Search Results - "Kim, Jeong Nyeo"
-
1
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
Published in Sensors (Basel, Switzerland) (21-10-2021)“…With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to…”
Get full text
Journal Article -
2
A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks
Published in IEEE access (2019)“…Smart home networks have been recognized as one of its representative important applications in the forthcoming 5G era. It is also expected that in 5G…”
Get full text
Journal Article -
3
Secure mobile device structure for trust IoT
Published in The Journal of supercomputing (01-12-2018)“…In the IoT environment, all devices are connected to each other, and mobile device is considered as key device. But hacking into mobile devices is increasing…”
Get full text
Journal Article -
4
Balanced Encoding of Near-Zero Correlation for an AES Implementation
Published in IEEE transactions on information forensics and security (2024)“…Power analysis poses a significant threat to the security of cryptographic algorithms, as it can be leveraged to recover secret keys. While various…”
Get full text
Journal Article -
5
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations
Published in Sensors (Basel, Switzerland) (23-02-2024)“…This study presents a groundbreaking approach to the ever-evolving challenge of ransomware detection. A lot of detection methods predominantly rely on…”
Get full text
Journal Article -
6
LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems
Published in Energies (Basel) (01-03-2018)“…Urban networks aim at facilitating users for better experience and services through smart platforms such as the Intelligent Transportation System (ITS). ITS…”
Get full text
Journal Article -
7
Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas
Published in Wireless networks (01-02-2017)“…This paper explores the benefits of using directional antennas in an eavesdropping attack in millimeter-wave (mmWave)-based wireless personal area networks…”
Get full text
Journal Article -
8
A practical implementation of fuzzy fingerprint vault for smart cards
Published in Journal of intelligent manufacturing (01-04-2014)“…Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important…”
Get full text
Journal Article -
9
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Published in International journal of distributed sensor networks (01-01-2015)“…Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for…”
Get full text
Journal Article -
10
Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks
Published in The Journal of supercomputing (01-11-2013)“…To model a layered video streaming system in super-peer overlay networks that faces with heterogeneity and volatility of peers, we formulate a layer scheduling…”
Get full text
Journal Article -
11
Technology trends of access control in IoT and requirements analysis
Published in 2015 International Conference on Information and Communication Technology Convergence (ICTC) (01-10-2015)“…Since IoT devices can cause problems, such as invasion of privacy and threat to our safety, security in IoT is the most important element. IoT is an…”
Get full text
Conference Proceeding -
12
Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing
Published in Multimedia tools and applications (01-07-2014)“…This paper addresses the automatic classification of X-rated videos by analyzing its obscene sounds. In this paper, we propose the optimized repeated…”
Get full text
Journal Article -
13
Screening and Characterization of an Esterase from a Metagenomic Library
Published in Journal of microbiology and biotechnology (01-11-2005)“…A metagenomic library was constructed using a fosmid vector, and total genomic DNA was extracted directly from soil at Cisolok (hot spring area, Indonesia)…”
Get full text
Journal Article -
14
StackGuard+$ ext{StackGuard}^+$: Interoperable alternative to canary‐based protection of stack smashing
Published in Electronics letters (01-10-2024)“…Abstract This paper introduces a novel software‐based approach to enhancing stack smashing protection in C/C++ applications, specifically targeting…”
Get full text
Journal Article -
15
StackGuard+$\text{StackGuard}^+$: Interoperable alternative to canary‐based protection of stack smashing
Published in Electronics letters (01-10-2024)“…This paper introduces a novel software‐based approach to enhancing stack smashing protection in C/C++ applications, specifically targeting return‐oriented…”
Get full text
Journal Article -
16
Protection method from APP repackaging attack on mobile device with separated domain
Published in 2014 International Conference on Information and Communication Technology Convergence (ICTC) (01-10-2014)“…Hacking method of decomposing a well-known apps, reverse engineering, inserting malicious code, repackaging of it, and then redistributing it accounts for the…”
Get full text
Conference Proceeding -
17
Purification and Characterization of a Novel Extracellular Alkaline Phytase from Aeromonas sp
Published in Journal of microbiology and biotechnology (30-08-2005)“…A phytase from Aeromonas sp. LIK 1-5 was partially purified by ammonium sulfate precipitation and DEAE-Sephacel column chromatography. Its molecular weight was…”
Get full text
Journal Article -
18
A secure fingerprint template generation algorithm for smart card
Published in 2011 IEEE International Conference on Consumer Electronics (ICCE) (01-01-2011)“…This paper represents a method for generating a fingerprint template for smart card. Especially, to enhance the security of the stored template, we propose a…”
Get full text
Conference Proceeding -
19
Hierarchical Access Control for SDP-IoT
Published in 2020 International Conference on Information and Communication Technology Convergence (ICTC) (21-10-2020)“…In this paper, we describe how to apply the SDP protocol to IoT networks (let's refer to it as SDP-IoT) to defend against DDoS(Distributed Denial of Service)…”
Get full text
Conference Proceeding -
20
IoT standard platform architecture that provides defense against DDoS attacks
Published in 2021 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia) (01-11-2021)“…IoT devices have evolved with the goal of becoming more connected. However, for security it is necessary to reduce the attack surface by allowing only…”
Get full text
Conference Proceeding