Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Filters
Results by year
Table representation of search results timeline featuring number of search results per year.
Year | Number of Results |
---|---|
2021 | 1 |
2024 | 1 |
Search Results
2 results
Results by year
Filters applied: . Clear all
Page 1
Did you mean
jeong yeo kim
(33 results)?
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.
Sensors (Basel). 2024 Feb 23;24(5):1446. doi: 10.3390/s24051446.
Sensors (Basel). 2024.
PMID: 38474982
Free PMC article.
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
Hwang SY, Kim JN.
Hwang SY, et al. Among authors: kim jn.
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
Sensors (Basel). 2021.
PMID: 34770290
Free PMC article.
Item in Clipboard
Cite
Cite