Hypervisor-based intrusion prevention platform and virtual network intrusion prevention system YS Shin, IIA Cheong, SG Lee, MY Yoon, TW Hwang, SON Kyung-Ho US Patent App. 13/871,264, 2014 | 200 | 2014 |
Analysis of IPSec overheads for VPN servers C Shue, Y Shin, M Gupta, JY Choi 1st IEEE ICNP Workshop on Secure Network Protocols, 2005.(NPSec)., 25-30, 2005 | 50 | 2005 |
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient T Lee, B Choi, Y Shin, J Kwak The Journal of Supercomputing 74, 3489-3503, 2018 | 46 | 2018 |
Prevalence and mitigation of forum spamming Y Shin, M Gupta, S Myers 2011 Proceedings IEEE INFOCOM, 2309-2317, 2011 | 41 | 2011 |
System and method for analyzing mobile cyber incident BI Kim, TJ Lee, Y Shin, HK Kang, SG Lee, HS Cho US Patent 9,614,863, 2017 | 40 | 2017 |
The nuts and bolts of a forum spam automator Y Shin, M Gupta, S Myers 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011 | 38 | 2011 |
Method of detecting anomalies suspected of attack, based on time series statistics YI Han, DH Yoo, HS Cho, BM Choi, NH Kim, TW Hwang, HK Kang, ... US Patent App. 14/639,357, 2016 | 28 | 2016 |
A Study of the Performance of SSL on PDAs Y Shin, M Gupta, S Myers IEEE INFOCOM Workshops 2009, 1-6, 2009 | 25 | 2009 |
System and method for controlling virtual network including security function Y Shin, S Lee, T Hwang, H Park US Patent 9,166,988, 2015 | 23 | 2015 |
Update Propagation of Replicated Data in Distributed Spatial Databases JO Choi, YS Shin, BH Hong Database and Expert Systems Applications: 10th International Conference …, 1999 | 23 | 1999 |
A survey of fraud detection research based on transaction analysis and data mining technique SH Jeong, H Kim, Y Shin, T Lee, HK Kim Journal of The Korea Institute of Information Security & Cryptology 25 (6 …, 2015 | 17 | 2015 |
Design of a hypervisor-based rootkit detection method for virtualized systems in cloud computing environments T Hwang, Y Shin, K Son, H Park AASRI Winter International Conference on Engineering and Technology (AASRI …, 2013 | 16 | 2013 |
A case study on asprox infection dynamics Y Shin, S Myers, M Gupta Detection of Intrusions and Malware, and Vulnerability Assessment: 6th …, 2009 | 13 | 2009 |
System and method for analyzing large-scale malicious code BM Choi, HK Kang, BI Kim, TW Hwang, TJ Lee, YS Shin US Patent App. 14/606,294, 2016 | 10 | 2016 |
A study on behavior-based mobile malware analysis system against evasion techniques M Kim, TJ Lee, Y Shin, HY Youm 2016 international conference on information networking (ICOIN), 455-457, 2016 | 10 | 2016 |
System and method for detecting malicious code based on application programming interface BM Choi, HK Kang, BI Kim, TW Hwang, TJ Lee, YS Shin US Patent App. 14/606,278, 2016 | 8 | 2016 |
A link graph‐based approach to identify forum spam Y Shin, S Myers, M Gupta, P Radivojac Security and Communication Networks 8 (2), 176-188, 2015 | 6 | 2015 |
The study of prediction of same attack group by comparing similarity of domain H Cho, S Lee, B Kim, Y Shin, T Lee 2015 International Conference on Information and Communication Technology …, 2015 | 5 | 2015 |
Design of a Versatile Hypervisor-based Platform for Virtual Network-Host Intrusion Prevention Y Shin, M Yoon, K Son Proceedings of International Conference on Information Processing and …, 2013 | 5 | 2013 |
Virtual machine introspection based rootkit detection in virtualized environments T Hwang, Y Shin, K Son, H Park Life Science Journal 11 (7), 803-808, 2014 | 4 | 2014 |