Daesung Moon

Orcid: 0000-0002-9961-0401

According to our database1, Daesung Moon authored at least 59 papers between 2002 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability.
IEICE Trans. Inf. Syst., November, 2022

2020
Long-Term Evolution Vulnerability Focusing on System Information Block Messages.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

2019
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions.
J. Supercomput., 2019

A semantic approach to improving machine readability of a large-scale attack graph.
J. Supercomput., 2019

CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN.
IEEE Access, 2019

2018
Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat.
Symmetry, 2018

MTD-Spamguard: a moving target defense-based spammer detection system in social network.
Soft Comput., 2018

A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks.
IEICE Trans. Inf. Syst., 2018

2017
DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks.
J. Supercomput., 2017

Four-joint motion data based posture classification for immersive postural correction system.
Multim. Tools Appl., 2017

DFA-AD: a distributed framework architecture for the detection of advanced persistent threats.
Clust. Comput., 2017

2016
Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing.
Wirel. Pers. Commun., 2016

Host-based intrusion detection system for secure human-centric computing.
J. Supercomput., 2016

RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks.
J. Supercomput., 2016

Small target detection using morphology and modified Gaussian distance function.
Secur. Commun. Networks, 2016

2015
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space.
KSII Trans. Internet Inf. Syst., 2015

2014
MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats.
Symmetry, 2014

Improved cancelable fingerprint templates using minutiae-based functional transform.
Secur. Commun. Networks, 2014

A practical implementation of fuzzy fingerprint vault for smart cards.
J. Intell. Manuf., 2014

Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT.
J. Appl. Math., 2014

Security Enhancement for Smartphone Using Biometrics in Cyber-Physical Systems.
Int. J. Distributed Sens. Networks, 2014

2013
Intelligent video surveillance system using two-factor human information.
Telecommun. Syst., 2013

Improvement of Lung Segmentation Using Volume Data and Linear Equation.
Proceedings of the Information Technology Convergence, 2013

2012
Biometrics Information Protection Using Fuzzy Vault Scheme.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

2011
A Practical Implementation of Fuzzy Fingerprint Vault.
KSII Trans. Internet Inf. Syst., 2011

2010
Recovery of flash memories for reliable mobile storages.
Mob. Inf. Syst., 2010

2009
Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault.
J. Inf. Sci. Eng., 2009

Configurable fuzzy fingerprint vault for Match-on-Card system.
IEICE Electron. Express, 2009

Secure fuzzy fingerprint vault against correlation attack.
IEICE Electron. Express, 2009

Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System.
EURASIP J. Adv. Signal Process., 2009

VLSI Architecture for the Fuzzy Fingerprint Vault with Automatic Alignment Module.
Proceedings of the Communication and Networking, 2009

2008
A fingerprint matching hardware for smart cards.
IEICE Electron. Express, 2008

A fast algorithm for polynomial reconstruction of fuzzy fingerprint vault.
IEICE Electron. Express, 2008

Performance Analysis of Hybrid Fingerprint Matching Methods.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2007
Steganography based Multi-modal Biometrics System.
Int. J. Fuzzy Log. Intell. Syst., 2007

Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Fingerprint Template Protection Using Fuzzy Vault.
Proceedings of the Computational Science and Its Applications, 2007

Using Ontologies to Search Learning Resources.
Proceedings of the Computational Science and Its Applications, 2007

Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Educational Information Search Service Using Ontology.
Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, 2007

2006
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Capacity Planning for Scalable Fingerprint Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A Secure Fingerprint Authentication System on an Untrusted Computing Environment.
Proceedings of the Trust, 2005

Hiding Biometric Data for Secure Transmission.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005

Secure Remote Fingerprint Verification Using Dual Watermarks.
Proceedings of the Digital Rights Management: Technologies, 2005

Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems.
Proceedings of the Image Analysis and Recognition: International Conference, 2004

A Hardware Implementation of Speaker Verification Using Support Vector Machine.
Proceedings of the International Conference on Security and Management, 2004

2003
An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card.
IEEE Trans. Consumer Electron., 2003

Fingerprint-Based Authentication for USB Token Systems.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Implementation of the USB Token System for Fingerprint Verification.
Proceedings of the Image Analysis, 13th Scandinavian Conference, 2003

2002
Fingerprint Verification System Involving Smart Card.
Proceedings of the Information Security and Cryptology, 2002

A Fingerprint Matching Algorithm Using Image Recognition and Fuzzy Control.
Proceedings of the International Conference on Artificial Intelligence, 2002


  Loading...