Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Filters
Results by year
Table representation of search results timeline featuring number of search results per year.
Year | Number of Results |
---|---|
2019 | 1 |
2020 | 1 |
2022 | 1 |
2023 | 3 |
2024 | 1 |
Search Results
7 results
Results by year
Filters applied: . Clear all
It looks like you are searching for an author.
Results are currently sorted by Best Match. To see the newest results first,
change the sort order to Most Recent.
Page 1
Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.
Sensors (Basel). 2023 May 13;23(10):4728. doi: 10.3390/s23104728.
Sensors (Basel). 2023.
PMID: 37430642
Free PMC article.
Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
Lee K, Lee J, Lee SY, Yim K.
Lee K, et al.
Sensors (Basel). 2023 Mar 10;23(6):3023. doi: 10.3390/s23063023.
Sensors (Basel). 2023.
PMID: 36991730
Free PMC article.
Item in Clipboard
A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.
Lee J, Lee K.
Lee J, et al. Among authors: lee k.
Entropy (Basel). 2022 Feb 4;24(2):239. doi: 10.3390/e24020239.
Entropy (Basel). 2022.
PMID: 35205533
Free PMC article.
Item in Clipboard
Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing.
Lee K, Yim K.
Lee K, et al.
Sensors (Basel). 2023 Mar 27;23(7):3501. doi: 10.3390/s23073501.
Sensors (Basel). 2023.
PMID: 37050562
Free PMC article.
Item in Clipboard
True Random Number Generator (TRNG) Utilizing FM Radio Signals for Mobile and Embedded Devices in Multi-Access Edge Computing.
Lee K, Lee M.
Lee K, et al.
Sensors (Basel). 2019 Sep 24;19(19):4130. doi: 10.3390/s19194130.
Sensors (Basel). 2019.
PMID: 31554242
Free PMC article.
Item in Clipboard
Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability.
Lee J, Jeong W, Lee K.
Lee J, et al. Among authors: lee k.
Sensors (Basel). 2024 Feb 15;24(4):1229. doi: 10.3390/s24041229.
Sensors (Basel). 2024.
PMID: 38400390
Free PMC article.
Item in Clipboard
Improved Practical Vulnerability Analysis of Mouse Data According to Offensive Security based on Machine Learning in Image-Based User Authentication.
Lee K, Lee SY.
Lee K, et al.
Entropy (Basel). 2020 Mar 18;22(3):355. doi: 10.3390/e22030355.
Entropy (Basel). 2020.
PMID: 33286129
Free PMC article.
Item in Clipboard
Cite
Cite