Search Results - "Kim, Jeong Nyeo"

Refine Results
  1. 1

    A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools by Hwang, Song-Yi, Kim, Jeong-Nyeo

    Published in Sensors (Basel, Switzerland) (21-10-2021)
    “…With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to…”
    Get full text
    Journal Article
  2. 2

    A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks by Shin, Daemin, Yun, Keon, Kim, Jiyoon, Astillo, Philip Virgil, Kim, Jeong-Nyeo, You, Ilsun

    Published in IEEE access (2019)
    “…Smart home networks have been recognized as one of its representative important applications in the forthcoming 5G era. It is also expected that in 5G…”
    Get full text
    Journal Article
  3. 3

    Secure mobile device structure for trust IoT by Lee, Yun-kyung, Kim, Jeong-nyeo, Lim, Kyung-Soo, Yoon, Hyunsoo

    Published in The Journal of supercomputing (01-12-2018)
    “…In the IoT environment, all devices are connected to each other, and mobile device is considered as key device. But hacking into mobile devices is increasing…”
    Get full text
    Journal Article
  4. 4

    Balanced Encoding of Near-Zero Correlation for an AES Implementation by Lee, Seungkwang, Kim, Jeong-Nyeo

    “…Power analysis poses a significant threat to the security of cryptographic algorithms, as it can be leveraged to recover secret keys. While various…”
    Get full text
    Journal Article
  5. 5

    Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations by Bang, Jiseok, Kim, Jeong Nyeo, Lee, Seungkwang

    Published in Sensors (Basel, Switzerland) (23-02-2024)
    “…This study presents a groundbreaking approach to the ever-evolving challenge of ransomware detection. A lot of detection methods predominantly rely on…”
    Get full text
    Journal Article
  6. 6

    LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems by Sharma, Vishal, You, Ilsun, Pau, Giovanni, Collotta, Mario, Lim, Jae, Kim, Jeong

    Published in Energies (Basel) (01-03-2018)
    “…Urban networks aim at facilitating users for better experience and services through smart platforms such as the Intelligent Transportation System (ITS). ITS…”
    Get full text
    Journal Article
  7. 7

    Analysis of eavesdropping attack in mmWave-based WPANs with directional antennas by Kim, Meejoung, Hwang, Eenjun, Kim, Jeong-Nyeo

    Published in Wireless networks (01-02-2017)
    “…This paper explores the benefits of using directional antennas in an eavesdropping attack in millimeter-wave (mmWave)-based wireless personal area networks…”
    Get full text
    Journal Article
  8. 8

    A practical implementation of fuzzy fingerprint vault for smart cards by Moon, Daesung, Chung, Yongwha, Seo, Changho, Kim, Sung-Young, Kim, Jeong-Nyeo

    Published in Journal of intelligent manufacturing (01-04-2014)
    “…Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important…”
    Get full text
    Journal Article
  9. 9

    A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization by Park, Su-Wan, Lim, JaeDeok, Kim, Jeong Nyeo

    “…Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for…”
    Get full text
    Journal Article
  10. 10

    Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks by Moon, Yong-Hyuk, Kim, Jeong-Nyeo, Youn, Chan-Hyun

    Published in The Journal of supercomputing (01-11-2013)
    “…To model a layered video streaming system in super-peer overlay networks that faces with heterogeneity and volatility of peers, we formulate a layer scheduling…”
    Get full text
    Journal Article
  11. 11

    Technology trends of access control in IoT and requirements analysis by Yun-kyung Lee, Jae-deok Lim, Yong-seong Jeon, Jeong-nyeo Kim

    “…Since IoT devices can cause problems, such as invasion of privacy and threat to our safety, security in IoT is the most important element. IoT is an…”
    Get full text
    Conference Proceeding
  12. 12

    Improving performance of X-rated video classification with the optimized repeated curve-like spectrum feature and the skip-and-analysis processing by Lim, Jae-Deok, Kim, Jeong-Nyeo, Jung, Young-Giu, Yoon, Young-Doo, Lee, Cheol-Hoon

    Published in Multimedia tools and applications (01-07-2014)
    “…This paper addresses the automatic classification of X-rated videos by analyzing its obscene sounds. In this paper, we propose the optimized repeated…”
    Get full text
    Journal Article
  13. 13

    Screening and Characterization of an Esterase from a Metagenomic Library by Jeong Nyeo Kim, Myung Ji Seo, Eun Ah Cho, Sang Jae Lee, Seong Bo Kim, Chan Ick Cheigh, Yu Ryang Pyun

    Published in Journal of microbiology and biotechnology (01-11-2005)
    “…A metagenomic library was constructed using a fosmid vector, and total genomic DNA was extracted directly from soil at Cisolok (hot spring area, Indonesia)…”
    Get full text
    Journal Article
  14. 14

    StackGuard+$ ext{StackGuard}^+$: Interoperable alternative to canary‐based protection of stack smashing by Kangmin Kim, JeongNyeo Kim, Seungkwang Lee

    Published in Electronics letters (01-10-2024)
    “…Abstract This paper introduces a novel software‐based approach to enhancing stack smashing protection in C/C++ applications, specifically targeting…”
    Get full text
    Journal Article
  15. 15

    StackGuard+$\text{StackGuard}^+$: Interoperable alternative to canary‐based protection of stack smashing by Kim, Kangmin, Kim, JeongNyeo, Lee, Seungkwang

    Published in Electronics letters (01-10-2024)
    “…This paper introduces a novel software‐based approach to enhancing stack smashing protection in C/C++ applications, specifically targeting return‐oriented…”
    Get full text
    Journal Article
  16. 16

    Protection method from APP repackaging attack on mobile device with separated domain by Yun-kyung Lee, Jae-deok Lim, Yong-sung Jeon, Jeong-nyeo Kim

    “…Hacking method of decomposing a well-known apps, reverse engineering, inserting malicious code, repackaging of it, and then redistributing it accounts for the…”
    Get full text
    Conference Proceeding
  17. 17

    Purification and Characterization of a Novel Extracellular Alkaline Phytase from Aeromonas sp by Myung Ji Seo, Jeong Nyeo Kim, Eun Ah Cho, Hoon Park, Hak Jong Choi, Yu Ryang Pyun

    Published in Journal of microbiology and biotechnology (30-08-2005)
    “…A phytase from Aeromonas sp. LIK 1-5 was partially purified by ammonium sulfate precipitation and DEAE-Sephacel column chromatography. Its molecular weight was…”
    Get full text
    Journal Article
  18. 18

    A secure fingerprint template generation algorithm for smart card by Daesung Moon, Seung-Hoon Chae, Jeong-Nyeo Kim

    “…This paper represents a method for generating a fingerprint template for smart card. Especially, to enhance the security of the stored template, we propose a…”
    Get full text
    Conference Proceeding
  19. 19

    Hierarchical Access Control for SDP-IoT by Lee, Yun-kyung, Kim, Jeong-nyeo

    “…In this paper, we describe how to apply the SDP protocol to IoT networks (let's refer to it as SDP-IoT) to defend against DDoS(Distributed Denial of Service)…”
    Get full text
    Conference Proceeding
  20. 20

    IoT standard platform architecture that provides defense against DDoS attacks by Lee, Yun-kyung, Kim, Young-ho, Kim, Jeong-nyeo

    “…IoT devices have evolved with the goal of becoming more connected. However, for security it is necessary to reduce the attack surface by allowing only…”
    Get full text
    Conference Proceeding