Showing 1 - 4 results of 4 for search 'Jeong-Nyeo Kim', query time: 0.02s
Refine Results
-
1
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools by Song-Yi Hwang, Jeong-Nyeo Kim
Published 2021-10-01
Article -
2
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations by Jiseok Bang, Jeong Nyeo Kim, Seungkwang Lee
Published 2024-02-01
Article -
3
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization by Su-Wan Park, JaeDeok Lim, Jeong Nyeo Kim
Published 2015-02-01
Article -
4