Jaeik Cho

Orcid: 0000-0001-6665-8604

According to our database1, Jaeik Cho authored at least 20 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Compact Single-Ended Transceivers Demonstrating Flexible Generation of 1/N-Rate Receiver Front-Ends for Short-Reach Links.
IEEE Trans. Circuits Syst. I Regul. Pap., January, 2024

2023
A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing.
IEEE Access, 2023

2022
A Layout Generator of Latch, Flip-Flop, and Shift Register for High-Speed Links.
Proceedings of the 19th International SoC Design Conference, 2022

2020
Smart seed selection-based effective black box fuzzing for IIoT protocol.
J. Supercomput., 2020

Low Power Approximate Multiplier Using Error Tolerant Adder.
Proceedings of the International SoC Design Conference, 2020

2018
Editorial of special section on enabling technologies for industrial and smart sensor internet of things systems.
J. Supercomput., 2018

A Reliability Comparison Method for OSINT Validity Analysis.
IEEE Trans. Ind. Informatics, 2018

2016
Guest Editorial: Information and Communication Security in Multimedia Applications.
Multim. Tools Appl., 2016

2014
Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction.
Mob. Networks Appl., 2014

2013
Dynamic learning model update of hybrid-classifiers for intrusion detection.
J. Supercomput., 2013

A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
Mob. Networks Appl., 2013

Power dissipation and area comparison of 512-bit and 1024-bit key AES.
Comput. Math. Appl., 2013

2011
A Network Data Abstraction Method for Data Set Verification.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2010
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data.
Simul. Model. Pract. Theory, 2010

2009
Study of fuzzy clustering methods for malicious codes using native API call frequency.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Visualization of network components for attack analysis.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

An effective denial of service detection method using kernel based data.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

2005
Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005


  Loading...