Jinchun Choi
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
422019
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
242019
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
International Conference on Computational Social Networks, 259-272, 2018
202018
Relaying rogue AP detection scheme using SVM
SB Kang, DH Nyang, JC Choi, SJ Lee
Journal of the Korea Institute of Information Security & Cryptology 23 (3 ¡¦, 2013
82013
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th ¡¦, 2016
72016
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03955, 2019
42019
Transparency in the new gTLD era: Evaluating the DNS centralized zone data service
J Park, J Choi, D Nyang, A Mohaisen
IEEE Transactions on Network and Service Management 16 (4), 1782-1796, 2019
32019
Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing, 2019
22019
Iot malware ecosystem in the wild: a glimpse into analysis and exposures
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 413-418, 2019
22019
A method for generating robust key from face image and user intervention
H Kim, JC Choi, C Jung, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 27 (5 ¡¦, 2017
22017
Operating ¥ìTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN
JC Choi, J Kang, DH Nyang, KH Lee
The Journal of Korean Institute of Communications and Information Sciences ¡¦, 2014
22014
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
2020
Endpoints and Interdependencies in Internet of Things Residual Artifacts: Measurements, Analyses, and Insights into Defenses
J Choi
2020
Analyzing endpoints in the internet of things malware: poster
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 12th Conference on Security and Privacy in Wireless and ¡¦, 2019
2019
Analyzing Endpoints in the Internet of Things Malware
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03531, 2019
2019
¾ó±¼°ú »ç¿ëÀÚ ÀÔ·ÂÁ¤º¸¸¦ ÀÌ¿ëÇÏ¿© ¾ÈÀüÇÑ Å°¸¦ »ý¼ºÇÏ´Â ¹æ¹ý
±èÇýÁø£¬ ÃÖÁøÃᣬ Á¤Ã¢ÈÆ£¬ ¾ç´ëÇ壬 À̰æÈñ
Á¤º¸º¸È£ÇÐȸ³í¹®Áö 27 (5), 1059-1068, 2017
2017
BLE ¸¦ ÀÌ¿ëÇÑ °áÁ¦ ÇÁ·Î¼¼½º¿¡¼­ Relay Attack °ú ´ëÀÀ¹æ¾È
ÃÖÁøÃᣬ ¼­½Âȯ£¬ ¾ç´ëÇ壬 À̰æÈñ
Çѱ¹Â÷¼¼´ëÄÄÇ»ÆÃÇÐȸ ³í¹®Áö 11 (4), 25-35, 2015
2015
½º¸¶Æ®¿öÄ¡¸¦ ÀÌ¿ëÇÑ ½º¸¶Æ®Æù¿¡¼­ÀÇ ¾ÈÀüÇÑ ÀüÀÚ°Å·¡¹æ¹ý
ÁÖ±º£¬ ÃÖÁøÃᣬ ¾ç´ëÇ壬 À̰æÈñ
Á¤º¸º¸È£ÇÐȸ³í¹®Áö 25 (3), 519-530, 2015
2015
Secure Transaction Method on Smartphones with Smartwatches
J Zhou, JC Choi, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 25 (3 ¡¦, 2015
2015
Study of Operating ¥ìTESLA in Multi-hop Unattended WSN
JC Choi, J Kang, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 23 (3 ¡¦, 2013
2013
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20