Seong-je Cho
Seong-je Cho
Professor of Computer Science & Engineering, Dankook University의 이메일 확인됨 - 홈페이지
Efficient Real-Time Scheduling Algorithms for Multiprocessor Systems
CHO Seongje, LEE Suk-Kyoon, AHN Sang, LIN Kwei-Jay
IEICE Transactions on Communications 85 (12), 2859-2867, 2002
Adapting social spam infrastructure for political censorship
K Thomas, C Grier, V Paxson
5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 12), 2012
Comparison of deadline-based scheduling algorithms for periodic real-time tasks on multiprocessor
PARK Minkyu, HAN Sangchul, KIM Heeheon, CHO Seongje, ...
IEICE transactions on information and systems 88 (3), 658-661, 2005
Predictability of earliest deadline zero laxity algorithm for multiprocessor real-time systems
X Piao, S Han, H Kim, M Park, Y Cho, S Cho
Ninth IEEE International Symposium on Object and Component-Oriented Real …, 2006
Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering
MJ Kim, JY Lee, HY Chang, SJ Cho, Y Park, M Park, PA Wilsey
2010 13th IEEE International Symposium on Object/Component/Service-Oriented …, 2010
Rgbdroid: a novel response-based approach to android privilege escalation attacks
Y Park, CH Lee, C Lee, JH Lim, S Han, M Park, SJ Cho
5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 12), 2012
A kernel-based monitoring approach for analyzing malicious behavior on Android
Y Jeong, H Lee, S Cho, S Han, M Park
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1737-1738, 2014
Security threat on wearable services: Empirical study using a commercial smartband
M Lee, K Lee, J Shim, S Cho, J Choi
2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-5, 2016
A static birthmark for MS windows applications using import address table
JC Choi, YM Han, S Cho, HY Yoo, J Woo, M Park, Y Song, L Chung
2013 Seventh International Conference on Innovative Mobile and Internet …, 2013
Efficient identification of bad signatures in RSA-type batch signature
LEE Seungwon, CHO Seongje, CHO Yookun
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2006
Android malware detection based on useful API calls and machine learning
J Jung, H Kim, D Shin, M Lee, H Lee, S Cho, K Suh
2018 IEEE First International Conference on Artificial Intelligence and …, 2018
Protecting data on android platform against privilege escalation attack
HT Lee, D Kim, M Park, S Cho
International Journal of Computer Mathematics 93 (2), 401-414, 2016
An anti-piracy mechanism based on class separation and dynamic loading for android applications
YS Jeong, YU Park, JC Moon, SJ Cho, D Kim, M Park
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 328-332, 2012
Classifying Malicious Web Pages by Using an Adaptive Support Vector Machine.
YS Hwang, JB Kwon, JC Moon, SJ Cho
JIPS 9 (3), 395-404, 2013
Page fault behavior and two prepaging schemes
S Cho, Y Cho
Conference Proceedings of the 1996 IEEE Fifteenth Annual International …, 1996
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks.
Y Park, C Lee, J Kim, SJ Cho, J Choi
J. Internet Serv. Inf. Secur. 2 (3/4), 29-42, 2012
Analytical prediction of buffer hit ratios
J Choi, S Cho, SH Noh, S Lyul, Y Cho
Electronics Letters 36 (1), 10-11, 2000
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
K Lim, Y Jeong, S Cho, M Park, S Han
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7 (3), 40-52, 2016
Measuring similarity of android applications via reversing and K-gram birthmarking
J Ko, H Shim, D Kim, YS Jeong, S Cho, M Park, S Han, SB Kim
Proceedings of the 2013 Research in Adaptive and Convergent Systems, 336-341, 2013
Effects of Code Obfuscation on Android App Similarity Analysis.
J Park, H Kim, Y Jeong, S Cho, S Han, M Park
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (4), 86-98, 2015
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20