PsyBoG: A scalable botnet detection method for large-scale DNS traffic J Kwon, J Lee, H Lee, A Perrig Computer Networks 97, 48-73, 2016 | 133 | 2016 |
SCIONLAB: A Next-Generation Internet Testbed J Kwon, JA García-Pardo, M Legner, F Wirz, M Frei, D Hausheer, A Perrig In Proceedings of the 28th IEEE International Conference on Network …, 2020 | 48 | 2020 |
CLORIFI: software vulnerability discovery using code clone verification H Li, H Kwon, J Kwon, H Lee Concurrency and Computation: Practice and Experience 28 (6), 1900-1917, 2016 | 39 | 2016 |
An incrementally deployable anti-spoofing mechanism for software-defined networks J Kwon, D Seo, M Kwon, H Lee, A Perrig, H Kim Computer Communications 64, 1-20, 2015 | 33 | 2015 |
Deployment and scalability of an inter-domain multi-path routing infrastructure C Krähenbühl, S Tabaeiaghdaei, C Gloor, J Kwon, A Perrig, D Hausheer, ... Proceedings of the 17th International Conference on emerging Networking …, 2021 | 30 | 2021 |
PsyBoG: Power spectral density analysis for detecting botnet groups J Kwon, J Kim, J Lee, H Lee, A Perrig 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 26 | 2014 |
Bingraph: Discovering mutant malware using hierarchical semantic signatures J Kwon, H Lee 2012 7th International Conference on Malicious and Unwanted Software, 104-111, 2012 | 26 | 2012 |
A scalable approach for vulnerability discovery based on security patches H Li, H Kwon, J Kwon, H Lee Applications and Techniques in Information Security: 5th International …, 2014 | 22 | 2014 |
Hidden bot detection by tracing non-human generated traffic at the zombie host J Kwon, J Lee, H Lee International Conference on Information Security Practice and Experience …, 2011 | 21 | 2011 |
Honeyid: Unveiling hidden spywares by generating bogus events J Han, J Kwon, H Lee IFIP International Information Security Conference, 669-673, 2008 | 16 | 2008 |
Droidgraph: discovering android malware by analyzing semantic behavior J Kwon, J Jeong, J Lee, H Lee 2014 IEEE Conference on Communications and Network Security, 2014 | 14 | 2014 |
MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android J Jeong, D Seo, C Lee, J Kwon, H Lee, J Milburn 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 13 | 2014 |
SVLAN: Secure & scalable network virtualization J Kwon, T Lee, C Hähni, A Perrig Proceedings 2020 Network and Distributed System Security Symposium (NDSS …, 2020 | 10 | 2020 |
Creating a secure underlay for the internet H Birge-Lee, J Wanner, GH Cimaszewski, J Kwon, L Wang, F Wirz, ... 31st USENIX Security Symposium (USENIX Security 22), 2601-2618, 2022 | 5 | 2022 |
Mondrian: Comprehensive Inter-domain Network Zoning Architecture. J Kwon, C Hähni, P Bamert, A Perrig NDSS, 2021 | 5 | 2021 |
Carbon-Aware Global Routing in Path-Aware Networks S Tabaeiaghdaei, S Scherrer, J Kwon, A Perrig Proceedings of the 14th ACM International Conference on Future Energy …, 2023 | 4 | 2023 |
협업 기반의 중앙집중형 봇넷 탐지 및 관제 시스템 설계 권종훈, 임채태, 최현상, 지승구, 오주형, 정현철, 이희조 정보보호학회논문지 19 (3), 83-93, 2009 | 4 | 2009 |
Carbon-Intelligent Global Routing in Path-Aware Networks S Tabaeiaghdaei, S Scherrer, J Kwon, A Perrig arXiv preprint arXiv:2211.00347, 2022 | 2 | 2022 |
G-sinc: Global synchronization infrastructure for network clocks M Frei, J Kwon, S Tabaeiaghdaei, M Wyss, C Lenzen, A Perrig 2022 41st International Symposium on Reliable Distributed Systems (SRDS …, 2022 | 2 | 2022 |
BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks C Koh, J Kwon, J Hur 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 2 | 2022 |