Ajou University repository

1. Journal Papers92

or browse

Subscribe to this collection to receive daily e-mail notification of new additions

Automatic malware mutant detection and group classification based on the n-gram and clustering coefficientoa mark
  • Lee, Taejin;
  • Choi, Bomin;
  • Shin, Youngsang;
  • Kwak, Jin
  • 2018-08-01
  • Journal of Supercomputing, Vol.74, pp.3489-3503
  • Springer New York LLC
Cost-effective monitoring algorithm for cyber-physical system platform using combined spatio-temporal model
  • 2018-08-01
  • Journal of Supercomputing, Vol.74, pp.3537-3548
  • Springer New York LLC
Digital forensic science approach by file recovery research
  • 2018-08-01
  • Journal of Supercomputing, Vol.74, pp.3704-3725
  • Springer New York LLC
EMICS: E-mail based malware infected IP collection systemoa mark
  • 2018-06-29
  • KSII Transactions on Internet and Information Systems, Vol.12, pp.2881-2894
  • Korean Society for Internet Information
Game theory-based Security Vulnerability Quantification for Social Internet of Things
  • 2018-05-01
  • Future Generation Computer Systems, Vol.82, pp.752-760
  • Elsevier B.V.
Escalator: An autonomous scheduling scheme for convergecast in TSCHoa mark
  • 2018-04-16
  • Sensors (Switzerland), Vol.18
  • MDPI AG
Cost-effective and accurate method of measuring fetal fraction using SNP imputationoa mark
  • 2018-04-01
  • Bioinformatics, Vol.34, pp.1086-1091
  • Oxford University Press
A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networksoa mark
  • 2018-04-01
  • International Journal of Distributed Sensor Networks, Vol.14
  • SAGE Publications Ltd
Cyber security of critical infrastructuresoa mark
  • Maglaras, Leandros A.;
  • Kim, Ki Hyung;
  • Janicke, Helge;
  • Ferrag, Mohamed Amine;
  • Rallis, Stylianos;
  • Fragkou, Pavlina;
  • Maglaras, Athanasios;
  • Cruz, Tiago J.
  • 2018-03-01
  • ICT Express, Vol.4, pp.42-45
  • Korean Institute of Communication Sciences
System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats
  • 2018-02-28
  • KSII Transactions on Internet and Information Systems, Vol.12, pp.906-918
  • Korean Society for Internet Information
CEnsLoc: Infrastructure-Less Indoor Localization Methodology Using GMM Clustering-Based Classification Ensemblesoa mark
  • 2018-01-01
  • Mobile Information Systems, Vol.2018
  • Hindawi Limited
A real-time fall detection system based on the acceleration sensor of smartphoneoa mark
  • 2018-01-01
  • International Journal of Engineering Business Management, Vol.10
  • SAGE Publications Inc.
1 2 3 4 5