Detecting and classifying android malware using static analysis along with creator information H Kang, J Jang, A Mohaisen, HK Kim International Journal of Distributed Sensor Networks 11 (6), 479174, 2015 | 182 | 2015 |
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information J Jang, H Kang, J Woo, A Mohaisen, HK Kim computers & security 58, 125-138, 2016 | 66 | 2016 |
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information J Jang, H Kang, J Woo, A Mohaisen, HK Kim Digital Investigation 14, 17-35, 2015 | 59 | 2015 |
Andro-profiler: anti-malware system based on behavior profiling of mobile malware J Jang, J Yun, J Woo, HK Kim Proceedings of the 23rd International Conference on World Wide Web, 737-738, 2014 | 44 | 2014 |
Detecting and classifying method based on similarity matching of Android malware behavior with profile J Jang, J Yun, A Mohaisen, J Woo, HK Kim SpringerPlus 5, 1-23, 2016 | 43 | 2016 |
Mal-netminer: Malware classification approach based on social network analysis of system call graph J Jang, J Woo, A Mohaisen, J Yun, HK Kim Mathematical Problems in Engineering 2015, 2015 | 30 | 2015 |
Mal-netminer: malware classification based on social network analysis of call graph J Jang, J Woo, J Yun, HK Kim Proceedings of the 23rd International Conference on World Wide Web, 731-734, 2014 | 29 | 2014 |
Androtracker: Creator information based android malware classification system HJ Kang, J Jang, A Mohaisen, HK Kim Information Security Applications-15th International Workshop, WISA 8909, 545, 2014 | 18 | 2014 |
Function-oriented mobile malware analysis as first aid J Jang, HK Kim Mobile Information Systems 2016, 2016 | 15 | 2016 |
Traffic-aware decentralized AP selection for multi-rate in WLANs J Jang, Y Lim, C Kim 2010 The 12th International Conference on Advanced Communication Technology …, 2010 | 10 | 2010 |
Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles J Jang, J Yun, A Mohaisen, J Woo, HK Kim arXiv preprint arXiv:1606.01403, 2016 | 1 | 2016 |
정보보증 기반의 함정 전투체계 사이버 보안 발전방안 장재욱, 선희갑, 황재룡 국방과 보안 3 (2), 147-172, 2021 | | 2021 |
Mal-netminer J Jang, J Woo, J Yun, HK Kim Proceedings of the 23rd International Conference on World Wide Web, 2014 | | 2014 |