No photo of BooJoong Kang
  • Room 0G.032 - Titanic Quarter - ECIT

    United Kingdom

20152020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems

Khan, R., McLaughlin, K., Kang, B., Laverty, D. & Sezer, S., 18 Feb 2020, (Accepted) IEEE Innovative Smart Grid Technologies (ISGT) North America 2020 17/02/2020 → 20/02/2020 Washington DC, United States. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things

Khan, R., McLaughlin, K., Kang, B., Laverty, D. & Sezer, S., 05 Feb 2020, (Accepted) IEEE 6th World Forum on Internet of Things, New Orleans, United States.. IEEE , 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control

Kang, B., Umsonst, D., Faschang, M., Seitl, C., Friedberg, I., Kupzog, F., Sandberg, H. & McLaughlin, K., 2020, Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers. Springer, Vol. 11777. p. 97-109 13 p. (Lecture Notes in Computer Science ; vol. 11777).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
9 Downloads (Pure)
2019

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things

Hagan, M., Siddiqui, F. M., Sezer, S., Kang, B. & McLaughlin, K., 24 Jan 2019, IEEE International Conference on Secure and Dependable Systems: Proceedings. Kaohsiung, Taiwan: IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
69 Downloads (Pure)
2018

A Multimodal Deep Learning Method for Android Malware Detection using Various Features

Kim, T., Kang, B., Rho, M., Sezer, S. & Im, E. G., 21 Aug 2018, In : IEEE Transactions on Information Forensics and Security. 14, 3, p. 773-788

Research output: Contribution to journalArticle

Open Access
File
32 Citations (Scopus)
947 Downloads (Pure)

Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection

Hagan, M., Kang, B., McLaughlin, K. & Sezer, S., 01 Nov 2018, 16th Annual Conference on Privacy, Security and Trust: August 28-30, 2018, Belfast, Northern Ireland, United Kingdom. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
141 Downloads (Pure)
2017

Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-7

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
281 Downloads (Pure)

Deep Android Malware Detection

McLaughlin, N., Martinez del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaeisemnani, Y., Trickel, E., Zhao, Z., Doupé, A. & Joon Ahn, G., 22 Mar 2017, Proceedings of the ACM Conference on Data and Applications Security and Privacy (CODASPY) 2017. Association for Computing Machinery (ACM), 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
83 Citations (Scopus)
6060 Downloads (Pure)
2016

Fuzzy logic-based implicit authentication for mobile access control

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 01 Sep 2016, SAI Computing Conference (SAI) 2016. IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
303 Downloads (Pure)

N-gram Opcode Analysis for Android Malware Detection

Kang, B., Yerima, S. Y., Sezer, S. & McLaughlin, K., 30 Nov 2016, In : International Journal on Cyber Situational Awareness. 1, 1, p. 231-254 24 p.

Research output: Contribution to journalArticle

Open Access
File
568 Downloads (Pure)

N-opcode analysis for android malware classification and categorization

Kang, B., Yerima, S. Y., McLaughlin, K. & Sezer, S., 11 Jul 2016, Cyber Security: Proceedings of the 2016 International Conference on Cyber Security and Protection of Digital Services. United Kingdom: Institute of Electrical and Electronics Engineers (IEEE), 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
26 Citations (Scopus)
301 Downloads (Pure)
2015

Event-driven implicit authentication for mobile access control

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., Sep 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies. Institute of Electrical and Electronics Engineers (IEEE), p. 248-255 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
5 Citations (Scopus)
242 Downloads (Pure)

Investigating Cyber-Physical Attacks against IEC 61850 Photovoltaic Inverter Installations

Kang, B., Maynard, P., McLaughlin, K., Sezer, S., Andrén, F., Seitl, C., Kupzog, F. & Strasser, T., Sep 2015, Proceedings of 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA). Luxembourg: Institute of Electrical and Electronics Engineers (IEEE), p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
22 Citations (Scopus)
1703 Downloads (Pure)

PageRank in Malware Categorization

Kang, B., Yerima, S., McLaughlin, K. & Sezer, S., Oct 2015, RACS: Proceedings of the 2015 Conference on Research in Adaptive and Convergent Systems. Czech Republic: Association for Computing Machinery (ACM), p. 291-295 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
220 Downloads (Pure)

Secure Communications in Smart Grid: Networking and Protocols

McLaughlin, K., Friedberg, I., Kang, B., Maynard, P., Sezer, S. & McWilliams, G., Jul 2015, Smart Grid Security: Innovative Solutions for a Modernized Grid. Elsevier, p. 113-148

Research output: Chapter in Book/Report/Conference proceedingChapter