Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness M Park, J Han, H Oh, K Lee Wireless Communications and Mobile Computing 2019, 1-14, 2019 | 21 | 2019 |
Situational Awareness Framework for Threat Intelligence Measurement of Android Malware. M Park, J Seo, J Han, H Oh, K Lee J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (3), 25-38, 2018 | 20 | 2018 |
A study on API wrapping in Themida and unpacking technique J Lee, J Han, M Lee, J Choi, H Baek, S Lee Journal of the Korea Institute of Information Security & Cryptology 27 (1 …, 2017 | 13 | 2017 |
Analysis of the HIKVISION DVR file system J Han, D Jeong, S Lee Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015 …, 2015 | 13 | 2015 |
A practical approach to analyze smartphone backup data as a digital evidence J Han, S Lee DFRWS USA 2016, 2016 | 10 | 2016 |
Secure file transfer method and forensic readiness by converting file format in network segmentation environment J Han, Y Yoon, G Hur, J Lee, J Choi, SJ Hong, S Lee Journal of The Korea Institute of Information Security & Cryptology 29 (4 …, 2019 | 9 | 2019 |
A study on the possibility of recovering deleted data through analysis of SQLite Journal in messenger application B Jung, J Han, H Choi, S Lee Journal of Digital Forensics 12 (2), 11-20, 2018 | 8 | 2018 |
Forensic analysis of the Windows telemetry for diagnostics J Han, J Park, H Chung, S Lee arXiv preprint arXiv:2002.12506, 2020 | 5 | 2020 |
Study on History Tracking Technique of the Document File through RSID Analysis in MS Word J Joun, J Han, D Jung, S Lee Journal of the Korea Institute of Information Security & Cryptology 28 (6 …, 2018 | 5 | 2018 |
A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices. J Han, S Lee Journal of Information Processing Systems 18 (3), 2022 | 3 | 2022 |
File fingerprinting of the ZIP format for identifying and tracking provenance M Um, J Han, S Lee Forensic Science International: Digital Investigation 39, 301271, 2021 | 3 | 2021 |
5W1H-based expression for the effective sharing of information in digital forensic investigations J Han, J Kim, S Lee arXiv preprint arXiv:2010.15711, 2020 | 3 | 2020 |
Situational Awareness for Hybrid Warfare: Risk Measurement Between Cyber Warfare and Nuclear Warfare M Park, J Seo, J Han, H Oh, K Lee ECCWS 2018 17th European Conference on Cyber Warfare and Security 2, 360, 2018 | 3 | 2018 |
The Method of Recovery for Deleted Record of Realm Database J Kim, J Han, JH Choi, S Lee Journal of the Korea Institute of Information Security & Cryptology 28 (3 …, 2018 | 3 | 2018 |
A Recovery Technique of PDF File in the Unit of Page J Jang, SG Bang, J Han, SJ Lee KIPS Transactions on Computer and Communication Systems 6 (1), 25-30, 2017 | 3 | 2017 |
Smartphone-Backup-Data-Extractor J Han https://github.com/JaehyeokHan/Smartphone-Backup-Data-Extractor, 2016 | 3* | 2016 |
An effective detection method for hiding data in compound-document files EK Kim, SJ Jeon, JH Han, MW Lee, S Lee Journal of the Korea Institute of Information Security & Cryptology 25 (6 …, 2015 | 3 | 2015 |
플래시 메모리 기반 이동식 저장장치의 데이터 은닉 영역 탐지 방안에 대한 연구 김소희, 한재혁, 이상진 디지털포렌식연구 12 (2), 21-29, 2018 | 2 | 2018 |
PDF 파일의 페이지단위 복구 기법 장지원, 방승규, 한재혁, 이상진 정보처리학회논문지. 컴퓨터 및 통신시스템 6 (1), 25-30, 2017 | 2 | 2017 |
A method of recovery for damaged ZIP files B Jung, J Han, S Lee Journal of the Korea Institute of Information Security & Cryptology 27 (5 …, 2017 | 2 | 2017 |