Author of the publication

An Automated ACL Generation System for Secure Internal Network.

, , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2016)978-1-4673-8845-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes., , , , , and . J. Inf. Process., (2019)Detecting Privacy Information Abuse by Android Apps from API Call Logs., , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 143-157. Springer, (2018)Enhancing Detection of Malicious Traffic Through FPGA-Based Frequency Transformation and Machine Learning., , , and . IEEE Access, (2024)Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network., , , and . IEEE Access, (2022)A Dynamic Access Control System based on Situations of Users., and . ICISSP, page 653-660. SCITEPRESS, (2021)Malware Detection Using Gradient Boosting Decision Trees with Customized Log Loss Function., , , and . ICOIN, page 273-278. IEEE, (2021)Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity Recognition., , , and . ICISSP, page 325-332. SCITEPRESS, (2020)Cyber Attack Stage Tracing System based on Attack Scenario Comparison., , , , and . ICISSP, page 587-594. SCITEPRESS, (2022)Malware Detection using Attributed CFG Generated by Pre-trained Language Model with Graph Isomorphism Network., , , and . COMPSAC, page 1495-1501. IEEE, (2022)Identification of Cybersecurity Specific Content Using the Doc2Vec Language Model., , , and . COMPSAC (1), page 396-401. IEEE, (2019)