Yoon-chan Jhi

According to our database1, Yoon-chan Jhi authored at least 14 papers between 2001 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015

2012
A first step towards algorithm plagiarism detection.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

2011
SAS: semantics aware signature generation for polymorphic worm detection.
Int. J. Inf. Sec., 2011

Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

PWC: a proactive worm containment solution for enterprise networks.
Security and Communication Networks, 2010

SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection.
Proceedings of the Security and Privacy in Communication Networks, 2010

2009
Behavior based software theft detection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Detecting Software Theft via System Call Based Birthmarks.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Protecting web services from remote exploit code: a static analysis approach.
Proceedings of the 17th International Conference on World Wide Web, 2008

STILL: Exploit Code Detection via Static Taint and Initialization Analyses.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Evaluation of Collaborative Worm Containments on DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

PWC: A proactive worm containment solution for enterprise networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2001
A Prolog Tailoring Technique on an Epilog Tailored Procedure.
Proceedings of the Perspectives of System Informatics, 2001


  Loading...