Jung-Ho Eom

According to our database1, Jung-Ho Eom authored at least 24 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Design of an Integrated Cyber Defense Platform for Communication Network Security of Intelligent Smart Units.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

A Study on the Maintenance of Distributed Lag Model in Time Series Prediction Model.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023

2017
Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017

2015
Dynamic binary analyzer for scanning vulnerabilities with taint analysis.
Multim. Tools Appl., 2015

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology.
KSII Trans. Internet Inf. Syst., 2015

2014
Dangerous Wi-Fi access point: attacks to benign smartphone applications.
Pers. Ubiquitous Comput., 2014

The scheme of 3-level authentication mechanism for preventing internal information leakage.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014

2013
The Methodology for Hardening SCADA Security Using Countermeasure Ordering.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Framework of Static Analyzer for Taint Analysis of Binary Executable File.
Proceedings of the Information Technology Convergence, 2013

Big Data Security Hardening Methodology Using Attributes Relationship.
Proceedings of the International Conference on Information Science and Applications, 2013

The Permission-Based Malicious Behaviors Monitoring Model for the Android OS.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
A Conceptual Study on Knowledge-Based Personal Information Gathering Methods for Conducting Psychological Warfare in Cyberspace.
Proceedings of the Convergence and Hybrid Information Technology, 2012

The Architecture of User-End Client for Mobile Clout Service.
Proceedings of the Convergence and Hybrid Information Technology, 2012

A study on optimization of security function for reducing vulnerabilities in SCADA.
Proceedings of the 2012 International Conference on Cyber Security, 2012

Cyber military strategy for cyberspace superiority in cyber warfare.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2009
A Study on Access Control Model for Context-Aware Workflow.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2007
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007

Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
Modeling Active Cyber Attack for Network Vulnerability Assessment.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management.
Proceedings of the Computational Science and Its Applications, 2006

2005
Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation.
J. Inf. Process. Syst., 2005


  Loading...