AMI threats, intrusion detection requirements and deployment recommendations D Grochocki, JH Huh, R Berthier, R Bobba, WH Sanders, AA Cárdenas, ... 2012 IEEE Third International Conference on Smart Grid Communications …, 2012 | 134 | 2012 |
A framework integrating attribute-based policies into role-based access control J Huang, DM Nicol, R Bobba, JH Huh Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 109 | 2012 |
Void: A fast and light voice liveness detection system ME Ahmed, IY Kwak, JH Huh, I Kim, T Oh, H Kim 29th USENIX Security Symposium, 2020 | 90 | 2020 |
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks Y Song, G Cho, S Oh, H Kim, JH Huh Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015 | 88 | 2015 |
Phishing detection with popular search engines: Simple and effective JH Huh, H Kim Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS …, 2012 | 86 | 2012 |
Hybrid spam filtering for mobile communication JW Yoon, H Kim, JH Huh computers & security 29 (4), 446-459, 2010 | 77 | 2010 |
A framework for evaluating intrusion detection architectures in advanced metering infrastructures AA Cárdenas, R Berthier, RB Bobba, JH Huh, JG Jetcheva, D Grochocki, ... IEEE Transactions on Smart Grid 5 (2), 906-915, 2014 | 72 | 2014 |
Syspal: System-guided pattern locks for android G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim 2017 IEEE Symposium on security and privacy (SP), 338-356, 2017 | 51 | 2017 |
Boosting the guessing attack performance on android lock patterns with smudge attacks S Cha, S Kwag, H Kim, JH Huh Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 50 | 2017 |
Surpass: System-initiated user-replaceable passwords JH Huh, S Oh, H Kim, K Beznosov, A Mohan, SR Rajagopalan Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 50 | 2015 |
Detecting DNS-poisoning-based phishing attacks from their network performance characteristics H Kim, JH Huh Electronics Letters 47 (11), 656-658, 2011 | 46 | 2011 |
PIN selection policies: Are they really effective? H Kim, JH Huh computers & security 31 (4), 484-496, 2012 | 45 | 2012 |
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ... IEEE Communications Magazine 54 (6), 60-67, 2016 | 40 | 2016 |
On the Memorability of System-generated PINs: Can Chunking Help? JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 197--209, 2015 | 40 | 2015 |
I Don’t Use Apple Pay because it’s less secure...: perception of security and usability in mobile tap-and-pay JH Huh, S Verma, SSV Rayala, RB Bobba, K Beznosov, H Kim Workshop on Usable Security, San Diego, CA, 2017 | 33 | 2017 |
I'm too busy to reset my LinkedIn password: On the effectiveness of password reset emails JH Huh, H Kim, SSVP Rayala, RB Bobba, K Beznosov Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017 | 32 | 2017 |
Next-generation access control for distributed control systems JH Huh, RB Bobba, T Markham, DM Nicol, J Hull, A Chernoguzov, ... IEEE Internet Computing 20 (5), 28-37, 2016 | 30 | 2016 |
On the security of internet banking in south korea H Kim, J Huh, R Anderson | 30 | 2010 |
A framework for detecting MAC and IP spoofing attacks with network characteristics J Yu, E Kim, H Kim, J Huh 2016 International conference on software security and assurance (ICSSA), 49-53, 2016 | 28 | 2016 |
On the practicality of detecting anomalies with encrypted traffic in AMI R Berthier, DI Urbina, AA Cárdenas, M Guerrero, U Herberg, JG Jetcheva, ... 2014 IEEE International Conference on Smart Grid Communications …, 2014 | 23 | 2014 |