Seguir
JUSOP CHOI
JUSOP CHOI
Dirección de correo verificada de skku.edu
Título
Citado por
Citado por
Año
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
J Choi, J Yu, S Hyun, H Kim
Digital Investigation 28, S50-S59, 2019
432019
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
202019
Forensic analysis of the backup database file in KakaoTalk messenger
J Choi, J Park, H Kim
2017 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2017
182017
COAT: Code obfuscation tool to evaluate the performance of code plagiarism detection tools
S Ko, J Choi, H Kim
2017 International conference on software security and assurance (ICSSA), 32-37, 2017
152017
AMVG: Adaptive malware variant generation framework using machine learning
J Choi, D Shin, H Kim, J Seotis, JB Hong
2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing …, 2019
112019
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System
J Choi, T Oh, W Aiken, SS Woo, H Kim
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
102018
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 1962, 2020
82020
Bypassing the integrity checking of rights objects in OMA DRM: A case study with the MelOn music service
J Choi, W Aiken, J Ryoo, H Kim
Proceedings of the 10th International Conference on Ubiquitous Information …, 2016
72016
Attack of the Clones: Measuring the Maintainability, Originality and Security of Bitcoin'Forks' in the Wild
J Choi, W Choi, W Aiken, H Kim, JH Huh, T Kim, Y Kim, R Anderson
arXiv preprint arXiv:2201.08678, 2022
62022
FUMVar: a practical framework for generating Fully-working and Unseen Malware Variants
B Jin, J Choi, H Kim, JB Hong
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1656-1663, 2021
62021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–10