Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Rhongho Jang"'
Autor:
Jumabek Alikhanov, Rhongho Jang, Mohammed Abuhamad, David Mohaisen, Daehun Nyang, Youngtae Noh
Publikováno v:
IEEE Access, Vol 10, Pp 5801-5823 (2022)
Machine Learning (ML) based Network Intrusion Systems (NIDSs) operate on flow features which are obtained from flow exporting protocols (i.e., NetFlow). Recent success of ML and Deep Learning (DL) based NIDS solutions assume such flow information (e.
Externí odkaz:
https://doaj.org/article/fc1c19fed78949fcb6af33d98885b242
Publikováno v:
IEEE Transactions on Mobile Computing. 21:3443-3454
In this paper, we provide the design and implementation of UOIT, a text entry method optimized for smartwatches. UOIT uses only one page where a user can see and tap directly for entry without any additional actions, such as zoom-in/zoom-out and swip
Autor:
Rhongho Jang, Afsah Anwar, DaeHun Nyang, David Mohaisen, Ahmed Abusnaina, Hisham Alasmary, Mohammed Abuhamad, Saeed Salem
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3432-3447
Given the limited scalability of dynamic analysis, static analysis, such as the use of Control Flow Graph (CFG)-based features, is widely used by machine learning algorithms for malware analysis and detection. However, recent studies have shown these
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Autor:
Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, DaeHun Nyang, David Mohaisen
Publikováno v:
25th International Symposium on Research in Attacks, Intrusions and Defenses.
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 46:929-936
Publikováno v:
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
Autor:
Abdulrahman Alabduljabbar, Runyu Ma, Soohyeon Choi, Rhongho Jang, Songqing Chen, David Mohaisen
Publikováno v:
Proceedings of the 1st Workshop on Cybersecurity and Social Sciences.
Publikováno v:
IEEE Transactions on Mobile Computing. 19:1056-1071
In this paper, we introduce a powerful hardware-based rogue access point (PrAP), which can relay back and forth traffic between a legitimate AP and a wireless station, and act as a man-in-the-middle attacker. Our PrAP is built of two dedicated wirele
Autor:
Ahmed Abusnaina, Sultan S. Alshamrani, David Mohaisen, Rhongho Jang, DaeHun Nyang, Afsah Anwar, Abdulrahman Alabduljabbar
Publikováno v:
DSN (Supplements)
The rapid growth of the Internet of Things (IoT) devices is paralleled by them being on the front-line of malicious attacks caused by malicious software. Machine learning (ML) algorithms, alongside the traditional signature-based methods, are typical