. Commun. 88-B(8): 3462-3465 (2005) - [c10]Eul-Gyu Im, Yong Ho Song:
An Adaptive Approach to Handle DoS Attack for Web Services. ISI 2005: 634-635 - [c9]Yong Ho Song, Eul-Gyu Im:
Secure Contents Distribution Using Flash Memory Technology. ISI 2005: 650-651 - 2004
- [c8]Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim:
Adaptive Architecture for Web Server Survivability. ADVIS 2004: 172-180 - [c7]Hoh Peter In, Konstantinos A. Meintanis, Ming Zhang, Eul-Gyu Im:
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme. ADVIS 2004: 533-542 - [c6]Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter In:
A Scalable, Ordered Scenario-Based Network Security Simulator. AsiaSim 2004: 487-494 - [c5]Eung Ki Park, Jung-Taek Seo, Eul-Gyu Im, Cheolwon Lee:
Vulnerability Analysis and Evaluation within an Intranet. ISI 2004: 514-515 - 2003
- [c4]Sung-Wook Ryu, Eul-Gyu Im, B. Clifford Neuman:
Distributed Garbage Collection by Timeouts and Backward Inquiry. COMPSAC 2003: 426-432 - [c3]Eul-Gyu Im, B. Clifford Neuman:
A Flexible Framework for Replication in Distributed Systems. COMPSAC 2003: 486-491 - [c2]Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo:
Safe Patch Distribution Architecture in Intranet Environments. Security and Management 2003: 455-460 - [c1]Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee:
Intrusion-Tolerant System Design for Web Server Survivability. WISA 2003: 124-134
Coauthor Index
aka: BooJoong Kang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 00:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint