No photo of BooJoong Kang
  • Room 0G.032 - Titanic Quarter - ECIT

    United Kingdom

20152019
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where BooJoong Kang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 25 Similar Profiles
Intrusion detection Engineering & Materials Science
Communication Engineering & Materials Science
Authentication Engineering & Materials Science
Access control Engineering & Materials Science
Mobile devices Engineering & Materials Science
Controllers Engineering & Materials Science
Fuzzy inference Engineering & Materials Science
Electric potential Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2015 2019

35 Downloads (Pure)

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things

Hagan, M., Siddiqui, F. M., Sezer, S., Kang, B. & McLaughlin, K., 24 Jan 2019, IEEE International Conference on Secure and Dependable Systems: Proceedings. Kaohsiung, Taiwan: IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Ecosystems
Firmware
Programmable logic controllers
Internet of things
Life cycle

Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control

Kang, B., Umsonst, D., Faschang, M., Seitl, C., Friedberg, I., Kupzog, F., Sandberg, H. & McLaughlin, K., Jul 2019, (Accepted).

Research output: Contribution to conferencePaper

Intrusion detection
Voltage control
Controllers
Communication
Electric potential
19 Citations (Scopus)
786 Downloads (Pure)

A Multimodal Deep Learning Method for Android Malware Detection using Various Features

Kim, T., Kang, B., Rho, M., Sezer, S. & Im, E. G., 21 Aug 2018, In : IEEE Transactions on Information Forensics and Security. 14, 3, p. 773-788

Research output: Contribution to journalArticle

Open Access
File
Smartphones
Malware
Deep learning
Feature extraction
Experiments
1 Citation (Scopus)
99 Downloads (Pure)

Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection

Hagan, M., Kang, B., McLaughlin, K. & Sezer, S., 01 Nov 2018, 16th Annual Conference on Privacy, Security and Trust: August 28-30, 2018, Belfast, Northern Ireland, United Kingdom. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Intrusion detection
Computer system firewalls
Communication
Metadata
Expert systems
2 Citations (Scopus)
226 Downloads (Pure)

Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-7

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Fuzzy inference
Mobile devices
Authentication
Tuning
Experiments