Search Results - "Cho, Jin Hee"
-
1
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense
Published in IEEE Communications surveys and tutorials (2020)“…Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades…”
Get full text
Journal Article -
2
A Survey on Modeling and Optimizing Multi-Objective Systems
Published in IEEE Communications surveys and tutorials (01-01-2017)“…Many systems or applications have been developed for distributed environments with the goal of attaining multiple objectives in the face of environmental…”
Get full text
Journal Article -
3
Exceptional High‐Performance of Pt‐Based Bimetallic Catalysts for Exclusive Detection of Exhaled Biomarkers
Published in Advanced materials (Weinheim) (01-09-2017)“…Achieving an improved understanding of catalyst properties, with ability to predict new catalytic materials, is key to overcoming the inherent limitations of…”
Get full text
Journal Article -
4
A Survey on Trust Management for Mobile Ad Hoc Networks
Published in IEEE Communications surveys and tutorials (01-01-2011)“…Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving mission and system…”
Get full text
Journal Article -
5
A General Synthesis of Crumpled Metal Oxide Nanosheets as Superior Chemiresistive Sensing Layers
Published in Advanced functional materials (01-08-2019)“…Metal oxide nanosheets having high mesoporosity, grain size distribution of 5–10 nm, and ultrathin thickness have attracted much attention due to their…”
Get full text
Journal Article -
6
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
Published in IEEE transactions on parallel and distributed systems (01-05-2014)“…Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless…”
Get full text
Journal Article -
7
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Published in IEEE transactions on information forensics and security (01-12-2018)“…The accurate measurement of security metrics is a critical research problem, because an improper or inaccurate measurement process can ruin the usefulness of…”
Get full text
Journal Article -
8
Metrics Towards Measuring Cyber Agility
Published in IEEE transactions on information forensics and security (01-12-2019)“…In cyberspace, evolutionary strategies are commonly used by both attackers and defenders. For example, an attacker's strategy often changes over the course of…”
Get full text
Journal Article -
9
A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning
Published in IEEE Communications surveys and tutorials (01-01-2021)“…Defensive deception is a promising approach for cyber defense. Via defensive deception, a defender can anticipate and prevent attacks by misleading or luring…”
Get full text
Journal Article -
10
Mutational Landscape of Secondary Glioblastoma Guides MET-Targeted Trial in Brain Tumor
Published in Cell (29-11-2018)“…Low-grade gliomas almost invariably progress into secondary glioblastoma (sGBM) with limited therapeutic option and poorly understood mechanism. By studying…”
Get full text
Journal Article -
11
A Survey on Centrality Metrics and Their Network Resilience Analysis
Published in IEEE access (2021)“…Centrality metrics have been studied in the network science research. They have been used in various networks, such as communication, social, biological,…”
Get full text
Journal Article -
12
Porosity controlled 3D SnO2 spheres via electrostatic spray: Selective acetone sensors
Published in Sensors and actuators. B, Chemical (01-02-2020)“…•To control the porosity, the e-spraying and PS beads templating route are combined, resulting in highly porous structure.•Pt functionalized PH-SnO2 spheres…”
Get full text
Journal Article -
13
Confinement of Ultrasmall Bimetallic Nanoparticles in Conductive Metal–Organic Frameworks via Site‐Specific Nucleation
Published in Advanced materials (Weinheim) (01-09-2021)“…Conductive metal–organic frameworks (cMOFs) are emerging materials for various applications due to their high surface area, high porosity, and electrical…”
Get full text
Journal Article -
14
Diagnostic value of various criteria for deep lobe involvement in radiologic studies with parotid mass: a systematic review and meta-analysis
Published in Radiologia medica (01-10-2022)“…Objective To assess the diagnostic utility of various radiologic criteria such as the lateral margin or dislocation of the retromandibular vein (RMV), Utrecht…”
Get full text
Journal Article -
15
PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks
Published in IEEE transactions on dependable and secure computing (01-01-2018)“…Delay tolerant networks (DTNs) are often encountered in military network environments where end-to-end connectivity is not guaranteed due to frequent…”
Get full text
Journal Article -
16
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems
Published in IEEE access (2019)“…The identification of vulnerabilities in a mission-critical system is one of the challenges faced by a cyber-physical system (CPS). The incorporation of…”
Get full text
Journal Article -
17
Relationships of sphenoid sinus pneumatization with internal carotid artery characteristics
Published in PloS one (25-08-2022)“…Objective We explored the clinical significances of the relationships among sphenoid sinus aeration, intersphenoid sinus septum (ISS), and internal carotid…”
Get full text
Journal Article -
18
Expert Opinion Fusion Framework Using Subjective Logic for Fault Diagnosis
Published in IEEE transactions on cybernetics (01-06-2022)“…Fault diagnosis plays a critical role in maintaining and troubleshooting engineered systems. Various diagnosis models, such as Bayesian networks (BNs), have…”
Get full text
Journal Article -
19
Spatiotemporal Evolution of the Primary Glioblastoma Genome
Published in Cancer cell (14-09-2015)“…Tumor recurrence following treatment is the major cause of mortality for glioblastoma multiforme (GBM) patients. Thus, insights on the evolutionary process at…”
Get full text
Journal Article -
20
Attack Graph-Based Moving Target Defense in Software-Defined Networks
Published in IEEE eTransactions on network and service management (01-09-2020)“…Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to thwart a potential attacker. The key underlying idea of MTD is to increase…”
Get full text
Journal Article