Jin-Hee Cho
According to our database1,
Jin-Hee Cho
authored at least 126 papers
between 2006 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2021
ACM Trans. Intell. Syst. Technol., 2021
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey.
CoRR, 2021
Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats.
CoRR, 2021
2020
IEEE Trans. Netw. Serv. Manag., 2020
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems.
IEEE Trans. Netw. Serv. Manag., 2020
J. Netw. Comput. Appl., 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception.
CoRR, 2020
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey.
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
Comput. J., 2020
Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020
Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
ACM Trans. Soc. Comput., 2019
IEEE Trans. Netw. Serv. Manag., 2019
CoRR, 2019
Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things.
CoRR, 2019
BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems.
IEEE Access, 2019
IEEE Access, 2019
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Poster: Address Shuffling based Moving Target Defense for In-Vehicle Software-Defined Networks.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the Thirteenth International Conference on Web and Social Media, 2019
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 22th International Conference on Information Fusion, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019
2018
IEEE Trans. Serv. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Comput. Soc. Syst., 2018
SAFE: Secure Appliance Scheduling for Flexible and Efficient Energy Consumption for Smart Home IoT.
IEEE Internet Things J., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 International Workshop on Secure Internet of Things, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Uncertainty-Based Opinion Inference on Network Data Using Graph Convolutional Neural Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
A 1.2V 64Gb 341GB/S HBM2 stacked DRAM with spiral point-to-point TSV structure and improved bank group data control.
Proceedings of the 2018 IEEE International Solid-State Circuits Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the IEEE International Conference on Data Mining, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2018
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018
Proceedings of the IEEE International Conference on Big Data, 2018
2017
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks.
IEEE Trans. Serv. Comput., 2017
Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks.
IEEE Trans. Netw. Serv. Manag., 2017
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Modeling and Analysis of Uncertainty-Based False Information Propagation in Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE International Conference on Big Data, 2017
2016
Ad Hoc Networks, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 International Conference on Cyber Conflict, 2016
Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2016
2015
Tradeoffs Between Trust and Survivability for Mission Effectiveness in Tactical Networks.
IEEE Trans. Cybern., 2015
A 1.2 V 8 Gb 8-Channel 128 GB/s High-Bandwidth Memory (HBM) Stacked DRAM With Effective I/O Test Circuits.
IEEE J. Solid State Circuits, 2015
Comput. Math. Organ. Theory, 2015
On modeling of adversary behavior and defense for survivability of military MANET applications.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015
ComTrustO: Composite trust-based ontology framework for information and decision fusion.
Proceedings of the 18th International Conference on Information Fusion, 2015
2014
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing.
IEEE Trans. Parallel Distributed Syst., 2014
Trust management in mobile ad hoc networks for bias minimization and application performance maximization.
Ad Hoc Networks, 2014
An exact measurement and repair circuit of TSV connections for 128GB/s high-bandwidth memory(HBM) stacked DRAM.
Proceedings of the Symposium on VLSI Circuits, 2014
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014
25.3 A 1.35V 5.0Gb/s/pin GDDR5M with 5.4mW standby power and an error-adaptive duty-cycle corrector.
Proceedings of the 2014 IEEE International Conference on Solid-State Circuits Conference, 2014
Proceedings of the 17th International Conference on Information Fusion, 2014
A Model of Trust, Moods, and Emotions in Multiagent Systems and its Empirical Evaluation.
Proceedings of the 17th International Workshop on Trust in Agent Societies co-located with the 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2014), 2014
2013
Ad Hoc Networks, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives.
Proceedings of the 32th IEEE Military Communications Conference, 2013
Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013
Integrated social and quality of service trust management of mobile groups in ad hoc networks.
Proceedings of the 9th International Conference on Information, 2013
2012
Wirel. Pers. Commun., 2012
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection.
IEEE Trans. Netw. Serv. Manag., 2012
A 1.0-ns/1.0-V Delay-Locked Loop With Racing Mode and Countered CAS Latency Controller for DRAM Interfaces.
IEEE J. Solid State Circuits, 2012
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks.
J. Netw. Comput. Appl., 2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
2011
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems.
Wirel. Pers. Commun., 2011
Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks.
Perform. Evaluation, 2011
IEEE Commun. Surv. Tutorials, 2011
Hierarchical trust management for wireless sensor networks and its application to trust-based routing.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Evaluation of network trust using provenance based on distributed local intelligence.
Proceedings of the MILCOM 2011, 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks.
Wirel. Networks, 2010
Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks.
IEEE Trans. Reliab., 2010
Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
Proceedings of the Global Communications Conference, 2010
2009
Int. J. Fuzzy Log. Intell. Syst., 2009
Performance analysis of distributed intrusion detection protocols for mobile group communication systems.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks.
PhD thesis, 2008
Wirel. Networks, 2008
Performance optimization of region-based group key management in mobile ad hoc networks.
Perform. Evaluation, 2008
Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008
Effect of intrusion detection on secure group communications in hierarchically structured group architectures.
Proceedings of the LCN 2008, 2008
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2006
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006
Organization of Embedded System Development Methodology for Developing Product Family.
Proceedings of the IASTED International Conference on Software Engineering, 2006