No photo of BooJoong Kang
  • Room 0G.032 - Titanic Quarter - ECIT

    United Kingdom

20152020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

A Seamless Cloud Migration Approach to Secure Distributed Legacy Industrial SCADA Systems

Khan, R., McLaughlin, K., Kang, B., Laverty, D. & Sezer, S., 18 Feb 2020, (Accepted) IEEE Innovative Smart Grid Technologies (ISGT) North America 2020 17/02/2020 → 20/02/2020 Washington DC, United States. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things

Khan, R., McLaughlin, K., Kang, B., Laverty, D. & Sezer, S., 05 Feb 2020, (Accepted) IEEE 6th World Forum on Internet of Things, New Orleans, United States.. IEEE , 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control

Kang, B., Umsonst, D., Faschang, M., Seitl, C., Friedberg, I., Kupzog, F., Sandberg, H. & McLaughlin, K., 2020, Critical Information Infrastructures Security: 14th International Conference, CRITIS 2019, Linköping, Sweden, September 23–25, 2019, Revised Selected Papers. Springer, Vol. 11777. p. 97-109 13 p. (Lecture Notes in Computer Science ; vol. 11777).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
10 Downloads (Pure)
2019

Enforcing Policy-Based Security Models for Embedded SoCs within the Internet of Things

Hagan, M., Siddiqui, F. M., Sezer, S., Kang, B. & McLaughlin, K., 24 Jan 2019, IEEE International Conference on Secure and Dependable Systems: Proceedings. Kaohsiung, Taiwan: IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
70 Downloads (Pure)
2018

Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection

Hagan, M., Kang, B., McLaughlin, K. & Sezer, S., 01 Nov 2018, 16th Annual Conference on Privacy, Security and Trust: August 28-30, 2018, Belfast, Northern Ireland, United Kingdom. IEEE , 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
141 Downloads (Pure)
2017

Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 19 Oct 2017, International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2017): Proceedings. IEEE , p. 1-7

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
4 Citations (Scopus)
282 Downloads (Pure)

Deep Android Malware Detection

McLaughlin, N., Martinez del Rincon, J., Kang, B., Yerima, S., Miller, P., Sezer, S., Safaeisemnani, Y., Trickel, E., Zhao, Z., Doupé, A. & Joon Ahn, G., 22 Mar 2017, Proceedings of the ACM Conference on Data and Applications Security and Privacy (CODASPY) 2017. Association for Computing Machinery (ACM), 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
84 Citations (Scopus)
6065 Downloads (Pure)
2016

Fuzzy logic-based implicit authentication for mobile access control

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., 01 Sep 2016, SAI Computing Conference (SAI) 2016. IEEE , 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
3 Citations (Scopus)
304 Downloads (Pure)

N-opcode analysis for android malware classification and categorization

Kang, B., Yerima, S. Y., McLaughlin, K. & Sezer, S., 11 Jul 2016, Cyber Security: Proceedings of the 2016 International Conference on Cyber Security and Protection of Digital Services. United Kingdom: Institute of Electrical and Electronics Engineers (IEEE), 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
27 Citations (Scopus)
302 Downloads (Pure)
2015

Event-driven implicit authentication for mobile access control

Yao, F., Yerima, S. Y., Kang, B. & Sezer, S., Sep 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies. Institute of Electrical and Electronics Engineers (IEEE), p. 248-255 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
5 Citations (Scopus)
245 Downloads (Pure)

Investigating Cyber-Physical Attacks against IEC 61850 Photovoltaic Inverter Installations

Kang, B., Maynard, P., McLaughlin, K., Sezer, S., Andrén, F., Seitl, C., Kupzog, F. & Strasser, T., Sep 2015, Proceedings of 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA). Luxembourg: Institute of Electrical and Electronics Engineers (IEEE), p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
22 Citations (Scopus)
1706 Downloads (Pure)

PageRank in Malware Categorization

Kang, B., Yerima, S., McLaughlin, K. & Sezer, S., Oct 2015, RACS: Proceedings of the 2015 Conference on Research in Adaptive and Convergent Systems. Czech Republic: Association for Computing Machinery (ACM), p. 291-295 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2 Citations (Scopus)
220 Downloads (Pure)