Follow
Jaehyeok Han
Jaehyeok Han
DFRC, ICSP, Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Threat assessment for android environment with connectivity to IoT devices from the perspective of situational awareness
M Park, J Han, H Oh, K Lee
Wireless Communications and Mobile Computing 2019, 1-14, 2019
212019
Situational Awareness Framework for Threat Intelligence Measurement of Android Malware.
M Park, J Seo, J Han, H Oh, K Lee
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (3), 25-38, 2018
202018
A study on API wrapping in Themida and unpacking technique
J Lee, J Han, M Lee, J Choi, H Baek, S Lee
Journal of the Korea Institute of Information Security & Cryptology 27 (1 …, 2017
132017
Analysis of the HIKVISION DVR file system
J Han, D Jeong, S Lee
Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015 …, 2015
132015
A practical approach to analyze smartphone backup data as a digital evidence
J Han, S Lee
DFRWS USA 2016, 2016
102016
Secure file transfer method and forensic readiness by converting file format in network segmentation environment
J Han, Y Yoon, G Hur, J Lee, J Choi, SJ Hong, S Lee
Journal of The Korea Institute of Information Security & Cryptology 29 (4 …, 2019
92019
A study on the possibility of recovering deleted data through analysis of SQLite Journal in messenger application
B Jung, J Han, H Choi, S Lee
Journal of Digital Forensics 12 (2), 11-20, 2018
82018
Forensic analysis of the Windows telemetry for diagnostics
J Han, J Park, H Chung, S Lee
arXiv preprint arXiv:2002.12506, 2020
52020
Study on History Tracking Technique of the Document File through RSID Analysis in MS Word
J Joun, J Han, D Jung, S Lee
Journal of the Korea Institute of Information Security & Cryptology 28 (6 …, 2018
52018
A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices.
J Han, S Lee
Journal of Information Processing Systems 18 (3), 2022
32022
File fingerprinting of the ZIP format for identifying and tracking provenance
M Um, J Han, S Lee
Forensic Science International: Digital Investigation 39, 301271, 2021
32021
5W1H-based expression for the effective sharing of information in digital forensic investigations
J Han, J Kim, S Lee
arXiv preprint arXiv:2010.15711, 2020
32020
Situational Awareness for Hybrid Warfare: Risk Measurement Between Cyber Warfare and Nuclear Warfare
M Park, J Seo, J Han, H Oh, K Lee
ECCWS 2018 17th European Conference on Cyber Warfare and Security 2, 360, 2018
32018
The Method of Recovery for Deleted Record of Realm Database
J Kim, J Han, JH Choi, S Lee
Journal of the Korea Institute of Information Security & Cryptology 28 (3 …, 2018
32018
A Recovery Technique of PDF File in the Unit of Page
J Jang, SG Bang, J Han, SJ Lee
KIPS Transactions on Computer and Communication Systems 6 (1), 25-30, 2017
32017
Smartphone-Backup-Data-Extractor
J Han
https://github.com/JaehyeokHan/Smartphone-Backup-Data-Extractor, 2016
3*2016
An effective detection method for hiding data in compound-document files
EK Kim, SJ Jeon, JH Han, MW Lee, S Lee
Journal of the Korea Institute of Information Security & Cryptology 25 (6 …, 2015
32015
플래시 메모리 기반 이동식 저장장치의 데이터 은닉 영역 탐지 방안에 대한 연구
김소희, 한재혁, 이상진
디지털포렌식연구 12 (2), 21-29, 2018
22018
PDF 파일의 페이지단위 복구 기법
장지원, 방승규, 한재혁, 이상진
정보처리학회논문지. 컴퓨터 및 통신시스템 6 (1), 25-30, 2017
22017
A method of recovery for damaged ZIP files
B Jung, J Han, S Lee
Journal of the Korea Institute of Information Security & Cryptology 27 (5 …, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20