Jun-Won Ho

Orcid: 0000-0003-2070-9861

According to our database1, Jun-Won Ho authored at least 19 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Covert Channel Establishment Through the Dynamic Adaptation of the Sequential Probability Ratio Test to Sensor Data in IoT.
IEEE Access, 2019

2018
Efficient and Robust Detection of Code-Reuse Attacks Through Probabilistic Packet Inspection in Industrial IoT Devices.
IEEE Access, 2018

2017
Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations.
IEEE Access, 2017

POSTER: Covert Channel Based on the Sequential Analysis in Android Systems.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Split-Pipeline Model for Worm Propagation over IoT.
Proceedings of the 6th International Conference on the Internet of Things, 2016

2015
Distributed Software-Attestation Defense against Sensor Worm Propagation.
J. Sensors, 2015

Hop-by-HopWorm Propagation with Carryover Epidemic Model in Mobile Sensor Networks.
Comput., 2015

2013
Robust Detection of Malicious Nodes in Mobile Sensor Networks Using Software Attestation.
Int. J. Distributed Sens. Networks, 2013

2012
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing.
IEEE Trans. Dependable Secur. Comput., 2012

Sequential Hypothesis Testing Based Approach for Replica Cluster Detection in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2012

Distributed detection of mobile malicious node attacks in wireless sensor networks.
Ad Hoc Networks, 2012

2011
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing.
IEEE Trans. Mob. Comput., 2011

A synopsis on node compromise detection in wireless sensor networks using sequential analysis (Invited Review Article).
Comput. Commun., 2011

2009
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks.
Ad Hoc Networks, 2009

ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Zone-Based Trust Management in Sensor Networks.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Distributed Detection of Replica Cluster Attacks in Sensor Networks Using Sequential Analysis.
Proceedings of the 2008 IEEE International Performance, 2008


  Loading...