Personal profile

Education / Academic qualification

PHD, George Mason University

… → 2000

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 7 Similar Profiles
Access control Engineering & Materials Science
Industry Engineering & Materials Science
Specifications Engineering & Materials Science
Cloud computing Engineering & Materials Science
Internet Engineering & Materials Science
Experiments Engineering & Materials Science
Communication Engineering & Materials Science
Health Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1999 2017

  • 3996 Citations
  • 29 h-Index
  • 123 Conference contribution
  • 65 Article
  • 4 Chapter
  • 2 Editorial

Deep android malware detection

McLaughlin, N., Del Rincon, J. M., Kang, B. J., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doupe, A. & Ahn, G. J. Mar 22 2017 CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 301-308 8 p.

Research output: ResearchConference contribution

Malware
Static analysis
Pipelines
Neural networks
Graphics processing unit

Foreword

Ghinita, G., Pretschner, A. & Ahn, G. J. Mar 22 2017 In : CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. p. iii-iv

Research output: Research - peer-reviewEditorial

Poster: On the safety and efficiency of virtual firewall elasticity control

Li, H., Deng, J., Hu, H., Wang, K. C., Ahn, G. J., Zhao, Z. & Han, W. Jun 7 2017 SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. Part F128644, p. 129-131 3 p.

Research output: ResearchConference contribution

Elasticity
Controllers
Network function virtualization
Access control
Costs

Risk assessment of mobile applications based on machine learned malware dataset

Kim, H., Cho, T., Ahn, G. J. & Hyun Yi, J. May 5 2017 (Accepted/In press) In : Multimedia Tools and Applications. p. 1-16 16 p.

Research output: Research - peer-reviewArticle

Risk assessment
Malware
Identification (control systems)
Mobile devices
Internet of things

Projects 2008 2020