Comparative Analysis of Low-dimensional Features and Tree-based Ensembles for Malware Detection Systems S Euh, H Lee, D Kim, D Hwang IEEE Access, 2020 | 45 | 2020 |
Assessing HPC failure detectors for MPI jobs K Kharbas, D Kim, T Hoefler, F Mueller 2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012 | 15 | 2012 |
A survey of common security vulnerabilities and corresponding countermeasures for SaaS D Kim, MA Vouk 2014 IEEE Globecom Workshops (GC Wkshps), 59-63, 2014 | 14 | 2014 |
The Reaction of Open-Source Projects to New Language Features: An Empirical Study of C# Generics. D Kim, ER Murphy-Hill, C Parnin, C Bird, R Garcia J. Object Technol. 12 (4), 1:1-31, 2013 | 12 | 2013 |
Securing scientific workflows D Kim, MA Vouk 2015 IEEE International Conference on Software Quality, Reliability and …, 2015 | 8 | 2015 |
E-itrc protocol with long & adjustable range on underwater acoustic sensor network D Kim, YM Cho, C Kim, S Kim, SH Park, TW Kang 21st International Conference on Advanced Information Networking and …, 2007 | 8 | 2007 |
Poster: A pilot study on real-time fingerprinting for Tor onion services D Kim, L Ho, YH Kim, W Kim, D Hwang The Network and Distributed System Security Symposium (NDSS) 2021, 2021 | 5 | 2021 |
Search prevention with captcha against web indexing: A proof of concept D Kim, L Sample 2019 IEEE International conference on computational science and engineering …, 2019 | 5 | 2019 |
About PaaS security D Kim, HE Schaffer, MA Vouk International Journal of Cloud Computing 6 (4), 325-341, 2017 | 5 | 2017 |
Assessing run-time overhead of Securing Kepler D Kim, MA Vouk Procedia Computer Science 80, 2281-2286, 2016 | 5 | 2016 |
The study on dehumidification for greenhouse with lithium-bromide (LiBr) solution SH Euh, JB Lee, JC Woo, SM Kang, DH Kim Journal of Agricultural, Life and Environmental Sciences 24, 24-29, 2012 | 5 | 2012 |
Performance analysis of tor website fingerprinting over time using tree ensemble models H Oh, D Kim, W Kim, D Hwang 2020 International Conference on Computational Science and Computational …, 2020 | 4 | 2020 |
Measuring syntactic sugar usage in programming languages: an empirical study of c# and java projects D Kim, G Yi Advances in Computer Science and its Applications: CSA 2013, 279-284, 2014 | 4 | 2014 |
Histogram Entropy Representation and Prototype based Machine Learning Approach for Malware Family Classification DH Byunghyun Baek, SeoungYul Euh, Dongheon Baek, Donghoon Kim IEEE Access 9, 152098 - 152114, 2021 | 3 | 2021 |
Paas security countermeasures: A survey D Kim, H Schaffer, M Vouk Proc. ICACON, 2015 | 3 | 2015 |
Robust IoT Malware Detection and Classification Using Opcode Category Features on Machine Learning H Lee, S Kim, D Baek, D Kim, D Hwang IEEE Access 11, 18855-18867, 2023 | 2 | 2023 |
Analyzing the adoption rate of local variable type inference in open-source java 10 projects C Liddell, D Kim Journal of the Arkansas Academy of Science 73 (1), 51-54, 2019 | 2 | 2019 |
Securing Software Application Chains in a Cloud D Kim, MA Vouk 2015 2nd International Conference on Information Science and Security (ICISS …, 2015 | 2 | 2015 |
Evolved IoT malware detection using opcode category sequence through machine learning S Moon, Y Kim, H Lee, D Kim, D Hwang 2022 International Conference on Computer Communications and Networks (ICCCN …, 2022 | 1 | 2022 |
Improved Multiplication Algorithm by Clearing Leading Zeros of Binary Numbers based on Big Data Analysis D Kim, J Jung 2018 19th IEEE/ACIS International Conference on Software Engineering …, 2018 | 1 | 2018 |