default search action
TaeGuen Kim 0002
Person information
- affiliation: SoonChunHyang University, Asan, South Korea
- affiliation (PhD 2018): Hanyang University, Department of Electronics and Computer Engineering, Seoul, South Korea
Other persons with the same name
- TaeGuen Kim 0001 — Korea University, Department of Computer Science, Seoul, South Korea
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Hoonyong Park, TaeGuen Kim, Daniel Gerbi Duguma, Jiyoon Kim, Ilsun You, Willy Susilo:
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. Comput. Syst. Sci. Eng. 45(2): 1145-1165 (2023) - [j8]Hoonyong Park, Philip Virgil Astillo, Yongho Ko, Yeongshin Park, TaeGuen Kim, Ilsun You:
SMDFbs: Specification-Based Misbehavior Detection for False Base Stations. Sensors 23(23): 9504 (2023) - 2022
- [j7]Ye Neung Kim, Seok Min Ko, TaeGuen Kim:
Hidden Markov Model based Anomaly Detection Method for In-vehicle Network. J. Internet Serv. Inf. Secur. 12(2): 115-125 (2022) - [j6]Hyun Park, TaeGuen Kim:
User Authentication Method via Speaker Recognition and Speech Synthesis Detection. Secur. Commun. Networks 2022: 5755785:1-5755785:10 (2022)
2010 – 2019
- 2019
- [j5]TaeGuen Kim, BooJoong Kang, Mina Rho, Sakir Sezer, Eul Gyu Im:
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features. IEEE Trans. Inf. Forensics Secur. 14(3): 773-788 (2019) - [j4]TaeGuen Kim, Yeo Reum Lee, BooJoong Kang, Eul Gyu Im:
Binary executable file similarity calculation using function matching. J. Supercomput. 75(2): 607-622 (2019) - 2018
- [j3]TaeGuen Kim, Boojoong Kang, Eul Gyu Im:
Runtime Detection Framework for Android Malware. Mob. Inf. Syst. 2018: 8094314:1-8094314:15 (2018) - [c11]Byungho Jung, TaeGuen Kim, Eul Gyu Im:
Malware classification using byte sequence information. RACS 2018: 143-148 - 2016
- [j2]In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Minsoo Ryu, Eul Gyu Im:
Malware Analysis and Classification Using Sequence Alignments. Intell. Autom. Soft Comput. 22(3): 371-377 (2016) - [c10]Qing Li, Le Wang, TaeGuen Kim, Eul Gyu Im:
Mobile-based continuous user authentication system for cloud security. IC-NIDC 2016: 176-179 - [c9]JunGyu Park, TaeGuen Kim, Eul Gyu Im:
Touch Gesture Data based Authentication Method for Smartphone Users. RACS 2016: 136-141 - [c8]Tae Kyong Lee, TaeGuen Kim, Eul Gyu Im:
User Authentication Method using Shaking Actions in Mobile Devices. RACS 2016: 142-147 - 2015
- [c7]Junhyoung Kim, TaeGuen Kim, Eul Gyu Im:
Structural information based malicious app similarity calculation and clustering. RACS 2015: 314-318 - [c6]Yu Jin Shim, TaeGuen Kim, Eul Gyu Im:
A Study on Similarity Calculation Method for API Invocation Sequences. RSKT 2015: 492-501 - 2014
- [j1]In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, Eul Gyu Im:
Malware Similarity Analysis using API Sequence Alignments. J. Internet Serv. Inf. Secur. 4(4): 103-114 (2014) - [c5]TaeGuen Kim, Jung Bin Park, In Gyeom Cho, Boojoong Kang, Eul Gyu Im, Sooyong Kang:
Similarity calculation method for user-define functions to detect malware variants. RACS 2014: 236-241 - [c4]Byeongho Kang, TaeGuen Kim, Boojoong Kang, Eul Gyu Im, Minsoo Ryu:
TASEL: dynamic taint analysis with selective control dependency. RACS 2014: 272-277 - 2013
- [c3]Sunwoo Kim, TaeGuen Kim, Eul Gyu Im:
Real-time malware detection framework in intrusion detection systems. RACS 2013: 351-352 - 2012
- [c2]Boojoong Kang, TaeGuen Kim, Heejun Kwon, Yangseo Choi, Eul Gyu Im:
Malware classification method via binary content comparison. RACS 2012: 316-321 - 2011
- [c1]Boojoong Kang, Hye Seon Kim, TaeGuen Kim, Heejun Kwon, Eul Gyu Im:
Fast malware family detection method using control flow graphs. RACS 2011: 287-292
Coauthor Index
aka: Eul Gyu Im
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-12 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint