Entropy analysis to classify unknown packing algorithms for malware detection M Bat-Erdene, H Park, H Li, H Lee, MS Choi International Journal of Information Security 16, 227-248, 2017 | 80 | 2017 |
Generic unpacking using entropy analysis G Jeong, E Choo, J Lee, M Bat-Erdene, H Lee 2010 5th International Conference on Malicious and Unwanted Software, 98-105, 2010 | 80 | 2010 |
Software vulnerability detection using backward trace analysis and symbolic execution H Li, T Kim, M Bat-Erdene, H Lee 2013 International Conference on Availability, Reliability and Security, 446-454, 2013 | 47 | 2013 |
Packer detection for multi-layer executables using entropy analysis M Bat-Erdene, T Kim, H Park, H Lee Entropy 19 (3), 125, 2017 | 35 | 2017 |
Dynamic classification of packing algorithms for inspecting executables using entropy analysis M Bat-Erdene, T Kim, H Li, H Lee 2013 8th International Conference on Malicious and Unwanted Software:" The …, 2013 | 19 | 2013 |
Network Security Management in MUST BE Munkhbayar, E Unurkhaan ICEIC: International Conference on Electronics, Informations and …, 2006 | 6 | 2006 |
Munkhbayar Bat-Erdene, and Heejo Lee.“ G Jeong, E Choo, J Lee Generic unpacking using entropy analysis.” In: MALWARE., 2010 | 3 | 2010 |
Munkhbayar Bat-Erdene H Li, T Kim Heejo Lee,“Software Vulnerability Detection using Backward Trace Analysis …, 0 | 2 | |
Method for classifying packing algorithms using entropy analysis H Lee, M Bat-Erdene, H Jeong, D Ryu US Patent App. 14/224,474, 2014 | 1 | 2014 |
EEG Data Classification Using CNN Method with Various Data Models T Tengis, L Uurtsaikh, BE Munkhbayar, A Batmunkh 2023 International Conference on Electrical, Computer and Energy …, 2023 | | 2023 |
Munkhbayar Bat-Erdene, and Heejo Lee. 2013. Software vulnerability detection using backward trace analysis and symbolic execution H Li, T Kim 2013 International Conference on Availability, Reliability and Security, 446-454, 0 | | |