Follow
Youngsang Shin
Title
Cited by
Cited by
Year
Hypervisor-based intrusion prevention platform and virtual network intrusion prevention system
YS Shin, IIA Cheong, SG Lee, MY Yoon, TW Hwang, SON Kyung-Ho
US Patent App. 13/871,264, 2014
2002014
Analysis of IPSec overheads for VPN servers
C Shue, Y Shin, M Gupta, JY Choi
1st IEEE ICNP Workshop on Secure Network Protocols, 2005.(NPSec)., 25-30, 2005
502005
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient
T Lee, B Choi, Y Shin, J Kwak
The Journal of Supercomputing 74, 3489-3503, 2018
462018
Prevalence and mitigation of forum spamming
Y Shin, M Gupta, S Myers
2011 Proceedings IEEE INFOCOM, 2309-2317, 2011
412011
System and method for analyzing mobile cyber incident
BI Kim, TJ Lee, Y Shin, HK Kang, SG Lee, HS Cho
US Patent 9,614,863, 2017
392017
The nuts and bolts of a forum spam automator
Y Shin, M Gupta, S Myers
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
382011
Method of detecting anomalies suspected of attack, based on time series statistics
YI Han, DH Yoo, HS Cho, BM Choi, NH Kim, TW Hwang, HK Kang, ...
US Patent App. 14/639,357, 2016
282016
A Study of the Performance of SSL on PDAs
Y Shin, M Gupta, S Myers
IEEE INFOCOM Workshops 2009, 1-6, 2009
252009
System and method for controlling virtual network including security function
Y Shin, S Lee, T Hwang, H Park
US Patent 9,166,988, 2015
232015
Update Propagation of Replicated Data in Distributed Spatial Databases
JO Choi, YS Shin, BH Hong
Database and Expert Systems Applications: 10th International Conference …, 1999
231999
A survey of fraud detection research based on transaction analysis and data mining technique
SH Jeong, H Kim, Y Shin, T Lee, HK Kim
Journal of The Korea Institute of Information Security & Cryptology 25 (6 …, 2015
172015
Design of a hypervisor-based rootkit detection method for virtualized systems in cloud computing environments
T Hwang, Y Shin, K Son, H Park
AASRI Winter International Conference on Engineering and Technology (AASRI …, 2013
162013
A case study on asprox infection dynamics
Y Shin, S Myers, M Gupta
Detection of Intrusions and Malware, and Vulnerability Assessment: 6th …, 2009
132009
System and method for analyzing large-scale malicious code
BM Choi, HK Kang, BI Kim, TW Hwang, TJ Lee, YS Shin
US Patent App. 14/606,294, 2016
102016
A study on behavior-based mobile malware analysis system against evasion techniques
M Kim, TJ Lee, Y Shin, HY Youm
2016 international conference on information networking (ICOIN), 455-457, 2016
102016
System and method for detecting malicious code based on application programming interface
BM Choi, HK Kang, BI Kim, TW Hwang, TJ Lee, YS Shin
US Patent App. 14/606,278, 2016
82016
A link graph‐based approach to identify forum spam
Y Shin, S Myers, M Gupta, P Radivojac
Security and Communication Networks 8 (2), 176-188, 2015
62015
The study of prediction of same attack group by comparing similarity of domain
H Cho, S Lee, B Kim, Y Shin, T Lee
2015 International Conference on Information and Communication Technology …, 2015
52015
Design of a Versatile Hypervisor-based Platform for Virtual Network-Host Intrusion Prevention
Y Shin, M Yoon, K Son
Proceedings of International Conference on Information Processing and …, 2013
52013
Virtual machine introspection based rootkit detection in virtualized environments
T Hwang, Y Shin, K Son, H Park
Life Science Journal 11 (7), 803-808, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20