Jinchun Choi
Title
Cited by
Cited by
Year
Toward characterizing blockchain-based cryptocurrencies for highly accurate predictions
M Saad, J Choi, DH Nyang, J Kim, A Mohaisen
IEEE Systems Journal 14 (1), 321-332, 2019
532019
Analyzing and detecting emerging internet of things malware: A graph-based approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, A Abusnaina, A Awad, ...
IEEE Internet of Things Journal 6 (5), 8977-8988, 2019
362019
Graph-based comparison of IoT and android malware
H Alasmary, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
International Conference on Computational Social Networks, 259-272, 2018
242018
Privacy-preserving palm print authentication using homomorphic encryption
JH Im, JC Choi, DH Nyang, MK Lee
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016
112016
Relaying rogue AP detection scheme using SVM
S Kang, DH Nyang, JC Choi, SJ Lee
Journal of the Korea Institute of Information Security & Cryptology 23 (3 …, 2013
82013
Iot malware ecosystem in the wild: a glimpse into analysis and exposures
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 413-418, 2019
52019
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
H Alasmary, A Khormali, A Anwar, J Park, J Choi, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03955, 2019
52019
Honor Among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets
J Choi, A Abusnaina, A Anwar, A Wang, S Chen, DH Nyang, A Mohaisen
2019 IEEE Conference on Dependable and Secure Computing, 2019
42019
Transparency in the new gTLD era: Evaluating the DNS centralized zone data service
J Park, J Choi, D Nyang, A Mohaisen
IEEE Transactions on Network and Service Management 16 (4), 1782-1796, 2019
32019
A method for generating robust key from face image and user intervention
H Kim, JC Choi, C Jung, DH Nyang, KH Lee
Journal of the Korea Institute of Information Security & Cryptology 27 (5 …, 2017
22017
Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN
JC Choi, J Kang, DH Nyang, KH Lee
The Journal of Korean Institute of Communications and Information Sciences …, 2014
22014
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet
J Choi, M Abuhamad, A Abusnaina, A Anwar, S Alshamrani, J Park, ...
IEEE Access 8, 111368-111380, 2020
12020
Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts
A Anwar, J Choi, A Alabduljabbar, H Alasmary, J Spaulding, A Wang, ...
arXiv preprint arXiv:2103.14217, 2021
2021
Measuring the Cost of Software Vulnerabilities
A Anwar, A Khormali, J Choi, H Alasmary, S Choi, S Salem, DH Nyang, ...
EAI Endorsed Transactions on Security and Safety 7 (23), e1, 2020
2020
Endpoints and Interdependencies in Internet of Things Residual Artifacts: Measurements, Analyses, and Insights into Defenses
J Choi
2020
Analyzing endpoints in the internet of things malware: poster
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
2019
Analyzing Endpoints in the Internet of Things Malware
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
arXiv preprint arXiv:1902.03531, 2019
2019
Poster: Analyzing Endpoints in the Internet of Things Malware
J Choi, A Anwar, H Alasmary, J Spaulding, DH Nyang, A Mohaisen
2019
얼굴과 사용자 입력정보를 이용하여 안전한 키를 생성하는 방법
김혜진, 최진춘, 정창훈, 양대헌, 이경희
정보보호학회논문지 27 (5), 1059-1068, 2017
2017
BLE 를 이용한 결제 프로세스에서 Relay Attack 과 대응방안
최진춘, 서승환, 양대헌, 이경희
한국차세대컴퓨팅학회 논문지 11 (4), 25-35, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20