Euijin Choo

Orcid: 0000-0002-0055-050X

According to our database1, Euijin Choo authored at least 18 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023

2022
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
CoRR, 2022

SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2021
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users.
CoRR, 2020

2019
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019

2018
Analyzing Opinion Spammers' Network Behavior in Online Review Systems.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis.
J. Comput. Secur., 2017

Graphic model analysis of frauds in online consumer reviews.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

2015
Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Identifying Malicious Metering Data in Advanced Metering Infrastructure.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Revealing and incorporating implicit communities to improve recommender systems.
Proceedings of the ACM Conference on Economics and Computation, 2014

COMPARS: toward an empirical approach for comparing the resilience of reputation systems.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2010
Generic unpacking using entropy analysis.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2009
Dynamic multimedia scheduling against Motion based DoS attacks.
Proceedings of the 2009 International Conference on Information Networking, 2009

2007
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007


  Loading...