Sunoh Choi

According to our database1, Sunoh Choi authored at least 16 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Attention-Based Automated Feature Extraction for Malware Analysis.
Sensors, 2020

2018
Similarity Hash Index.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2017
Malware detection using malware image and deep learning.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

2016
A forensically robust data acquisition from a 10G line-rate network.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

Hierarchical network signature clustering and generation.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

Traffic storing and related information generation system for cyber attack analysis.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Transmitted file extraction and reconstruction from network packets.
Proceedings of the 2015 World Congress on Internet Security, 2015

Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

2014
Secure kNN Query Processing in Untrusted Cloud Environments.
IEEE Trans. Knowl. Data Eng., 2014

Secure mutual proximity zone enclosure evaluation.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

2013
Secure and resilient proximity-based access control.
Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare, 2013

2012
Authenticated Top-K Aggregation in Distributed and Outsourced Databases.
Proceedings of the 2012 International Conference on Privacy, 2012

Secure sensor network SUM aggregation with detection of malicious nodes.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2010
A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

2009
Energy efficient Network Mobility under Scatternet/WLAN coexistence.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

2007
Efficient MD Coding Core Selection to Reduce the Bandwidth Consumption.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007


  Loading...