Jongsub Moon

Orcid: 0000-0002-6457-4316

According to our database1, Jongsub Moon authored at least 47 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing.
IEEE Access, 2023

2022
Dr.PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search.
Neural Comput. Appl., 2022

A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment.
Comput. Methods Programs Biomed., 2022

2020
Recurrent GANs Password Cracker For IoT Password Security Enhancement.
Sensors, 2020

Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences.
Inf. Sci., 2020

2019
A New Password Cracking Model with Generative Adversarial Networks.
Proceedings of the Information Security Applications - 20th International Conference, 2019

2018
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants.
J. Supercomput., 2018

2016
A novel secure architecture of the virtualized server system.
J. Supercomput., 2016

A new approach to deploying private mobile network exploits.
J. Supercomput., 2016

2014
A novel approach to detection of mobile rogue access points.
Secur. Commun. Networks, 2014

Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards.
Int. J. Distributed Sens. Networks, 2014

2013
Dynamic learning model update of hybrid-classifiers for intrusion detection.
J. Supercomput., 2013

A security model for IPTV with one-time password and Conditional Access System for smart mobile platform.
Telecommun. Syst., 2013

Power dissipation and area comparison of 512-bit and 1024-bit key AES.
Comput. Math. Appl., 2013

2012
A novel method for SQL injection attack detection based on removing SQL query attribute values.
Math. Comput. Model., 2012

A photographic forensic case study: Myths, principles and techniques.
Math. Comput. Model., 2012

2011
A Network Data Abstraction Method for Data Set Verification.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

A Distributed and Dynamic System for Detecting Malware.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data.
Simul. Model. Pract. Theory, 2010

2009
Study of fuzzy clustering methods for malicious codes using native API call frequency.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Visualization of network components for attack analysis.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

An effective denial of service detection method using kernel based data.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

2007
A hybrid machine learning approach to network anomaly detection.
Inf. Sci., 2007

Verification method of network simulation for pervasive environments.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

2006
Applying genetic algorithm for classifying anomalous TCP/IP packets.
Neurocomputing, 2006

Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

SVM Approach with a Genetic Algorithm for Network Intrusion Detection.
Proceedings of the Computer and Information Sciences, 2005

SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A New DDoS Detection Model Using Multiple SVMs and TRA.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

PPF Model with CTNT to Defend Web Server from DDoS Attack.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A New Approach to Detect DDoS Attacks using Support Vector Machine.
Proceedings of the New Trends in Computer Networks, 2005

2004
Patch Management System for Multi-platform Environment.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing.
Proceedings of the Computer and Information Sciences, 2004

Effciency Evaluation for Key Distribution Models in Satellite Terminals.
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004

Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments.
Proceedings of the Grid and Cooperative Computing, 2004

Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Support Vector Machine Based ICMP Covert Channel Attack Detection.
Proceedings of the Computer Network Security, 2003

Covert Channel Detection in the ICMP Payload Using Support Vector Machine.
Proceedings of the Computer and Information Sciences, 2003

A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003

2002
Automatic generation of structured hyperdocuments from document images.
Pattern Recognit., 2002

2001
A 2-D HMM Method for Offline Handwritten Character Recognition.
Int. J. Pattern Recognit. Artif. Intell., 2001

Design of GBSB Neural Network Using Solution Space Parameterization and Optimization Approach.
Int. J. Fuzzy Log. Intell. Syst., 2001


  Loading...