Jinchun Choi
제목
인용
인용
연도
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
642019
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
452019
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
International Conference on Computational Social Networks, 259-272, 2018
272018
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
112016
Relaying rogue AP detection scheme using SVM
S Kang, DH Nyang, JC Choi, SJ Lee
Journal of the Korea Institute of Information Security & Cryptology 23 (3 …, 2013
82013
Iot malware ecosystem in the wild: a glimpse into analysis and exposures
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 413-418, 2019
62019
Analyzing, comparing, and detecting emerging malware: a graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03955, 2019
52019
Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing, 2019
42019
Transparency in the new gTLD era: Evaluating the DNS centralized zone data service
J Park, J Choi, D Nyang, A Mohaisen
IEEE Transactions on Network and Service Management 16 (4), 1782-1796, 2019
42019
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
22020
A method for generating robust key from face image and user intervention
H Kim, JC Choi, C Jung, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 27 (5 …, 2017
22017
Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN
JC Choi, J Kang, DH Nyang, KH Lee
The Journal of Korean Institute of Communications and Information Sciences …, 2014
22014
Blockchain-Based Firmware Security Check and Recovery for Smart Inverters
G Bere, B Ahn, JJ Ochoa, T Kim, AA Hadi, J Choi
2021 IEEE Applied Power Electronics Conference and Exposition (APEC), 675-679, 2021
2021
A Network-independent Tool-based Usable Authentication System for Internet of Things Devices
C Jung, J Choi, R Jang, D Mohaisen, DH Nyang
Computers & Security, 102338, 2021
2021
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts
A Anwar, J Choi, A Alabduljabbar, H Alasmary, J Spaulding, A Wang, ...
arXiv preprint arXiv:2103.14217, 2021
2021
A Cyber Kill Chain Model for Distributed Energy Resources (DER) Aggregation Systems
BH Ahn, T Kim, J Choi, S Park, K Park, D Won
2021 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2021
2021
Measuring the Cost of Software Vulnerabilities
A Anwar, A Khormali, J Choi, H Alasmary, S Choi, S Salem, DH Nyang, ...
EAI Endorsed Transactions on Security and Safety 7 (23), e1, 2020
2020
Endpoints and Interdependencies in Internet of Things Residual Artifacts: Measurements, Analyses, and Insights into Defenses
J Choi
2020
Analyzing endpoints in the internet of things malware: poster
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
2019
Analyzing Endpoints in the Internet of Things Malware
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03531, 2019
2019
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20