A fast pattern matching algorithm with multi-byte search unit for high-speed network security YH Choi, MY Jung, SW Seo Computer communications 34 (14), 1750-1763, 2011 | 17 | 2011 |
A framework for making decision on optimal security investment to the proactive and reactive security solutions management YH Choi Journal of Internet Computing and Services 15 (3), 91-100, 2014 | 2 | 2014 |
A game theoretic model for dynamic configuration of large-scale intrusion detection signatures XJ Punithan, JD Kim, D Kim, YH Choi Multimedia Tools and Applications 75, 15461-15477, 2016 | 6 | 2016 |
A heuristic task allocation methodology for designing the secure in-vehicle network DH Je, YH Choi, SW Seo 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing …, 2012 | 5 | 2012 |
A Quantitative Model for Evaluating the Efficiency of Proactive and Reactive Security Countermeasures YH Choi, HY Jeong, SW Seo IEICE TRANSACTIONS on Information and Systems 98 (3), 637-648, 2015 | 1 | 2015 |
A similarity query system for road traffic data based on a NoSQL document store TI Damaiyanti, A Imawan, FI Indikawati, YH Choi, J Kwon Journal of Systems and Software 127, 28-51, 2017 | 12 | 2017 |
A study on prevention and automatic recovery of blockchain networks against persistent censorship attacks JS Kim, JM Shin, SH Choi, YH Choi IEEE Access 10, 110770-110784, 2022 | 6 | 2022 |
A survey on anomaly detection methods in vessel behavior using AIS data M Pratiwi, U Assem, J Shin, HG Kim, HG Park, YH Choi 한국정보과학회 학술발표논문집, 530-532, 2023 | | 2023 |
An adaptive computation offloading decision for energy-efficient execution of mobile applications in clouds BD Lee, KH Lim, YH Choi, N Kim IEICE TRANSACTIONS on Information and Systems 97 (7), 1804-1811, 2014 | 3 | 2014 |
An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm SH Choi, HG Kim, YH Choi Journal of the Korea Institute of Information Security & Cryptology 31 (6 …, 2021 | | 2021 |
An Efficient Converter Placement in Wavelength-Routed WDM Networks with Sparse-Partial-Limited Wavelength Conversion HY Jeong, SW Seo, YH Choi The Journal of Korean Institute of Communications and Information Sciences …, 2010 | | 2010 |
An efficient forensic evidence collection scheme of host infringement at the occurrence time YH Choi, JH Park, SK Kim, SW Seo, Y Kang, JG Choe, HK Moon, ... Information Security and Cryptology–ICISC 2006: 9th International Conference …, 2006 | 4 | 2006 |
An Efficient Local Map Building Scheme based on Data Fusion via V2V Communications SH Yoo, YH Choi, SW Seo IEIE Transactions on Smart Processing and Computing 2 (2), 45-56, 2013 | | 2013 |
An Efficient Terminal Selection Method for Multi-Hop Synchronization in Direct Communication Networks. M Kim, YH Choi, BD Lee, N Kim Journal of Information Science & Engineering 32 (6), 2016 | | 2016 |
Analytical Model for Multi-Fiber WDM Networks with Sparse and Limited Wavelength Conversion HY Jeong, SW Seo, YH Choi The Journal of Korean Institute of Communications and Information Sciences …, 2009 | | 2009 |
ARGAN: Adversarially robust generative adversarial networks for deep neural networks against adversarial examples SH Choi, JM Shin, P Liu, YH Choi IEEE Access 10, 33602-33615, 2022 | 8 | 2022 |
Authentication protocol for wearable devices using mobile authentication proxy DH Hwang, JM Shin, YH Choi 2018 Tenth international conference on ubiquitous and future networks (ICUFN …, 2018 | 8 | 2018 |
BLAST: B‐LAyered bad‐character SHIFT tables for high‐speed pattern matching YH Choi, SW Seo IET Information Security 7 (3), 195-202, 2013 | 4 | 2013 |
Bypassing Heaven’s Gate Technique Using Black-Box Testing SJ Hwang, A Utaliyeva, JS Kim, YH Choi Sensors 23 (23), 9417, 2023 | 1 | 2023 |
ChatGPT: A Threat to Spam Filtering Systems A Utaliyeva, M Pratiwi, HG Park, YH Choi 2023 IEEE International Conference on High Performance Computing …, 2023 | | 2023 |