Jeman Park
Jeman Park
Georgia Institute of Technology
확인된 이메일 없음
제목
인용
인용
연도
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
242019
Adversarial learning attacks on graph-based IoT malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, A Mohaisen
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
202019
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
International Conference on Computational Social Networks, 259-272, 2018
202018
Proactive detection of algorithmically generated malicious domains
J Spaulding, J Park, J Kim, A Mohaisen
2018 International Conference on Information Networking (ICOIN), 21-24, 2018
102018
A user-side energy-saving video streaming scheme for LTE devices
SG Lee, J Park, H Kim
IEEE Communications Letters 19 (6), 965-968, 2015
82015
Examining adversarial learning against graph-based iot malware detection systems
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
arXiv preprint arXiv:1902.04416, 2019
62019
Where are you taking me? behavioral analysis of open dns resolvers
J Park, A Khormali, M Mohaisen, A Mohaisen
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
52019
Timing is almost everything: Realistic evaluation of the very short intermittent ddos attacks
J Park, DH Nyang, A Mohaisen
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
52018
Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT
J Spaulding, J Park, J Kim, DH Nyang, A Mohaisen
Transactions on Emerging Telecommunications Technologies, e3505, 2018
52018
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03955, 2019
42019
Transparency in the new gTLD era: Evaluating the DNS centralized zone data service
J Park, J Choi, D Nyang, A Mohaisen
IEEE Transactions on Network and Service Management 16 (4), 1782-1796, 2019
32019
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering
A Mohaisen, O Alrawi, J Park, J Kim, DH Nyang, M Mohaisen
EAI Endorsed Transactions on Security and Safety, 2018
32018
QOI: ASSESSING PARTICIPATION IN THREAT INFORMATION SHARING
J Park, H Alasmary, O Al-Ibrahim, C Kamhoua, K Kwiat, L Njilla, ...
IEEE International Conference on Acoustics, Speech and Signal Processing …, 2018
32018
Breaking graph-based IoT malware detection systems using adversarial examples: Poster
A Abusnaina, A Khormali, H Alasmary, J Park, A Anwar, U Meteriz, ...
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
22019
Exploring Smartphones as WAVE Devices
J Park, J Kim, S Kuk, Y Park, H Kim
2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 1-5, 2015
22015
Domain name system security and privacy: A contemporary survey
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks, 107699, 2020
12020
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions
J Park, M Mohaisen, DH Nyang, A Mohaisen
Computer Networks 173, 107146, 2020
12020
A Privacy-Preserving Longevity Study of Tor's Hidden Services
A Sanatinia, J Park, EO Blass, A Mohaisen, G Noubir
arXiv preprint arXiv:1909.03576, 2019
12019
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
J Park, A Mohaisen, CA Kamhoua, MJ Weisman, NO Leslie, L Njilla
International Workshop on Information Security Applications, 299-312, 2019
12019
Corrigendum to “Domain name system security and privacy: A contemporary survey” Computer Networks Volume 185 (2020) 107699
A Khormali, J Park, H Alasmary, A Anwar, M Saad, D Mohaisen
Computer Networks 188, 107814, 2021
2021
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20