Jinchun Choi
제목
인용
인용
연도
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
382019
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
212019
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
International Conference on Computational Social Networks, 259-272, 2018
182018
Relaying rogue AP detection scheme using SVM
SB Kang, DH Nyang, JC Choi, SJ Lee
Journal of the Korea Institute of Information Security and Cryptology 23 (3 …, 2013
82013
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
72016
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03955, 2019
42019
Transparency in the new gTLD era: Evaluating the DNS centralized zone data service
J Park, J Choi, D Nyang, A Mohaisen
IEEE Transactions on Network and Service Management 16 (4), 1782-1796, 2019
32019
Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing, 2019
22019
IoT malware ecosystem in the wild: a glimpse into analysis and exposures
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 413-418, 2019
22019
A method for generating robust key from face image and user intervention
H Kim, JC Choi, C Jung, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 27 (5 …, 2017
22017
Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN
JC Choi, J Kang, DH Nyang, KH Lee
The Journal of Korean Institute of Communications and Information Sciences …, 2014
22014
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
2020
Endpoints and Interdependencies in Internet of Things Residual Artifacts: Measurements, Analyses, and Insights into Defenses
J Choi
2020
Analyzing endpoints in the internet of things malware: poster
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
2019
Analyzing Endpoints in the Internet of Things Malware
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03531, 2019
2019
얼굴과 사용자 입력정보를 이용하여 안전한 키를 생성하는 방법
김혜진, 최진춘, 정창훈, 양대헌, 이경희
정보보호학회논문지 27 (5), 1059-1068, 2017
2017
BLE 를 이용한 결제 프로세스에서 Relay Attack 과 대응방안
최진춘, 서승환, 양대헌, 이경희
한국차세대컴퓨팅학회 논문지 11 (4), 25-35, 2015
2015
스마트워치를 이용한 스마트폰에서의 안전한 전자거래방법
주군, 최진춘, 양대헌, 이경희
정보보호학회논문지 25 (3), 519-530, 2015
2015
Secure Transaction Method on Smartphones with Smartwatches
J Zhou, JC Choi, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 25 (3 …, 2015
2015
Study of Operating μTESLA in Multi-hop Unattended WSN
JC Choi, J Kang, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 23 (3 …, 2013
2013
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20