Jinchun Choi

Orcid: 0000-0002-6882-2890

According to our database1, Jinchun Choi authored at least 17 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022

Blockchain-Integrated Resilient Distributed Energy Resources Management System.
Proceedings of the IEEE International Conference on Communications, 2022

2021
A network-independent tool-based usable authentication system for Internet of Things devices.
Comput. Secur., 2021

Real-Time Hardware-in-the-Loop Distributed Energy Resources System Testbed using IEEE 2030.5 Standard.
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021

A Cyber Kill Chain Model for Distributed Energy Resources (DER) Aggregation Systems.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2021

2020
Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions.
IEEE Syst. J., 2020

Measuring the Cost of Software Vulnerabilities.
EAI Endorsed Trans. Security Safety, 2020

Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020

2019
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service.
IEEE Trans. Netw. Serv. Manag., 2019

Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach.
IEEE Internet Things J., 2019

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach.
CoRR, 2019

Analyzing Endpoints in the Internet of Things Malware.
CoRR, 2019

Analyzing endpoints in the internet of things malware: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

IoT malware ecosystem in the wild: a glimpse into analysis and exposures.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Graph-Based Comparison of IoT and Android Malware.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

2016
Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016


  Loading...