Ji Young Woo
Ji Young Woo
Verified email at sch.ac.kr
Cited by
Cited by
Online game bot detection based on party-play log analysis
AR Kang, J Woo, J Park, HK Kim
Computers & Mathematics with Applications 65 (9), 1384-1395, 2013
Service improvement by business process management using customer complaints in financial service industry
CU Pyon, JY Woo, SC Park
Expert Systems with Applications 38 (4), 3267-3279, 2011
Visualization method for customer targeting using customer map
JY Woo, SM Bae, SC Park
Expert Systems with Applications 28 (4), 763-772, 2005
Know your master: Driver profiling-based anti-theft method
BI Kwak, JY Woo, HK Kim
2016 14th Annual Conference on Privacy, Security and Trust (PST), 211-218, 2016
Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog
J Woo, H Chen
SpringerPlus 5 (1), 1-19, 2016
You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild.
E Lee, J Woo, H Kim, A Mohaisen, HK Kim
Ndss, 2016
Survey and research direction on online game security
J Woo, HK Kim
Proceedings of the Workshop at SIGGRAPH Asia, 19-25, 2012
Chatting pattern based game BOT detection: do they talk like us?
AR Kang, HK Kim, J Woo
KSII Transactions on Internet and Information Systems (TIIS) 6 (11), 2866-2879, 2012
Andro-dumpsys: anti-malware system based on the similarity of malware creator and malware centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
computers & security 58, 125-138, 2016
An SIR model for violent topic diffusion in social media
J Woo, J Son, H Chen
Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011
Crime scene reconstruction: Online gold farming network analysis
H Kwon, A Mohaisen, J Woo, Y Kim, E Lee, HK Kim
IEEE Transactions on Information Forensics and Security 12 (3), 544-556, 2016
Andro-AutoPsy: anti-malware system based on similarity matching of malware and malware creator-centric information
J Jang, H Kang, J Woo, A Mohaisen, HK Kim
Digital Investigation 14, 17-35, 2015
Andro-profiler: anti-malware system based on behavior profiling of mobile malware
J Jang, J Yun, J Woo, HK Kim
Proceedings of the 23rd International Conference on World Wide Web, 737-738, 2014
In-vehicle network intrusion detection using deep convolutional neural network
HM Song, J Woo, HK Kim
Vehicular Communications 21, 100198, 2020
Detecting and classifying method based on similarity matching of Android malware behavior with profile
J Jang, J Yun, A Mohaisen, J Woo, HK Kim
SpringerPlus 5 (1), 1-23, 2016
An automatic and proactive identity theft detection model in MMORPGs
J Woo, HJ Choi, HK Kim
Applied Mathematics & Information Sciences 6 (3), 291, 2012
Mal-netminer: Malware classification approach based on social network analysis of system call graph
J Jang, J Woo, A Mohaisen, J Yun, HK Kim
Mathematical Problems in Engineering 2015, 2015
Modeling the dynamics of medical information through web forums in medical industry
J Woo, MJ Lee, Y Ku, H Chen
Technological Forecasting and Social Change 97, 77-90, 2015
Intelligent service quality management system based on analysis and forecast of VOC
CU Pyon, JY Woo, SC Park
Expert Systems with Applications 37 (2), 1056-1064, 2010
The contagion of malicious behaviors in online games
J Woo, AR Kang, HK Kim
ACM SIGCOMM Computer Communication Review 43 (4), 543-544, 2013
The system can't perform the operation now. Try again later.
Articles 1–20