Ju-Yeon Jo

According to our database1, Ju-Yeon Jo authored at least 47 papers between 1996 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

MPTCP Performance Simulation in Multiple LEO Satellite Environment.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

DER Communication Networks and Their Security Issues.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency Subflow.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
A Secure Communication Method for CANBus.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

A Divide and Conquer method with Semi-Global Failover for Software Defined Networks.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Proportional Fair Secondary Receiver Selection Algorithm for Full-duplex WLAN.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020

Secure IoT Data Management in a Private Ethereum Blockchain.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

A Framework for Decentralized Private Random State Generation and Maintenance for Multiplayer Gaming Over Blockchain.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Hadoop Performance Analysis Model with Deep Data Locality.
Inf., 2019

Implementation of a Blockchain-Based Event Reselling System.
Proceedings of the 6th International Conference on Computational Science/Intelligence and Applied Informatics, 2019

Survey of Data Locality in Apache Hadoop.
Proceedings of the 2019 IEEE International Conference on Big Data, 2019

2018
Dynamically Adjusting the Mining Capacity in Cryptocurrency with Binary Blockchain.
Int. J. Networked Distributed Comput., 2018

TCP-GEN Framework to Achieve High Performance for HAIPE-Encrypted TCP Traffic in a Satellite Communication Environment.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Key based Deep Data Locality on Hadoop.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2016
Big Data Analysis with Hadoop on Personalized Incentive Model with Statistical Hotel Customer Data.
Int. J. Softw. Innov., 2016

Performance Improvement of MapReduce Process by Promoting Deep Data Locality.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

Text mining for security threat detection discovering hidden information in unstructured log messages.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Restful Web Service and Web-Based Data Visualization for Environmental Monitoring.
Int. J. Softw. Innov., 2015

Quantifying security risk by measuring network risk conditions.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

Method for secure RESTful web service.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
Issues in Efficiency for Distributed and Networking Systems.
Int. J. Networked Distributed Comput., 2014

Performance testing of web-based data visualization.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Mindmetrics: Identifying users without their login IDs.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Application of NTRU Cryptographic Algorithm for SCADA Security.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

A Framework for Environmental Monitoring with Arduino-Based Sensors Using Restful Web Service.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2012
The energy saving strategy using the network coding in the wireless mesh network.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
SignatureCheck: a protocol to detect man-in-the-middle attack in SSL.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2009
EECCR: An Energy-Efficient -Coverage and -Connectivity Routing Algorithm Under Border Effects in Heterogeneous Sensor Networks.
IEEE Trans. Veh. Technol., 2009

HTSMA: A Hybrid Temporal-Spatial Multi-Channel Assignment Scheme in Heterogeneous Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Baseline Profile Stability for Network Anomaly Detection.
Int. J. Netw. Secur., 2008

ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks.
Comput. Commun., 2008

EECCP: an energy-efficient coverage- and connectivity preserving algorithm under border effects in wireless sensor networks.
Proceedings of the Wireless Telecommunications Symposium, 2008

2007
A Parallel Scheduler Based on Acyclic Stable Matching.
Int. J. Comput. Their Appl., 2007

Phish Phactors: Offensive and Defensive Strategies.
Adv. Comput., 2007

IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography.
Proceedings of IEEE International Conference on Communications, 2007

2006
An Efficient Defense against Distributed Denial-of-Service Attacks using Congestion Path Marking.
Proceedings of IEEE International Conference on Communications, 2006

2005
Icon Language-Based Auxiliary Communication System Interface for Language Disorders.
Proceedings of the Advances in Multimedia Information Systems, 11th International Workshop, 2005

2004
Hash-based Internet Traffic Load Balancing.
Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004

2003
High-speed router filter for blocking TCP flooding under DDoS attack.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Defeating distributed denial-of-service attack with deterministic bit marking.
Proceedings of the Global Telecommunications Conference, 2003

1997
Advances in agile manufacturing.
Proceedings of the 1997 IEEE International Conference on Robotics and Automation, 1997

A flexible software architecture for agile manufacturing.
Proceedings of the 1997 IEEE International Conference on Robotics and Automation, 1997

Virtual testing of agile manufacturing software using 3D graphical simulation.
Proceedings of the 1997 IEEE International Conference on Robotics and Automation, 1997

A New Role of Graphical Simulation: Software Testing.
Proceedings of the Proceedings 30st Annual Simulation Symposium (SS '97), April 7-9, 1997, 1997

1996
Design of an agile manufacturing workcell for light mechanical applications.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996


  Loading...