Showing 1 - 3 results of 3 for search 'Jeong Nyeo Kim', query time: 0.02s
Refine Results
-
1
-
2
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations by Jiseok Bang, Jeong Nyeo Kim, Seungkwang Lee
Published 2024-02-01
Article -
3
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization by Su-Wan Park, JaeDeok Lim, Jeong Nyeo Kim
Published 2015-02-01
Article