Jun Ho Huh
Jun Ho Huh
Samsung Research, Samsung Electronics
Verified email at
Cited by
Cited by
AMI threats, intrusion detection requirements and deployment recommendations
D Grochocki, JH Huh, R Berthier, R Bobba, WH Sanders, AA Cárdenas, ...
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
A framework integrating attribute-based policies into role-based access control
J Huang, DM Nicol, R Bobba, JH Huh
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
Void: A fast and light voice liveness detection system
ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim
29th USENIX Security Symposium, 2020
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
Phishing detection with popular search engines: Simple and effective
JH Huh, H Kim
Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS …, 2012
Hybrid spam filtering for mobile communication
JW Yoon, H Kim, JH Huh
computers & security 29 (4), 446-459, 2010
A framework for evaluating intrusion detection architectures in advanced metering infrastructures
AA Cárdenas, R Berthier, RB Bobba, JH Huh, JG Jetcheva, D Grochocki, ...
IEEE Transactions on Smart Grid 5 (2), 906-915, 2014
Syspal: System-guided pattern locks for android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on security and privacy (SP), 338-356, 2017
Boosting the guessing attack performance on android lock patterns with smudge attacks
S Cha, S Kwag, H Kim, JH Huh
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
Surpass: System-initiated user-replaceable passwords
JH Huh, S Oh, H Kim, K Beznosov, A Mohan, SR Rajagopalan
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
H Kim, JH Huh
Electronics Letters 47 (11), 656-658, 2011
PIN selection policies: Are they really effective?
H Kim, JH Huh
computers & security 31 (4), 484-496, 2012
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
On the Memorability of System-generated PINs: Can Chunking Help?
JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 197--209, 2015
Next-generation access control for distributed control systems
JH Huh, RB Bobba, T Markham, DM Nicol, J Hull, A Chernoguzov, ...
IEEE Internet Computing 20 (5), 28-37, 2016
I'm too busy to reset my LinkedIn password: On the effectiveness of password reset emails
JH Huh, H Kim, SSVP Rayala, RB Bobba, K Beznosov
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
I Don’t Use Apple Pay because it’s less secure...: perception of security and usability in mobile tap-and-pay
JH Huh, S Verma, SSV Rayala, RB Bobba, K Beznosov, H Kim
Workshop on Usable Security, San Diego, CA, 2017
On the security of internet banking in south korea
H Kim, J Huh, R Anderson
A framework for detecting MAC and IP spoofing attacks with network characteristics
J Yu, E Kim, H Kim, J Huh
2016 International conference on software security and assurance (ICSSA), 49-53, 2016
Is implicit authentication on smartphones really popular? On android users’ perception of “smart lock for android”
M Mehrabi Koushki, B Obada-Obieh, JH Huh, K Beznosov
22nd International Conference on Human-Computer Interaction with Mobile …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20