Jongsub Moon
Orcid: 0000-0002-6457-4316
  According to our database1,
  Jongsub Moon
  authored at least 47 papers
  between 2001 and 2023.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2023
A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing.
    
  
    IEEE Access, 2023
    
  
  2022
Dr.PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search.
    
  
    Neural Comput. Appl., 2022
    
  
A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment.
    
  
    Comput. Methods Programs Biomed., 2022
    
  
  2020
Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences.
    
  
    Inf. Sci., 2020
    
  
  2019
    Proceedings of the Information Security Applications - 20th International Conference, 2019
    
  
  2018
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants.
    
  
    J. Supercomput., 2018
    
  
  2016
  2014
    Secur. Commun. Networks, 2014
    
  
    Int. J. Distributed Sens. Networks, 2014
    
  
  2013
    J. Supercomput., 2013
    
  
A security model for IPTV with one-time password and Conditional Access System for smart mobile platform.
    
  
    Telecommun. Syst., 2013
    
  
    Comput. Math. Appl., 2013
    
  
  2012
A novel method for SQL injection attack detection based on removing SQL query attribute values.
    
  
    Math. Comput. Model., 2012
    
  
    Math. Comput. Model., 2012
    
  
  2011
    Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
    
  
    Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
    
  
  2010
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data.
    
  
    Simul. Model. Pract. Theory, 2010
    
  
  2009
Study of fuzzy clustering methods for malicious codes using native API call frequency.
    
  
    Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
    
  
    Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
    
  
    Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
    
  
  2008
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.
    
  
    Proceedings of the Information Security Applications, 9th International Workshop, 2008
    
  
  2007
    Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
    
  
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.
    
  
    Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
    
  
  2006
    Neurocomputing, 2006
    
  
Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.
    
  
    Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006
    
  
  2005
    Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
    
  
    Proceedings of the Computer and Information Sciences, 2005
    
  
    Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
    
  
Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection.
    
  
    Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
    
  
    Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
    
  
    Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
    
  
    Proceedings of the New Trends in Computer Networks, 2005
    
  
  2004
    Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
    
  
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing.
    
  
    Proceedings of the Computer and Information Sciences, 2004
    
  
    Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004
    
  
    Proceedings of the Grid and Cooperative Computing, 2004
    
  
    Proceedings of the Grid and Cooperative Computing, 2004
    
  
  2003
    Proceedings of the Computer Network Security, 2003
    
  
    Proceedings of the Computer and Information Sciences, 2003
    
  
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
    
  
    Proceedings of the Information and Communications Security, 5th International Conference, 2003
    
  
Safe Patch Distribution Architecture in Intranet Environments.
  
    Proceedings of the International Conference on Security and Management, 2003
    
  
  2002
    Pattern Recognit., 2002
    
  
  2001
    Int. J. Pattern Recognit. Artif. Intell., 2001
    
  
Design of GBSB Neural Network Using Solution Space Parameterization and Optimization Approach.
    
  
    Int. J. Fuzzy Log. Intell. Syst., 2001