关注
Yoon-Ho Choi
Yoon-Ho Choi
Professor of Computer Science and Engineering, Pusan National University
在 pusan.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
年份
A fast pattern matching algorithm with multi-byte search unit for high-speed network security
YH Choi, MY Jung, SW Seo
Computer communications 34 (14), 1750-1763, 2011
172011
A framework for making decision on optimal security investment to the proactive and reactive security solutions management
YH Choi
Journal of Internet Computing and Services 15 (3), 91-100, 2014
22014
A game theoretic model for dynamic configuration of large-scale intrusion detection signatures
XJ Punithan, JD Kim, D Kim, YH Choi
Multimedia Tools and Applications 75, 15461-15477, 2016
62016
A heuristic task allocation methodology for designing the secure in-vehicle network
DH Je, YH Choi, SW Seo
2012 IEEE 1st International Workshop on Vehicular Communications, Sensing …, 2012
52012
A Quantitative Model for Evaluating the Efficiency of Proactive and Reactive Security Countermeasures
YH Choi, HY Jeong, SW Seo
IEICE TRANSACTIONS on Information and Systems 98 (3), 637-648, 2015
12015
A similarity query system for road traffic data based on a NoSQL document store
TI Damaiyanti, A Imawan, FI Indikawati, YH Choi, J Kwon
Journal of Systems and Software 127, 28-51, 2017
122017
A study on prevention and automatic recovery of blockchain networks against persistent censorship attacks
JS Kim, JM Shin, SH Choi, YH Choi
IEEE Access 10, 110770-110784, 2022
62022
A survey on anomaly detection methods in vessel behavior using AIS data
M Pratiwi, U Assem, J Shin, HG Kim, HG Park, YH Choi
한국정보과학회 학술발표논문집, 530-532, 2023
2023
An adaptive computation offloading decision for energy-efficient execution of mobile applications in clouds
BD Lee, KH Lim, YH Choi, N Kim
IEICE TRANSACTIONS on Information and Systems 97 (7), 1804-1811, 2014
32014
An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm
SH Choi, HG Kim, YH Choi
Journal of the Korea Institute of Information Security & Cryptology 31 (6 …, 2021
2021
An Efficient Converter Placement in Wavelength-Routed WDM Networks with Sparse-Partial-Limited Wavelength Conversion
HY Jeong, SW Seo, YH Choi
The Journal of Korean Institute of Communications and Information Sciences …, 2010
2010
An efficient forensic evidence collection scheme of host infringement at the occurrence time
YH Choi, JH Park, SK Kim, SW Seo, Y Kang, JG Choe, HK Moon, ...
Information Security and Cryptology–ICISC 2006: 9th International Conference …, 2006
42006
An Efficient Local Map Building Scheme based on Data Fusion via V2V Communications
SH Yoo, YH Choi, SW Seo
IEIE Transactions on Smart Processing and Computing 2 (2), 45-56, 2013
2013
An Efficient Terminal Selection Method for Multi-Hop Synchronization in Direct Communication Networks.
M Kim, YH Choi, BD Lee, N Kim
Journal of Information Science & Engineering 32 (6), 2016
2016
Analytical Model for Multi-Fiber WDM Networks with Sparse and Limited Wavelength Conversion
HY Jeong, SW Seo, YH Choi
The Journal of Korean Institute of Communications and Information Sciences …, 2009
2009
ARGAN: Adversarially robust generative adversarial networks for deep neural networks against adversarial examples
SH Choi, JM Shin, P Liu, YH Choi
IEEE Access 10, 33602-33615, 2022
82022
Authentication protocol for wearable devices using mobile authentication proxy
DH Hwang, JM Shin, YH Choi
2018 Tenth international conference on ubiquitous and future networks (ICUFN …, 2018
82018
BLAST: B‐LAyered bad‐character SHIFT tables for high‐speed pattern matching
YH Choi, SW Seo
IET Information Security 7 (3), 195-202, 2013
42013
Bypassing Heaven’s Gate Technique Using Black-Box Testing
SJ Hwang, A Utaliyeva, JS Kim, YH Choi
Sensors 23 (23), 9417, 2023
12023
ChatGPT: A Threat to Spam Filtering Systems
A Utaliyeva, M Pratiwi, HG Park, YH Choi
2023 IEEE International Conference on High Performance Computing …, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20