Search Results - "Cho, Jin Hee"

Refine Results
  1. 1

    Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense by Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk, Nelson, Frederica F.

    “…Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades…”
    Get full text
    Journal Article
  2. 2

    A Survey on Modeling and Optimizing Multi-Objective Systems by Jin-Hee Cho, Yating Wang, Ing-Ray Chen, Chan, Kevin S., Swami, Ananthram

    Published in IEEE Communications surveys and tutorials (01-01-2017)
    “…Many systems or applications have been developed for distributed environments with the goal of attaining multiple objectives in the face of environmental…”
    Get full text
    Journal Article
  3. 3

    Exceptional High‐Performance of Pt‐Based Bimetallic Catalysts for Exclusive Detection of Exhaled Biomarkers by Kim, Sang‐Joon, Choi, Seon‐Jin, Jang, Ji‐Soo, Cho, HeeJin, Koo, Won‐Tae, Tuller, Harry L., Kim, Il‐Doo

    Published in Advanced materials (Weinheim) (01-09-2017)
    “…Achieving an improved understanding of catalyst properties, with ability to predict new catalytic materials, is key to overcoming the inherent limitations of…”
    Get full text
    Journal Article
  4. 4

    A Survey on Trust Management for Mobile Ad Hoc Networks by Jin-Hee Cho, Swami, A., Ing-Ray Chen

    Published in IEEE Communications surveys and tutorials (01-01-2011)
    “…Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving mission and system…”
    Get full text
    Journal Article
  5. 5

    A General Synthesis of Crumpled Metal Oxide Nanosheets as Superior Chemiresistive Sensing Layers by Kim, Rheehyun, Jang, Ji‐Soo, Kim, Dong‐Ha, Kang, Joon‐Young, Cho, HeeJin, Jeong, Yong Jin, Kim, Il‐Doo

    Published in Advanced functional materials (01-08-2019)
    “…Metal oxide nanosheets having high mesoporosity, grain size distribution of 5–10 nm, and ultrathin thickness have attracted much attention due to their…”
    Get full text
    Journal Article
  6. 6

    Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing by Chen, Ing-Ray, Bao, Fenye, Chang, MoonJeong, Cho, Jin-Hee

    “…Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless…”
    Get full text
    Journal Article
  7. 7

    Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth by Du, Pang, Sun, Zheyuan, Chen, Huashan, Cho, Jin-Hee, Xu, Shouhuai

    “…The accurate measurement of security metrics is a critical research problem, because an improper or inaccurate measurement process can ruin the usefulness of…”
    Get full text
    Journal Article
  8. 8

    Metrics Towards Measuring Cyber Agility by Mireles, Jose David, Ficke, Eric, Cho, Jin-Hee, Hurley, Patrick, Xu, Shouhuai

    “…In cyberspace, evolutionary strategies are commonly used by both attackers and defenders. For example, an attacker's strategy often changes over the course of…”
    Get full text
    Journal Article
  9. 9

    A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning by Zhu, Mu, Anwar, Ahmed H., Wan, Zelin, Cho, Jin-Hee, Kamhoua, Charles A., Singh, Munindar P.

    Published in IEEE Communications surveys and tutorials (01-01-2021)
    “…Defensive deception is a promising approach for cyber defense. Via defensive deception, a defender can anticipate and prevent attacks by misleading or luring…”
    Get full text
    Journal Article
  10. 10
  11. 11

    A Survey on Centrality Metrics and Their Network Resilience Analysis by Wan, Zelin, Mahajan, Yash, Kang, Beom Woo, Moore, Terrence J., Cho, Jin-Hee

    Published in IEEE access (2021)
    “…Centrality metrics have been studied in the network science research. They have been used in various networks, such as communication, social, biological,…”
    Get full text
    Journal Article
  12. 12

    Porosity controlled 3D SnO2 spheres via electrostatic spray: Selective acetone sensors by Cho, Hee-Jin, Choi, Seon-Jin, Kim, Nam-Hoon, Kim, Il-Doo

    Published in Sensors and actuators. B, Chemical (01-02-2020)
    “…•To control the porosity, the e-spraying and PS beads templating route are combined, resulting in highly porous structure.•Pt functionalized PH-SnO2 spheres…”
    Get full text
    Journal Article
  13. 13

    Confinement of Ultrasmall Bimetallic Nanoparticles in Conductive Metal–Organic Frameworks via Site‐Specific Nucleation by Park, Chungseong, Koo, Won‐Tae, Chong, Sanggyu, Shin, Hamin, Kim, Yoon Hwa, Cho, HeeJin, Jang, Ji‐Soo, Kim, Dong‐Ha, Lee, Jiyoung, Park, Seyeon, Ko, Jaehyun, Kim, Jihan, Kim, Il‐Doo

    Published in Advanced materials (Weinheim) (01-09-2021)
    “…Conductive metal–organic frameworks (cMOFs) are emerging materials for various applications due to their high surface area, high porosity, and electrical…”
    Get full text
    Journal Article
  14. 14

    Diagnostic value of various criteria for deep lobe involvement in radiologic studies with parotid mass: a systematic review and meta-analysis by Kang, Yun Jin, Cho, Jin-Hee, Hwang, Se Hwan

    Published in Radiologia medica (01-10-2022)
    “…Objective To assess the diagnostic utility of various radiologic criteria such as the lateral margin or dislocation of the retromandibular vein (RMV), Utrecht…”
    Get full text
    Journal Article
  15. 15

    PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks by Cho, Jin-Hee, Chen, Ing-Ray

    “…Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent…”
    Get full text
    Journal Article
  16. 16

    BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems by Sharma, Vishal, You, Ilsun, Yim, Kangbin, Chen, Ing-Ray, Cho, Jin-Hee

    Published in IEEE access (2019)
    “…The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of…”
    Get full text
    Journal Article
  17. 17

    Relationships of sphenoid sinus pneumatization with internal carotid artery characteristics by Kang, Yun Jin, Cho, Jin-Hee, Kim, Do Hyun, Kim, Sung Won

    Published in PloS one (25-08-2022)
    “…Objective We explored the clinical significances of the relationships among sphenoid sinus aeration, intersphenoid sinus septum (ISS), and internal carotid…”
    Get full text
    Journal Article
  18. 18

    Expert Opinion Fusion Framework Using Subjective Logic for Fault Diagnosis by Xu, Peng, Cho, Jin-Hee, Salado, Alejandro

    Published in IEEE transactions on cybernetics (01-06-2022)
    “…Fault diagnosis plays a critical role in maintaining and troubleshooting engineered systems. Various diagnosis models, such as Bayesian networks (BNs), have…”
    Get full text
    Journal Article
  19. 19

    Spatiotemporal Evolution of the Primary Glioblastoma Genome by Kim, Jinkuk, Lee, In-Hee, Cho, Hee Jin, Park, Chul-Kee, Jung, Yang-Soon, Kim, Yanghee, Nam, So Hee, Kim, Byung Sup, Johnson, Mark D., Kong, Doo-Sik, Seol, Ho Jun, Lee, Jung-Il, Joo, Kyeung Min, Yoon, Yeup, Park, Woong-Yang, Lee, Jeongwu, Park, Peter J., Nam, Do-Hyun

    Published in Cancer cell (14-09-2015)
    “…Tumor recurrence following treatment is the major cause of mortality for glioblastoma multiforme (GBM) patients. Thus, insights on the evolutionary process at…”
    Get full text
    Journal Article
  20. 20

    Attack Graph-Based Moving Target Defense in Software-Defined Networks by Yoon, Seunghyun, Cho, Jin-Hee, Kim, Dong Seong, Moore, Terrence J., Free-Nelson, Frederica, Lim, Hyuk

    “…Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to thwart a potential attacker. The key underlying idea of MTD is to increase…”
    Get full text
    Journal Article