If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Heejo Lee is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles
Internet Engineering & Materials Science
Wireless sensor networks Engineering & Materials Science
Access control Engineering & Materials Science
Scheduling Engineering & Materials Science
Network protocols Engineering & Materials Science
Authentication Engineering & Materials Science
Routers Engineering & Materials Science
Data storage equipment Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1995 2018

  • 2800 Citations
  • 22 h-Index
  • 85 Conference contribution
  • 56 Article
  • 3 Chapter
2 Citations (Scopus)

Obfuscated VBA macro detection using machine learning

Kim, S., Hong, S., Oh, J. & Lee, H., 2018 Jul 19, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 490-501 12 p. 8416509

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Macros
Learning systems
Classifiers
Computer viruses
Malware
4 Citations (Scopus)

Software systems at risk: An empirical study of cloned vulnerabilities in practice

Kim, S. & Lee, H., 2018 Jan 1, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

vulnerability
Scalability
Cloning
Smartphones
Software engineering
12 Citations (Scopus)

Entropy analysis to classify unknown packing algorithms for malware detection

Bat-Erdene, M., Park, H., Li, H., Lee, H. & Choi, M-S., 2017 Jun 1, In : International Journal of Information Security. 16, 3, p. 227-248 22 p.

Research output: Contribution to journalArticle

Entropy
Supervised learning
Support vector machines
Malware
Data storage equipment
10 Citations (Scopus)

Packer detection for multi-layer executables using entropy analysis

Bat-Erdene, M., Kim, T., Park, H. & Lee, H., 2017 Mar 16, In : Entropy. 19, 3, 125.

Research output: Contribution to journalArticle

entropy
files
proportion
approximation

Visual analysis of corrupted video data in video event data recorders

Pyo, Y., Lee, C. & Lee, H., 2017 Oct 18, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 453-458 6 p. 8073828

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Curve fitting
Law enforcement
Visualization
Recovery