default search action
Jongsub Moon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Gyeongtaek Choi, Seungho Jeon, Jaeik Cho, Jongsub Moon:
A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing. IEEE Access 11: 2048-2057 (2023) - 2022
- [j20]Seungho Jeon, Chobyeol Shin, Eunnarae Ko, Jongsub Moon:
A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment. Comput. Methods Programs Biomed. 226: 107159 (2022) - [j19]Seungho Jeon, Jongsub Moon:
Dr.PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search. Neural Comput. Appl. 34(13): 10731-10750 (2022) - 2020
- [j18]Seungho Jeon, Jongsub Moon:
Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences. Inf. Sci. 535: 1-15 (2020) - [j17]Sungyup Nam, Seungho Jeon, Hongkyo Kim, Jongsub Moon:
Recurrent GANs Password Cracker For IoT Password Security Enhancement. Sensors 20(11): 3106 (2020)
2010 – 2019
- 2019
- [c25]Sungyup Nam, Seungho Jeon, Jongsub Moon:
A New Password Cracking Model with Generative Adversarial Networks. WISA 2019: 247-258 - 2018
- [j16]Manhyun Chung, Woo-Geun Ahn, Byung-gil Min, Jungtaek Seo, Jongsub Moon:
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants. J. Supercomput. 74(3): 1378-1393 (2018) - 2016
- [j15]Sang-Kon Kim, Seung-Young Ma, Jongsub Moon:
A novel secure architecture of the virtualized server system. J. Supercomput. 72(1): 24-37 (2016) - [j14]Eunyoung Kim, Jongsub Moon:
A new approach to deploying private mobile network exploits. J. Supercomput. 72(1): 46-57 (2016) - 2014
- [j13]Jae Deok Ji, Dong-Guk Han, Seok Won Jung, Sangjin Lee, Jongsub Moon:
Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards. Int. J. Distributed Sens. Networks 10 (2014) - [j12]I Luk Kim, Jung-Taek Seo, Taeshik Shon, Jongsub Moon:
A novel approach to detection of mobile rogue access points. Secur. Commun. Networks 7(10): 1510-1516 (2014) - 2013
- [j11]Jaeik Cho, Setiawan Soekamtoputra, Ken Choi, Jongsub Moon:
Power dissipation and area comparison of 512-bit and 1024-bit key AES. Comput. Math. Appl. 65(9): 1378-1383 (2013) - [j10]Manhyun Chung, Younghoon Lee, Taeshik Shon, Jongsub Moon:
A security model for IPTV with one-time password and Conditional Access System for smart mobile platform. Telecommun. Syst. 52(2): 1399-1407 (2013) - [j9]Jaeik Cho, Taeshik Shon, Ken Choi, Jongsub Moon:
Dynamic learning model update of hybrid-classifiers for intrusion detection. J. Supercomput. 64(2): 522-526 (2013) - 2012
- [j8]Hyoung Joong Kim, Soomin Lim, Jongsub Moon, Boram Kim, Eui S. Jung:
A photographic forensic case study: Myths, principles and techniques. Math. Comput. Model. 55(1-2): 3-11 (2012) - [j7]Inyong Lee, Soonki Jeong, Sang-Soo Yeo, Jongsub Moon:
A novel method for SQL injection attack detection based on removing SQL query attribute values. Math. Comput. Model. 55(1-2): 58-68 (2012) - 2011
- [c24]Hwasu Shin, Jongsub Moon, Manhyun Chung:
A Distributed and Dynamic System for Detecting Malware. AINA Workshops 2011: 783-788 - [c23]Jaeik Cho, Kyuwon Choi, Taeshik Shon, Jongsub Moon:
A Network Data Abstraction Method for Data Set Verification. STA 2011: 54-62 - 2010
- [j6]Jaeik Cho, Changhoon Lee, Sang Hyun Cho, Jung Hwan Song, Jongin Lim, Jongsub Moon:
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data. Simul. Model. Pract. Theory 18(4): 431-435 (2010)
2000 – 2009
- 2009
- [c22]Hoin Kim, Inyong Lee, Jaeik Cho, Jongsub Moon:
Visualization of network components for attack analysis. CICS 2009: 1-8 - [c21]Manhyun Chung, Jaeik Cho, Jongsub Moon:
An effective denial of service detection method using kernel based data. CICS 2009: 9-12 - [c20]Ochul Kwon, Seongjae Bae, Jaeik Cho, Jongsub Moon:
Study of fuzzy clustering methods for malicious codes using native API call frequency. CICS 2009: 24-29 - 2008
- [c19]Sooyoung Chae, Hosub Lee, Jaeik Cho, Manhyun Jung, Jongin Lim, Jongsub Moon:
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. WISA 2008: 190-200 - 2007
- [j5]Taeshik Shon, Jongsub Moon:
A hybrid machine learning approach to network anomaly detection. Inf. Sci. 177(18): 3799-3821 (2007) - [c18]Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon:
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. ICIC (1) 2007: 646-655 - [c17]Kyuhyung Cho, Jongsung Lee, Jongin Lim, Jongsub Moon:
Verification method of network simulation for pervasive environments. SecureComm 2007: 155-161 - 2006
- [j4]Taeshik Shon, Xeno Kovah, Jongsub Moon:
Applying genetic algorithm for classifying anomalous TCP/IP packets. Neurocomputing 69(16-18): 2429-2433 (2006) - [c16]Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon:
Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. FSKD 2006: 716-724 - 2005
- [c15]Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon:
A New DDoS Detection Model Using Multiple SVMs and TRA. EUC Workshops 2005: 976-985 - [c14]Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon:
PPF Model with CTNT to Defend Web Server from DDoS Attack. EUC Workshops 2005: 986-995 - [c13]Jongho Kim, Jaeik Cho, Jongsub Moon:
Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection. GCC 2005: 25-34 - [c12]Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon:
SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. GCC 2005: 59-70 - [c11]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
SVM Approach with a Genetic Algorithm for Network Intrusion Detection. ISCIS 2005: 224-233 - [c10]Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon:
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. NPC 2005: 351-354 - [p1]Jungtaek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon:
A New Approach to Detect DDoS Attacks using Support Vector Machine. New Trends in Computer Networks 2005 - 2004
- [c9]Jung-Taek Seo, Cheolho Lee, Jongsub Moon:
Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. GCC Workshops 2004: 390-397 - [c8]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments. GCC 2004: 891-894 - [c7]Taeshik Shon, Jongsub Moon, HongMin Choi:
Effciency Evaluation for Key Distribution Models in Satellite Terminals. INTELLCOMM 2004: 92-99 - [c6]Jongsub Moon, Taeshik Shon, Jung-Taek Seo, Jongho Kim, Jungwoo Seo:
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing. ISCIS 2004: 351-362 - [c5]Jung-Taek Seo, Dae-Sik Choi, Eung Ki Park, Taeshik Shon, Jongsub Moon:
Patch Management System for Multi-platform Environment. PDCAT 2004: 654-661 - 2003
- [c4]Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo:
Safe Patch Distribution Architecture in Intranet Environments. Security and Management 2003: 455-460 - [c3]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. ICICS 2003: 313-324 - [c2]Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim:
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835 - [c1]Taeshik Shon, Taewoo Noh, Jongsub Moon:
Support Vector Machine Based ICMP Covert Channel Attack Detection. MMM-ACNS 2003: 461-464 - 2002
- [j3]Ji-Yeon Lee, Jeong-Seon Park, Hyeran Byun, Jongsub Moon, Seong-Whan Lee:
Automatic generation of structured hyperdocuments from document images. Pattern Recognit. 35(2): 485-503 (2002) - 2001
- [j2]Hyuk Cho, Younghee Im, Jooyoung Park, Jongsub Moon, Daihee Park:
Design of GBSB Neural Network Using Solution Space Parameterization and Optimization Approach. Int. J. Fuzzy Log. Intell. Syst. 1(1): 35-43 (2001) - [j1]Hee-Seon Park, Bong-Kee Sin, Jongsub Moon, Seong-Whan Lee:
A 2-D HMM Method for Offline Handwritten Character Recognition. Int. J. Pattern Recognit. Artif. Intell. 15(1): 91-105 (2001)
Coauthor Index
aka: Jungtaek Seo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint