Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Filters
Results by year
Table representation of search results timeline featuring number of search results per year.
Year | Number of Results |
---|---|
2021 | 1 |
2024 | 1 |
Search Results
2 results
Results by year
Filters applied: . Clear all
It looks like you are searching for an author.
Results are currently sorted by Best Match. To see the newest results first,
change the sort order to Most Recent.
Page 1
Did you mean
jeong yeo kim
(33 results)?
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
Sensors (Basel). 2021.
PMID: 34770290
Free PMC article.
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.
Bang J, Kim JN, Lee S.
Bang J, et al. Among authors: kim jn.
Sensors (Basel). 2024 Feb 23;24(5):1446. doi: 10.3390/s24051446.
Sensors (Basel). 2024.
PMID: 38474982
Free PMC article.
Item in Clipboard
Cite
Cite