BibTeX records: DaeHun Nyang

download as .bib file

@inproceedings{DBLP:conf/csonet/ChoiJNM23,
  author       = {Soohyeon Choi and
                  Rhongho Jang and
                  DaeHun Nyang and
                  David Mohaisen},
  editor       = {Minh Ho{\`{a}}ng H{\`{a}} and
                  Xingquan Zhu and
                  My T. Thai},
  title        = {Untargeted Code Authorship Evasion with Seq2Seq Transformation},
  booktitle    = {Computational Data and Social Networks - 12th International Conference,
                  CSoNet 2023, Hanoi, Vietnam, December 11-13, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14479},
  pages        = {83--92},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0669-3\_8},
  doi          = {10.1007/978-981-97-0669-3\_8},
  timestamp    = {Mon, 11 Mar 2024 15:20:45 +0100},
  biburl       = {https://dblp.org/rec/conf/csonet/ChoiJNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/AlkinoonAAJNM23,
  author       = {Mohammed Alkinoon and
                  Abdulrahman Alabduljabbar and
                  Hattan Althebeiti and
                  Rhongho Jang and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Understanding the Security and Performance of the Web Presence of
                  Hospitals: {A} Measurement Study},
  booktitle    = {32nd International Conference on Computer Communications and Networks,
                  {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCN58024.2023.10230186},
  doi          = {10.1109/ICCCN58024.2023.10230186},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/AlkinoonAAJNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChoiMNM23,
  author       = {Soohyeon Choi and
                  Manar Mohaisen and
                  Daehun Nyang and
                  David Mohaisen},
  editor       = {Ding Wang and
                  Moti Yung and
                  Zheli Liu and
                  Xiaofeng Chen},
  title        = {Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial
                  Dynamics from {VR} Motion Sensors},
  booktitle    = {Information and Communications Security - 25th International Conference,
                  {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  pages        = {399--417},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7356-9\_24},
  doi          = {10.1007/978-981-99-7356-9\_24},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ChoiMNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KimJJMN23,
  author       = {Sian Kim and
                  Changhun Jung and
                  RhongHo Jang and
                  David Mohaisen and
                  DaeHun Nyang},
  title        = {A Robust Counting Sketch for Data Plane Intrusion Detection},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/a-robust-counting-sketch-for-data-plane-intrusion-detection/},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/KimJJMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AlthebeitiGANM23,
  author       = {Hattan Althebeiti and
                  Ran Gedawy and
                  Ahod Alghuried and
                  Daehun Nyang and
                  David Mohaisen},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Defending AirType Against Inference Attacks Using 3D In-Air Keyboard
                  Layouts: Design and Evaluation},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_13},
  doi          = {10.1007/978-981-99-8024-6\_13},
  timestamp    = {Thu, 18 Jan 2024 08:27:16 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AlthebeitiGANM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-13255,
  author       = {Mohammed Abuhamad and
                  Changhun Jung and
                  David Mohaisen and
                  DaeHun Nyang},
  title        = {{SHIELD:} Thwarting Code Authorship Attribution},
  journal      = {CoRR},
  volume       = {abs/2304.13255},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.13255},
  doi          = {10.48550/ARXIV.2304.13255},
  eprinttype    = {arXiv},
  eprint       = {2304.13255},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-13255.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-13278,
  author       = {Mohammed Alkinoon and
                  Abdulrahman Alabduljabbar and
                  Hattan Althebeiti and
                  Rhongho Jang and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Understanding the Security and Performance of the Web Presence of
                  Hospitals: {A} Measurement Study},
  journal      = {CoRR},
  volume       = {abs/2304.13278},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.13278},
  doi          = {10.48550/ARXIV.2304.13278},
  eprinttype    = {arXiv},
  eprint       = {2304.13278},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-13278.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-14359,
  author       = {Abdulrahman Alabduljabbar and
                  Runyu Ma and
                  Ahmed Abusnaina and
                  Rhongho Jang and
                  Songqing Chen and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Measuring and Modeling the Free Content Web},
  journal      = {CoRR},
  volume       = {abs/2304.14359},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.14359},
  doi          = {10.48550/ARXIV.2304.14359},
  eprinttype    = {arXiv},
  eprint       = {2304.14359},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-14359.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-15366,
  author       = {Soohyeon Choi and
                  Rhongho Jang and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Untargeted Code Authorship Evasion with Seq2Seq Transformation},
  journal      = {CoRR},
  volume       = {abs/2311.15366},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.15366},
  doi          = {10.48550/ARXIV.2311.15366},
  eprinttype    = {arXiv},
  eprint       = {2311.15366},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-15366.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlikhanovJAMNN22,
  author       = {Jumabek Alikhanov and
                  Rhongho Jang and
                  Mohammed Abuhamad and
                  David Mohaisen and
                  Daehun Nyang and
                  Youngtae Noh},
  title        = {Investigating the Effect of Traffic Sampling on Machine Learning-Based
                  Network Intrusion Detection Approaches},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {5801--5823},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2021.3137318},
  doi          = {10.1109/ACCESS.2021.3137318},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlikhanovJAMNN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/OmarCNM22,
  author       = {Marwan Omar and
                  Soohyeon Choi and
                  Daehun Nyang and
                  David Mohaisen},
  title        = {Robust Natural Language Processing: Recent Advances, Challenges, and
                  Future Directions},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {86038--86056},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3197769},
  doi          = {10.1109/ACCESS.2022.3197769},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/OmarCNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcmi/JungAMHN22,
  author       = {Changhun Jung and
                  Mohammed Abuhamad and
                  David Mohaisen and
                  Kyungja Han and
                  DaeHun Nyang},
  title        = {{WBC} image classification and generative models based on convolutional
                  neural network},
  journal      = {{BMC} Medical Imaging},
  volume       = {22},
  number       = {1},
  pages        = {94},
  year         = {2022},
  url          = {https://doi.org/10.1186/s12880-022-00818-1},
  doi          = {10.1186/S12880-022-00818-1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcmi/JungAMHN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChoiAAASWCNAM22,
  author       = {Jinchun Choi and
                  Afsah Anwar and
                  Abdulrahman Alabduljabbar and
                  Hisham Alasmary and
                  Jeffrey Spaulding and
                  An Wang and
                  Songqing Chen and
                  DaeHun Nyang and
                  Amro Awad and
                  David Mohaisen},
  title        = {Understanding Internet of Things malware by analyzing endpoints in
                  their static artifacts},
  journal      = {Comput. Networks},
  volume       = {206},
  pages        = {108768},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.108768},
  doi          = {10.1016/J.COMNET.2022.108768},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChoiAAASWCNAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AlasmaryAAAAWNA22,
  author       = {Hisham Alasmary and
                  Afsah Anwar and
                  Ahmed Abusnaina and
                  Abdulrahman Alabduljabbar and
                  Mohammed Abuhamad and
                  An Wang and
                  Daehun Nyang and
                  Amro Awad and
                  David Mohaisen},
  title        = {ShellCore: Automating Malicious IoT Software Detection Using Shell
                  Commands Representation},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {4},
  pages        = {2485--2496},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3086398},
  doi          = {10.1109/JIOT.2021.3086398},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/AlasmaryAAAAWNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/AhmadSGNM22,
  author       = {Ashar Ahmad and
                  Muhammad Saad and
                  Mohammed A. AlGhamdi and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {BlockTrail: {A} Service for Secure and Transparent Blockchain-Driven
                  Audit Trails},
  journal      = {{IEEE} Syst. J.},
  volume       = {16},
  number       = {1},
  pages        = {1367--1378},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSYST.2021.3097744},
  doi          = {10.1109/JSYST.2021.3097744},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/AhmadSGNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbusnainaAAAJSN22,
  author       = {Ahmed Abusnaina and
                  Mohammed Abuhamad and
                  Hisham Alasmary and
                  Afsah Anwar and
                  Rhongho Jang and
                  Saeed Salem and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {{DL-FHMC:} Deep Learning-Based Fine-Grained Hierarchical Learning
                  Approach for Robust Malware Classification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3432--3447},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3097296},
  doi          = {10.1109/TDSC.2021.3097296},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AbusnainaAAAJSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/JangJMLN22,
  author       = {Rhongho Jang and
                  Changhun Jung and
                  David Mohaisen and
                  KyungHee Lee and
                  DaeHun Nyang},
  title        = {A One-Page Text Entry Method Optimized for Rectangle Smartwatches},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {10},
  pages        = {3443--3454},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2021.3057226},
  doi          = {10.1109/TMC.2021.3057226},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/JangJMLN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JungKJMN22,
  author       = {Changhun Jung and
                  Sian Kim and
                  Rhongho Jang and
                  David Mohaisen and
                  DaeHun Nyang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {A Scalable and Dynamic {ACL} System for In-Network Defense},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1679--1693},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560606},
  doi          = {10.1145/3548606.3560606},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JungKJMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/AlqadhiATSNM22,
  author       = {Mohamed Alqadhi and
                  Abdulrahman Alabduljabbar and
                  Kyle Thomas and
                  Saeed Salem and
                  DaeHun Nyang and
                  David Mohaisen},
  editor       = {Thang N. Dinh and
                  Minming Li},
  title        = {Do Content Management Systems Impact the Security of Free Content
                  Websites?},
  booktitle    = {Computational Data and Social Networks - 11th International Conference,
                  CSoNet 2022, Virtual Event, December 5-7, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13831},
  pages        = {141--154},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26303-3\_13},
  doi          = {10.1007/978-3-031-26303-3\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csonet/AlqadhiATSNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cysss/OmarCNM22,
  author       = {Marwan Omar and
                  Soohyeon Choi and
                  Daehun Nyang and
                  David Mohaisen},
  editor       = {Eric Chan{-}Tin and
                  Shelia Kennison},
  title        = {Quantifying the Performance of Adversarial Training on Language Models
                  with Distribution Shifts},
  booktitle    = {CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity
                  and Social Sciences, Nagasaki, Japan, 30 May 2022},
  pages        = {3--9},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494108.3522764},
  doi          = {10.1145/3494108.3522764},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cysss/OmarCNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/DaoJJMN22,
  author       = {Dinhnguyen Dao and
                  Rhongho Jang and
                  Changhun Jung and
                  David Mohaisen and
                  DaeHun Nyang},
  title        = {Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple
                  Flows},
  booktitle    = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022},
  pages        = {331--342},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSN53405.2022.00042},
  doi          = {10.1109/DSN53405.2022.00042},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/DaoJJMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AbusnainaAAAJNM22,
  author       = {Ahmed Abusnaina and
                  Afsah Anwar and
                  Sultan Alshamrani and
                  Abdulrahman Alabduljabbar and
                  RhongHo Jang and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Systematically Evaluating the Robustness of ML-based IoT Malware Detection
                  Systems},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {308--320},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545960},
  doi          = {10.1145/3545948.3545960},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AbusnainaAAAJNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-00768,
  author       = {Marwan Omar and
                  Soohyeon Choi and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Robust Natural Language Processing: Recent Advances, Challenges, and
                  Future Directions},
  journal      = {CoRR},
  volume       = {abs/2201.00768},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.00768},
  eprinttype    = {arXiv},
  eprint       = {2201.00768},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-00768.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-12083,
  author       = {Mohamed Alqadhi and
                  Abdulrahman Alabduljabbar and
                  Kyle Thomas and
                  Saeed Salem and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Do Content Management Systems Impact the Security of Free Content
                  Websites? {A} Correlation Analysis},
  journal      = {CoRR},
  volume       = {abs/2210.12083},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.12083},
  doi          = {10.48550/ARXIV.2210.12083},
  eprinttype    = {arXiv},
  eprint       = {2210.12083},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-12083.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JungCJMN21,
  author       = {Changhun Jung and
                  Jinchun Choi and
                  Rhongho Jang and
                  David Mohaisen and
                  DaeHun Nyang},
  title        = {A network-independent tool-based usable authentication system for
                  Internet of Things devices},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102338},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102338},
  doi          = {10.1016/J.COSE.2021.102338},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JungCJMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-blc/AhmadASNKM21,
  author       = {Ashar Ahmad and
                  Abdulrahman Alabduljabbar and
                  Muhammad Saad and
                  Daehun Nyang and
                  Joongheon Kim and
                  David Mohaisen},
  title        = {Empirically comparing the performance of blockchain's consensus algorithms},
  journal      = {{IET} Blockchain},
  volume       = {1},
  number       = {1},
  pages        = {56--64},
  year         = {2021},
  url          = {https://doi.org/10.1049/blc2.12007},
  doi          = {10.1049/BLC2.12007},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-blc/AhmadASNKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AbuhamadANM21,
  author       = {Mohammed Abuhamad and
                  Ahmed Abusnaina and
                  Daehun Nyang and
                  David Mohaisen},
  title        = {Sensor-Based Continuous Authentication of Smartphones' Users Using
                  Behavioral Biometrics: {A} Contemporary Survey},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {1},
  pages        = {65--84},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3020076},
  doi          = {10.1109/JIOT.2020.3020076},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/AbuhamadANM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SaadKNM21,
  author       = {Muhammad Saad and
                  Joongheon Kim and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Contra-{\({_\ast}\)}: Mechanisms for countering spam attacks on blockchain's
                  memory pools},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {179},
  pages        = {102971},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2020.102971},
  doi          = {10.1016/J.JNCA.2020.102971},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SaadKNM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BaekJMLN21,
  author       = {SungHa Baek and
                  Youngdon Jung and
                  David Mohaisen and
                  Sungjin Lee and
                  DaeHun Nyang},
  title        = {SSD-Assisted Ransomware Detection and Data Recovery Techniques},
  journal      = {{IEEE} Trans. Computers},
  volume       = {70},
  number       = {10},
  pages        = {1762--1776},
  year         = {2021},
  url          = {https://doi.org/10.1109/TC.2020.3011214},
  doi          = {10.1109/TC.2020.3011214},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/BaekJMLN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbuhamadAMN21,
  author       = {Mohammed Abuhamad and
                  Tamer AbuHmed and
                  David Mohaisen and
                  Daehun Nyang},
  title        = {Large-scale and Robust Code Authorship Identification with Deep Feature
                  Learning},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {23:1--23:35},
  year         = {2021},
  url          = {https://doi.org/10.1145/3461666},
  doi          = {10.1145/3461666},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AbuhamadAMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SaadQRNM21,
  author       = {Muhammad Saad and
                  Zhan Qin and
                  Kui Ren and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {e-PoS: Making Proof-of-Stake Decentralized and Fair},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {32},
  number       = {8},
  pages        = {1961--1973},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPDS.2020.3048853},
  doi          = {10.1109/TPDS.2020.3048853},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/SaadQRNM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AbusnainaAAAJNM21,
  author       = {Ahmed Abusnaina and
                  Afsah Anwar and
                  Sultan Alshamrani and
                  Abdulrahman Alabduljabbar and
                  Rhongho Jang and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Systemically Evaluating the Robustness of ML-based IoT Malware Detectors},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021 - Supplemental
                  Volume},
  pages        = {3--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN-S52858.2021.00012},
  doi          = {10.1109/DSN-S52858.2021.00012},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/AbusnainaAAAJNM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/AhmadSKNM21,
  author       = {Ashar Ahmad and
                  Muhammad Saad and
                  Joongheon Kim and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Performance Evaluation of Consensus Protocols in Blockchain-based
                  Audit Systems},
  booktitle    = {International Conference on Information Networking, {ICOIN} 2021,
                  Jeju Island, South Korea, January 13-16, 2021},
  pages        = {654--656},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICOIN50884.2021.9333867},
  doi          = {10.1109/ICOIN50884.2021.9333867},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/AhmadSKNM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/AlshamraniAANM21,
  author       = {Sultan Alshamrani and
                  Ahmed Abusnaina and
                  Mohammed Abuhamad and
                  Daehun Nyang and
                  David Mohaisen},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {Hate, Obscenity, and Insults: Measuring the Exposure of Children to
                  Inappropriate Comments in YouTube},
  booktitle    = {Companion of The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {508--515},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442442.3452314},
  doi          = {10.1145/3442442.3452314},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/AlshamraniAANM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-00330,
  author       = {Muhammad Saad and
                  Zhan Qin and
                  Kui Ren and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {e-PoS: Making Proof-of-Stake Decentralized and Fair},
  journal      = {CoRR},
  volume       = {abs/2101.00330},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.00330},
  eprinttype    = {arXiv},
  eprint       = {2101.00330},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-00330.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-09050,
  author       = {Sultan Alshamrani and
                  Ahmed Abusnaina and
                  Mohammed Abuhamad and
                  Daehun Nyang and
                  David Mohaisen},
  title        = {Hate, Obscenity, and Insults: Measuring the Exposure of Children to
                  Inappropriate Comments in YouTube},
  journal      = {CoRR},
  volume       = {abs/2103.09050},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.09050},
  eprinttype    = {arXiv},
  eprint       = {2103.09050},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-09050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-14217,
  author       = {Afsah Anwar and
                  Jinchun Choi and
                  Abdulrahman Alabduljabbar and
                  Hisham Alasmary and
                  Jeffrey Spaulding and
                  An Wang and
                  Songqing Chen and
                  DaeHun Nyang and
                  Amro Awad and
                  David Mohaisen},
  title        = {Understanding Internet of Things Malware by Analyzing Endpoints in
                  their Static Artifacts},
  journal      = {CoRR},
  volume       = {abs/2103.14217},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.14217},
  eprinttype    = {arXiv},
  eprint       = {2103.14217},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-14217.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-14221,
  author       = {Hisham Alasmary and
                  Afsah Anwar and
                  Ahmed Abusnaina and
                  Abdulrahman Alabduljabbar and
                  Mohammad Abuhamad and
                  An Wang and
                  DaeHun Nyang and
                  Amro Awad and
                  David Mohaisen},
  title        = {ShellCore: Automating Malicious IoT Software Detection by Using Shell
                  Commands Representation},
  journal      = {CoRR},
  volume       = {abs/2103.14221},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.14221},
  eprinttype    = {arXiv},
  eprint       = {2103.14221},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-14221.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-13373,
  author       = {Ahmed Abusnaina and
                  Afsah Anwar and
                  Sultan Alshamrani and
                  Abdulrahman Alabduljabbar and
                  RhongHo Jang and
                  Daehun Nyang and
                  David Mohaisen},
  title        = {ML-based IoT Malware Detection Under Adversarial Settings: {A} Systematic
                  Evaluation},
  journal      = {CoRR},
  volume       = {abs/2108.13373},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.13373},
  eprinttype    = {arXiv},
  eprint       = {2108.13373},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-13373.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-02759,
  author       = {Sunyoung Kim and
                  Changhun Jung and
                  RhongHo Jang and
                  David Mohaisen and
                  DaeHun Nyang},
  title        = {Count-Less: {A} Counting Sketch for the Data Plane of High Speed Switches},
  journal      = {CoRR},
  volume       = {abs/2111.02759},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.02759},
  eprinttype    = {arXiv},
  eprint       = {2111.02759},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-02759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChoiAAAAPNM20,
  author       = {Jinchun Choi and
                  Mohammed Abuhamad and
                  Ahmed Abusnaina and
                  Afsah Anwar and
                  Sultan Alshamrani and
                  Jeman Park and
                  Daehun Nyang and
                  David Mohaisen},
  title        = {Understanding the Proxy Ecosystem: {A} Comparative Analysis of Residential
                  and Open Proxies on the Internet},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {111368--111380},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3000959},
  doi          = {10.1109/ACCESS.2020.3000959},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChoiAAAAPNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ParkMNM20,
  author       = {Jeman Park and
                  Manar Mohaisen and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Assessing the effectiveness of pulsing denial of service attacks under
                  realistic network synchronization assumptions},
  journal      = {Comput. Networks},
  volume       = {173},
  pages        = {107146},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107146},
  doi          = {10.1016/J.COMNET.2020.107146},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ParkMNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/SaadSNKSNM20,
  author       = {Muhammad Saad and
                  Jeffrey Spaulding and
                  Laurent Njilla and
                  Charles A. Kamhoua and
                  Sachin Shetty and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Exploring the Attack Surface of Blockchain: {A} Comprehensive Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {3},
  pages        = {1977--2008},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2020.2975999},
  doi          = {10.1109/COMST.2020.2975999},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/SaadSNKSNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AbuhamadAMN20,
  author       = {Mohammed Abuhamad and
                  Tamer AbuHmed and
                  David Mohaisen and
                  DaeHun Nyang},
  title        = {AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using
                  Smartphone Sensors},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {6},
  pages        = {5008--5020},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2975779},
  doi          = {10.1109/JIOT.2020.2975779},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/AbuhamadAMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AbuhamadANM20,
  author       = {Mohammed Abuhamad and
                  Tamer AbuHmed and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Multi-{\(\chi\)}: Identifying Multiple Authors from Source Code Files},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {3},
  pages        = {25--41},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0044},
  doi          = {10.2478/POPETS-2020-0044},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/AbuhamadANM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AnwarKCACSNM20,
  author       = {Afsah Anwar and
                  Aminollah Khormali and
                  Jinchun Choi and
                  Hisham Alasmary and
                  Saeed Salem and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Measuring the Cost of Software Vulnerabilities},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {23},
  pages        = {e1},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.164551},
  doi          = {10.4108/EAI.13-7-2018.164551},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/AnwarKCACSNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/SaadCNKM20,
  author       = {Muhammad Saad and
                  Jinchun Choi and
                  DaeHun Nyang and
                  Joongheon Kim and
                  Aziz Mohaisen},
  title        = {Toward Characterizing Blockchain-Based Cryptocurrencies for Highly
                  Accurate Predictions},
  journal      = {{IEEE} Syst. J.},
  volume       = {14},
  number       = {1},
  pages        = {321--332},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSYST.2019.2927707},
  doi          = {10.1109/JSYST.2019.2927707},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/SaadCNKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenGRLKNN20,
  author       = {Aziz Mohaisen and
                  Zhongshu Gu and
                  Kui Ren and
                  Zhenhua Li and
                  Charles A. Kamhoua and
                  Laurent L. Njilla and
                  DaeHun Nyang},
  title        = {Look-Aside at Your Own Risk: Privacy Implications of {DNSSEC} Look-Aside
                  Validation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {745--759},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2816026},
  doi          = {10.1109/TDSC.2018.2816026},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohaisenGRLKNN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/JangKMN20,
  author       = {Rhongho Jang and
                  Jeonil Kang and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  title        = {Catch Me If You Can: Rogue Access Point Detection Using Intentional
                  Channel Interference},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {1056--1071},
  year         = {2020},
  url          = {https://doi.org/10.1109/TMC.2019.2903052},
  doi          = {10.1109/TMC.2019.2903052},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/JangKMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/AlshamraniAALNM20,
  author       = {Sultan Alshamrani and
                  Ahmed Abusnaina and
                  Mohammed Abuhamad and
                  Anho Lee and
                  DaeHun Nyang and
                  David Mohaisen},
  editor       = {Sriram Chellappan and
                  Kim{-}Kwang Raymond Choo and
                  NhatHai Phan},
  title        = {An Analysis of Users Engagement on Twitter During the {COVID-19} Pandemic:
                  Topical Trends and Sentiments},
  booktitle    = {Computational Data and Social Networks - 9th International Conference,
                  CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12575},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66046-8\_7},
  doi          = {10.1007/978-3-030-66046-8\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csonet/AlshamraniAALNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/AlasmaryAJAANM20,
  author       = {Hisham Alasmary and
                  Ahmed Abusnaina and
                  Rhongho Jang and
                  Mohammed Abuhamad and
                  Afsah Anwar and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Soteria: Detecting Adversarial Examples in Control Flow Graph-based
                  Malware Classifiers},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {888--898},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00089},
  doi          = {10.1109/ICDCS47774.2020.00089},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/AlasmaryAJAANM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JangMMMN20,
  author       = {Rhongho Jang and
                  DaeHong Min and
                  Seongkwang Moon and
                  David Mohaisen and
                  DaeHun Nyang},
  title        = {SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020,
                  Toronto, ON, Canada, July 6-9, 2020},
  pages        = {1339--1348},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOM41043.2020.9155252},
  doi          = {10.1109/INFOCOM41043.2020.9155252},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/JangMMMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AbusnainaJKNM20,
  author       = {Ahmed Abusnaina and
                  Rhongho Jang and
                  Aminollah Khormali and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {{DFD:} Adversarial Learning-based Approach to Defend Against Website
                  Fingerprinting},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020,
                  Toronto, ON, Canada, July 6-9, 2020},
  pages        = {2459--2468},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOM41043.2020.9155465},
  doi          = {10.1109/INFOCOM41043.2020.9155465},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/AbusnainaJKNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/KhormaliACNM20,
  author       = {Aminollah Khormali and
                  Ahmed Abusnaina and
                  Songqing Chen and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {From Blue-Sky to Practical Adversarial Learning},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {118--127},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00025},
  doi          = {10.1109/TPS-ISA50397.2020.00025},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/KhormaliACNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AbusnainaANC0M20,
  author       = {Ahmed Abusnaina and
                  Mohammed Abuhamad and
                  DaeHun Nyang and
                  Songqing Chen and
                  An Wang and
                  David Mohaisen},
  editor       = {Ilsun You},
  title        = {Insights into Attacks' Progression: Prediction of Spatio-Temporal
                  Behavior of DDoS Attacks},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {362--374},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_27},
  doi          = {10.1007/978-3-030-65299-9\_27},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AbusnainaANC0M20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-08578,
  author       = {Mohammed Abuhamad and
                  Ahmed Abusnaina and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Sensor-based Continuous Authentication of Smartphones' Users Using
                  Behavioral Biometrics: {A} Survey},
  journal      = {CoRR},
  volume       = {abs/2001.08578},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.08578},
  eprinttype    = {arXiv},
  eprint       = {2001.08578},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-08578.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-04842,
  author       = {Muhammad Saad and
                  Joongheon Kim and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory
                  Pools},
  journal      = {CoRR},
  volume       = {abs/2005.04842},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.04842},
  eprinttype    = {arXiv},
  eprint       = {2005.04842},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-04842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-07145,
  author       = {Ahmed Abusnaina and
                  Mohammed Abuhamad and
                  Hisham Alasmary and
                  Afsah Anwar and
                  Rhongho Jang and
                  Saeed Salem and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {A Deep Learning-based Fine-grained Hierarchical Learning Approach
                  for Robust Malware Classification},
  journal      = {CoRR},
  volume       = {abs/2005.07145},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.07145},
  eprinttype    = {arXiv},
  eprint       = {2005.07145},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-07145.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-00146,
  author       = {Aminollah Khormali and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Generating Adversarial Examples with an Optimized Quality},
  journal      = {CoRR},
  volume       = {abs/2007.00146},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.00146},
  eprinttype    = {arXiv},
  eprint       = {2007.00146},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-00146.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/SpauldingPKNM19,
  author       = {Jeffrey Spaulding and
                  Jeman Park and
                  Joongheon Kim and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Thriving on chaos: Proactive detection of command and control domains
                  in internet of things-scale botnets using {DRIFT}},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {30},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/ett.3505},
  doi          = {10.1002/ETT.3505},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/SpauldingPKNM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AbuhamadRAUKN19,
  author       = {Mohammed Abuhamad and
                  Ji{-}su Rhim and
                  Tamer AbuHmed and
                  Sana Ullah and
                  Sanggil Kang and
                  DaeHun Nyang},
  title        = {Code authorship identification using convolutional neural networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {95},
  pages        = {104--115},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.12.038},
  doi          = {10.1016/J.FUTURE.2018.12.038},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AbuhamadRAUKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AlasmaryKAPCAAN19,
  author       = {Hisham Alasmary and
                  Aminollah Khormali and
                  Afsah Anwar and
                  Jeman Park and
                  Jinchun Choi and
                  Ahmed Abusnaina and
                  Amro Awad and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Analyzing and Detecting Emerging Internet of Things Malware: {A} Graph-Based
                  Approach},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {5},
  pages        = {8977--8988},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2925929},
  doi          = {10.1109/JIOT.2019.2925929},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/AlasmaryKAPCAAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ParkCNM19,
  author       = {Jeman Park and
                  Jinchun Choi and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Transparency in the New gTLD Era: Evaluating the {DNS} Centralized
                  Zone Data Service},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {16},
  number       = {4},
  pages        = {1782--1796},
  year         = {2019},
  url          = {https://doi.org/10.1109/TNSM.2019.2941572},
  doi          = {10.1109/TNSM.2019.2941572},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/ParkCNM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/AbusnainaNYM19,
  author       = {Ahmed Abusnaina and
                  DaeHun Nyang and
                  Murat Yuksel and
                  Aziz Mohaisen},
  title        = {Examining the Security of DDoS Detection Systems in Software Defined
                  Networks},
  booktitle    = {Proceedings of the 15th International Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2019, Companion Volume, Orlando,
                  FL, USA, December 9-12, 2019},
  pages        = {49--50},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360468.3368174},
  doi          = {10.1145/3360468.3368174},
  timestamp    = {Thu, 28 Nov 2019 12:23:19 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/AbusnainaNYM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/AbusnainaAASNM19,
  author       = {Ahmed Abusnaina and
                  Hisham Alasmary and
                  Mohammed Abuhamad and
                  Saeed Salem and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  editor       = {Andrea Tagarelli and
                  Hanghang Tong},
  title        = {Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware
                  Detection Systems},
  booktitle    = {Computational Data and Social Networks - 8th International Conference,
                  CSoNet 2019, Ho Chi Minh City, Vietnam, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11917},
  pages        = {268--281},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34980-6\_30},
  doi          = {10.1007/978-3-030-34980-6\_30},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csonet/AbusnainaAASNM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/AbusnainaKNYM19,
  author       = {Ahmed Abusnaina and
                  Aminollah Khormali and
                  DaeHun Nyang and
                  Murat Yuksel and
                  Aziz Mohaisen},
  title        = {Examining the Robustness of Learning-Based DDoS Detection in Software
                  Defined Networks},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937669},
  doi          = {10.1109/DSC47296.2019.8937669},
  timestamp    = {Mon, 16 Mar 2020 18:03:41 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/AbusnainaKNYM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/ChoiAA0CNM19,
  author       = {Jinchun Choi and
                  Ahmed Abusnaina and
                  Afsah Anwar and
                  An Wang and
                  Songqing Chen and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Honor among Thieves: Towards Understanding the Dynamics and Interdependencies
                  in IoT Botnets},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937574},
  doi          = {10.1109/DSC47296.2019.8937574},
  timestamp    = {Mon, 16 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/ChoiAA0CNM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/ChoiAASNM19,
  author       = {Jinchun Choi and
                  Afsah Anwar and
                  Hisham Alasmary and
                  Jeffrey Spaulding and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  editor       = {Songqing Chen and
                  Ryokichi Onishi and
                  Ganesh Ananthanarayanan and
                  Qun Li},
  title        = {IoT malware ecosystem in the wild: a glimpse into analysis and exposures},
  booktitle    = {Proceedings of the 4th {ACM/IEEE} Symposium on Edge Computing, {SEC}
                  2019, Arlington, Virginia, USA, November 7-9, 2019},
  pages        = {413--418},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3318216.3363379},
  doi          = {10.1145/3318216.3363379},
  timestamp    = {Thu, 21 Sep 2023 13:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/edge/ChoiAASNM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/SaadNKKNM19,
  author       = {Muhammad Saad and
                  Laurent Njilla and
                  Charles A. Kamhoua and
                  Joongheon Kim and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Mempool optimization for Defending Against DDoS Attacks in PoW-based
                  Blockchain Systems},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2019, Seoul, Korea (South), May 14-17, 2019},
  pages        = {285--292},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BLOC.2019.8751476},
  doi          = {10.1109/BLOC.2019.8751476},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icbc2/SaadNKKNM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/JangMNMN19,
  author       = {Rhongho Jang and
                  Seongkwang Moon and
                  Youngtae Noh and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  title        = {InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working
                  Set of Active Flows},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {2047--2056},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00202},
  doi          = {10.1109/ICDCS.2019.00202},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/JangMNMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/SonJNN19,
  author       = {Jinho Son and
                  Hyunwoo Jo and
                  DaeHun Nyang and
                  Youngtae Noh},
  editor       = {Junehwa Song and
                  Minkyong Kim and
                  Nicholas D. Lane and
                  Rajesh Krishna Balan and
                  Fahim Kawsar and
                  Yunxin Liu},
  title        = {Distributed Network Resource Sharing {AP} in Inter-WLAN Environments},
  booktitle    = {Proceedings of the 17th Annual International Conference on Mobile
                  Systems, Applications, and Services, MobiSys 2019, Seoul, Republic
                  of Korea, June 17-21, 2019},
  pages        = {584--585},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3307334.3328637},
  doi          = {10.1145/3307334.3328637},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/SonJNN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JangMNMN19,
  author       = {Rhongho Jang and
                  Seongkwang Moon and
                  Youngtae Noh and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  title        = {A cost-effective anomaly detection system using in-DRAM working set
                  of active flows table: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {286--287},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326294},
  doi          = {10.1145/3317549.3326294},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JangMNMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChoiAASNM19,
  author       = {Jinchun Choi and
                  Afsah Anwar and
                  Hisham Alasmary and
                  Jeffrey Spaulding and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Analyzing endpoints in the internet of things malware: poster},
  booktitle    = {Proceedings of the 12th Conference on Security and Privacy in Wireless
                  and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages        = {288--289},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317549.3326295},
  doi          = {10.1145/3317549.3326295},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ChoiAASNM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-01185,
  author       = {Aziz Mohaisen and
                  Omar Alrawi and
                  Jeman Park and
                  Joongheon Kim and
                  DaeHun Nyang and
                  Manar Mohaisen},
  title        = {Network-based Analysis and Classification of Malware using Behavioral
                  Artifacts Ordering},
  journal      = {CoRR},
  volume       = {abs/1901.01185},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.01185},
  eprinttype    = {arXiv},
  eprint       = {1901.01185},
  timestamp    = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-01185.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-03531,
  author       = {Jinchun Choi and
                  Afsah Anwar and
                  Hisham Alasmary and
                  Jeffrey Spaulding and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Analyzing Endpoints in the Internet of Things Malware},
  journal      = {CoRR},
  volume       = {abs/1902.03531},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.03531},
  eprinttype    = {arXiv},
  eprint       = {1902.03531},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-03531.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-03955,
  author       = {Hisham Alasmary and
                  Aminollah Khormali and
                  Afsah Anwar and
                  Jeman Park and
                  Jinchun Choi and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Analyzing, Comparing, and Detecting Emerging Malware: {A} Graph-based
                  Approach},
  journal      = {CoRR},
  volume       = {abs/1902.03955},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.03955},
  eprinttype    = {arXiv},
  eprint       = {1902.03955},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-03955.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-04143,
  author       = {RhongHo Jang and
                  Seongkwang Moon and
                  Youngtae Noh and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  title        = {Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows
                  Table},
  journal      = {CoRR},
  volume       = {abs/1902.04143},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.04143},
  eprinttype    = {arXiv},
  eprint       = {1902.04143},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-04143.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-03487,
  author       = {Muhammad Saad and
                  Jeffrey Spaulding and
                  Laurent Njilla and
                  Charles A. Kamhoua and
                  Sachin Shetty and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Exploring the Attack Surface of Blockchain: {A} Systematic Overview},
  journal      = {CoRR},
  volume       = {abs/1904.03487},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.03487},
  eprinttype    = {arXiv},
  eprint       = {1904.03487},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-03487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-09735,
  author       = {Aminollah Khormali and
                  Ahmed Abusnaina and
                  Songqing Chen and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {{COPYCAT:} Practical Adversarial Attacks on Visualization-Based Malware
                  Detection},
  journal      = {CoRR},
  volume       = {abs/1909.09735},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.09735},
  eprinttype    = {arXiv},
  eprint       = {1909.09735},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-09735.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-01091,
  author       = {Changhun Jung and
                  Mohammed Abuhamad and
                  Jumabek Alikhanov and
                  Aziz Mohaisen and
                  Kyungja Han and
                  DaeHun Nyang},
  title        = {W-Net: {A} CNN-based Architecture for White Blood Cells Image Classification},
  journal      = {CoRR},
  volume       = {abs/1910.01091},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.01091},
  eprinttype    = {arXiv},
  eprint       = {1910.01091},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-01091.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NyangKLKCLM18,
  author       = {DaeHun Nyang and
                  Hyoungshick Kim and
                  Woojoo Lee and
                  Sung{-}bae Kang and
                  Geumhwan Cho and
                  Mun{-}Kyu Lee and
                  Aziz Mohaisen},
  title        = {Two-Thumbs-Up: Physical protection for {PIN} entry secure against
                  recording attacks},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {1--15},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.05.012},
  doi          = {10.1016/J.COSE.2018.05.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NyangKLKCLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MohaisenAPKNM18,
  author       = {Aziz Mohaisen and
                  Omar Alrawi and
                  Jeman Park and
                  Joongheon Kim and
                  DaeHun Nyang and
                  Manar Mohaisen},
  title        = {Network-based Analysis and Classification of Malware using Behavioral
                  Artifacts Ordering},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {16},
  pages        = {e2},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.13-7-2018.156002},
  doi          = {10.4108/EAI.13-7-2018.156002},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MohaisenAPKNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbuhamadAMN18,
  author       = {Mohammed Abuhamad and
                  Tamer AbuHmed and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Large-Scale and Language-Oblivious Code Authorship Identification},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {101--114},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243738},
  doi          = {10.1145/3243734.3243738},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AbuhamadAMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csonet/AlasmaryA0CNM18,
  author       = {Hisham Alasmary and
                  Afsah Anwar and
                  Jeman Park and
                  Jinchun Choi and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  editor       = {Xuemin Chen and
                  Arunabha Sen and
                  Wei Wayne Li and
                  My T. Thai},
  title        = {Graph-Based Comparison of IoT and Android Malware},
  booktitle    = {Computational Data and Social Networks - 7th International Conference,
                  CSoNet 2018, Shanghai, China, December 18-20, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11280},
  pages        = {259--272},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04648-4\_22},
  doi          = {10.1007/978-3-030-04648-4\_22},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csonet/AlasmaryA0CNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/JungKMN18,
  author       = {Changhun Jung and
                  Jeonil Kang and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  title        = {Digitalseal: a Transaction Authentication Tool for Online and Offline
                  Transactions},
  booktitle    = {2018 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2018, Calgary, AB, Canada, April 15-20, 2018},
  pages        = {6956--6960},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICASSP.2018.8462341},
  doi          = {10.1109/ICASSP.2018.8462341},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/JungKMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/BaekJMLN18,
  author       = {SungHa Baek and
                  Youngdon Jung and
                  Aziz Mohaisen and
                  Sungjin Lee and
                  DaeHun Nyang},
  title        = {SSD-Insider: Internal Defense of Solid-State Drive against Ransomware
                  with Perfect Data Recovery},
  booktitle    = {38th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2018, Vienna, Austria, July 2-6, 2018},
  pages        = {875--884},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDCS.2018.00089},
  doi          = {10.1109/ICDCS.2018.00089},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/BaekJMLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/0001NM18,
  author       = {Jeman Park and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Timing is Almost Everything: Realistic Evaluation of the Very Short
                  Intermittent DDoS Attacks},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514210},
  doi          = {10.1109/PST.2018.8514210},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/0001NM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AnwarKNM18,
  author       = {Afsah Anwar and
                  Aminollah Khormali and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Understanding the Hidden Cost of Software Vulnerabilities: Measurements
                  and Predictions},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  pages        = {377--395},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9\_21},
  doi          = {10.1007/978-3-030-01701-9\_21},
  timestamp    = {Fri, 11 Jan 2019 16:12:16 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AnwarKNM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-11263,
  author       = {DaeHun Nyang},
  title        = {Gruut: {A} Fully-Decentralized {P2P} Public Ledger},
  journal      = {CoRR},
  volume       = {abs/1806.11263},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.11263},
  eprinttype    = {arXiv},
  eprint       = {1806.11263},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-11263.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/KangN17,
  author       = {Jeonil Kang and
                  DaeHun Nyang},
  title        = {A Privacy-Preserving Mobile Payment System for Mass Transit},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {18},
  number       = {8},
  pages        = {2192--2205},
  year         = {2017},
  url          = {https://doi.org/10.1109/TITS.2016.2636919},
  doi          = {10.1109/TITS.2016.2636919},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/KangN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotweb/SpauldingNM17,
  author       = {Jeffrey Spaulding and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  editor       = {Qun Li and
                  Songqing Chen},
  title        = {Understanding the effectiveness of typosquatting techniques},
  booktitle    = {Proceedings of the fifth {ACM/IEEE} Workshop on Hot Topics in Web
                  Systems and Technologies, HotWeb 2017, San Jose / Silicon Valley,
                  CA, USA, October 12 - 14, 2017},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3132465.3132467},
  doi          = {10.1145/3132465.3132467},
  timestamp    = {Thu, 21 Sep 2023 13:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/hotweb/SpauldingNM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/JangKMN17,
  author       = {RhongHo Jang and
                  Jeonil Kang and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Rogue Access Point Detector Using Characteristics of Channel Overlapping
                  in 802.11n},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2515--2520},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.153},
  doi          = {10.1109/ICDCS.2017.153},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/JangKMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JangCNN17,
  author       = {RhongHo Jang and
                  DongGyu Cho and
                  Youngtae Noh and
                  DaeHun Nyang},
  title        = {RFlow\({}^{\mbox{+}}\): An SDN-based {WLAN} monitoring and management
                  framework},
  booktitle    = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017,
                  Atlanta, GA, USA, May 1-4, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFOCOM.2017.8056995},
  doi          = {10.1109/INFOCOM.2017.8056995},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JangCNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/KimMLN17,
  author       = {Joongheon Kim and
                  Yeong Jong Mo and
                  Woojoo Lee and
                  DaeHun Nyang},
  title        = {Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning
                  Architectures in Surveillance Applications},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {192--193},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.22},
  doi          = {10.1109/PAC.2017.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/KimMLN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/MohaisenG0NKN17,
  author       = {Aziz Mohaisen and
                  Zhongshu Gu and
                  Kui Ren and
                  Laurent Njilla and
                  Charles A. Kamhoua and
                  DaeHun Nyang},
  title        = {Understanding the Privacy Implications of {DNSSEC} Look-Aside Validation},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {208--209},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.38},
  doi          = {10.1109/PAC.2017.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/MohaisenG0NKN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JangKMN17,
  author       = {RhongHo Jang and
                  Jeonil Kang and
                  Aziz Mohaisen and
                  DaeHun Nyang},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Highly-accurate rogue access point detection using intentional channel
                  interference: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {277--278},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106024},
  doi          = {10.1145/3098243.3106024},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JangKMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/JangCMNN17,
  author       = {RhongHo Jang and
                  DongGyu Cho and
                  Aziz Mohaisen and
                  Youngtae Noh and
                  DaeHun Nyang},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Two-level network monitoring and management in {WLAN} using software-defined
                  networking: poster},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {279--280},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3106025},
  doi          = {10.1145/3098243.3106025},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/JangCMNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/LeeMSN16,
  author       = {Mun{-}Kyu Lee and
                  Pierre Michaud and
                  Jeong Seop Sim and
                  DaeHun Nyang},
  title        = {A simple proof of optimality for the {MIN} cache replacement policy},
  journal      = {Inf. Process. Lett.},
  volume       = {116},
  number       = {2},
  pages        = {168--170},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ipl.2015.09.004},
  doi          = {10.1016/J.IPL.2015.09.004},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/LeeMSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/HwangECLN16,
  author       = {Jung Yeon Hwang and
                  Sungwook Eom and
                  Ku{-}Young Chang and
                  Pil Joong Lee and
                  DaeHun Nyang},
  title        = {Anonymity-based authenticated key agreement with full binding property},
  journal      = {J. Commun. Networks},
  volume       = {18},
  number       = {2},
  pages        = {190--200},
  year         = {2016},
  url          = {https://doi.org/10.1109/JCN.2016.000028},
  doi          = {10.1109/JCN.2016.000028},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/HwangECLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/NyangS16,
  author       = {DaeHun Nyang and
                  DongOh Shin},
  title        = {Recyclable Counter With Confinement for Real-Time Per-Flow Measurement},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {5},
  pages        = {3191--3203},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2016.2514523},
  doi          = {10.1109/TNET.2016.2514523},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/NyangS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/ImCNL16,
  author       = {Jong{-}Hyuk Im and
                  Jinchun Choi and
                  DaeHun Nyang and
                  Mun{-}Kyu Lee},
  title        = {Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption},
  booktitle    = {2016 {IEEE} 14th Intl Conf on Dependable, Autonomic and Secure Computing,
                  14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf
                  on Big Data Intelligence and Computing and Cyber Science and Technology
                  Congress, DASC/PiCom/DataCom/CyberSciTech 2016, Auckland, New Zealand,
                  August 8-12, 2016},
  pages        = {878--881},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.150},
  doi          = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2016.150},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/ImCNL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaengMLN15,
  author       = {YoungJae Maeng and
                  Aziz Mohaisen and
                  Mun{-}Kyu Lee and
                  DaeHun Nyang},
  title        = {Transaction authentication using complementary colors},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {167--181},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.001},
  doi          = {10.1016/J.COSE.2014.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaengMLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/thms/AbuHmedLN15,
  author       = {Tamer AbuHmed and
                  KyungHee Lee and
                  DaeHun Nyang},
  title        = {{UOIT} Keyboard: {A} Constructive Keyboard for Small Touchscreen Devices},
  journal      = {{IEEE} Trans. Hum. Mach. Syst.},
  volume       = {45},
  number       = {6},
  pages        = {782--789},
  year         = {2015},
  url          = {https://doi.org/10.1109/THMS.2015.2449309},
  doi          = {10.1109/THMS.2015.2449309},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/thms/AbuHmedLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HwangCCN15,
  author       = {Jung Yeon Hwang and
                  Liqun Chen and
                  Hyun Sook Cho and
                  DaeHun Nyang},
  title        = {Short Dynamic Group Signature Scheme Supporting Controllable Linkability},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {6},
  pages        = {1109--1124},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2390497},
  doi          = {10.1109/TIFS.2015.2390497},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HwangCCN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/KangNL14,
  author       = {Jeonil Kang and
                  DaeHun Nyang and
                  KyungHee Lee},
  title        = {Two-factor face authentication using matrix permutation transformation
                  and a user password},
  journal      = {Inf. Sci.},
  volume       = {269},
  pages        = {1--20},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.02.011},
  doi          = {10.1016/J.INS.2014.02.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/KangNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/NyangMK14,
  author       = {DaeHun Nyang and
                  Aziz Mohaisen and
                  Jeonil Kang},
  title        = {Keylogging-Resistant Visual Authentication Protocols},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {11},
  pages        = {2566--2579},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2014.2307331},
  doi          = {10.1109/TMC.2014.2307331},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/NyangMK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HwangLCCN13,
  author       = {Jung Yeon Hwang and
                  Sokjoon Lee and
                  Byung{-}Ho Chung and
                  Hyun Sook Cho and
                  DaeHun Nyang},
  title        = {Group signatures with controllable linkability for dynamic membership},
  journal      = {Inf. Sci.},
  volume       = {222},
  pages        = {761--778},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2012.07.065},
  doi          = {10.1016/J.INS.2012.07.065},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/HwangLCCN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HwangECLN12,
  author       = {Jung Yeon Hwang and
                  Sungwook Eom and
                  Ku{-}Young Chang and
                  Pil Joong Lee and
                  DaeHun Nyang},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Anonymity-Based Authenticated Key Agreement with Full Binding Property},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {177--191},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_13},
  doi          = {10.1007/978-3-642-35416-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HwangECLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/AbuHmedKNL11,
  author       = {Tamer AbuHmed and
                  Jeonil Kang and
                  DaeHun Nyang and
                  KyungHee Lee},
  title        = {A Software-Based Group Attestation for Wireless Sensor Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {13},
  number       = {1-2},
  pages        = {121--154},
  year         = {2011},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-13-number-1-2-2011/ahswn-13-1-2-p-121-154/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/AbuHmedKNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KimYLN11,
  author       = {Kitae Kim and
                  Ikkwon Yie and
                  Seongan Lim and
                  Daehun Nyang},
  title        = {Batch Verification and Finding Invalid Signatures in a Group Signature
                  Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {61--70},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p61-70.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KimYLN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/deis/KiHNLL11,
  author       = {JuHee Ki and
                  Jung Yeon Hwang and
                  DaeHun Nyang and
                  Dong Hoon Lee and
                  Jongin Lim},
  editor       = {Ezendu Ariwa and
                  Eyas El{-}Qawasmeh},
  title        = {Privacy-Enhanced Deniable Authentication E-Mail Service},
  booktitle    = {Digital Enterprise and Information Systems - International Conference,
                  {DEIS} 2011, London, UK, July 20 - 22, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {194},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22603-8\_2},
  doi          = {10.1007/978-3-642-22603-8\_2},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/deis/KiHNLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/MohaisenAKKN11,
  author       = {Abedelaziz Mohaisen and
                  Tamer AbuHmed and
                  Hun Jeong Kang and
                  Yongdae Kim and
                  DaeHun Nyang},
  editor       = {Suk{-}Han Lee and
                  Lajos Hanzo and
                  Min Young Chung and
                  Sang{-}Won Lee and
                  Kwangsu Cho},
  title        = {Mistaking friends for foes: an analysis of a social network-based
                  Sybil defense in mobile networks},
  booktitle    = {Proceedings of the 5th International Conference on Ubiquitous Information
                  Management and Communication, {ICUIMC} 2011, Seoul, Republic of Korea,
                  February 21 - 23, 2011},
  pages        = {28},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1968613.1968648},
  doi          = {10.1145/1968613.1968648},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/MohaisenAKKN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2010,
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24209-0},
  doi          = {10.1007/978-3-642-24209-0},
  isbn         = {978-3-642-24208-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-2245,
  author       = {DaeHun Nyang and
                  Abedelaziz Mohaisen and
                  Taekyoung Kwon and
                  Brent ByungHoon Kang and
                  Angelos Stavrou},
  title        = {Decryptable to Your Eyes: Visualization of Security Protocols at the
                  User Interface},
  journal      = {CoRR},
  volume       = {abs/1112.2245},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.2245},
  eprinttype    = {arXiv},
  eprint       = {1112.2245},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-2245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MohaisenJHN10,
  author       = {Abedelaziz Mohaisen and
                  Nam{-}Su Jho and
                  Dowon Hong and
                  DaeHun Nyang},
  title        = {Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement
                  and Resources Efficiency},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {2},
  pages        = {315--325},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.315},
  doi          = {10.1587/TRANSINF.E93.D.315},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MohaisenJHN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/KimYN10,
  author       = {Kitae Kim and
                  Ikkwon Yie and
                  Daehun Nyang},
  title        = {On the Security of Two Group Signature Schemes with Forward Security},
  journal      = {Informatica (Slovenia)},
  volume       = {34},
  number       = {2},
  pages        = {237--242},
  year         = {2010},
  url          = {http://www.informatica.si/index.php/informatica/article/view/295},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/KimYN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/MohaisenN10,
  author       = {Abedelaziz Mohaisen and
                  DaeHun Nyang},
  title        = {On the Inefficiency of the Resources Optimal Key Pre-Distribution
                  Scheme for Wireless Sensor Network},
  journal      = {J. Commun.},
  volume       = {5},
  number       = {2},
  pages        = {164--168},
  year         = {2010},
  url          = {https://doi.org/10.4304/jcm.5.2.164-168},
  doi          = {10.4304/JCM.5.2.164-168},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcm/MohaisenN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimN10,
  author       = {Kitae Kim and
                  Daehun Nyang},
  title        = {Security Analysis of a Threshold Proxy Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NyangY09,
  author       = {DaeHun Nyang and
                  Akihiro Yamamura},
  title        = {More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {7},
  pages        = {1720--1723},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1720},
  doi          = {10.1587/TRANSFUN.E92.A.1720},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NyangY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MohaisenNL09,
  author       = {Abedelaziz Mohaisen and
                  DaeHun Nyang and
                  KyungHee Lee},
  title        = {Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless
                  Sensor Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {282--292},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n3/ijns-2009-v8-n3-p282-292.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MohaisenNL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/MohaisenNMLH09,
  author       = {Abedelaziz Mohaisen and
                  DaeHun Nyang and
                  YoungJae Maeng and
                  KyungHee Lee and
                  Dowon Hong},
  title        = {Grid-Based Key Pre-Distribution in Wireless Sensor Networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {3},
  number       = {2},
  pages        = {195--208},
  year         = {2009},
  url          = {https://doi.org/10.3837/tiis.2009.02.005},
  doi          = {10.3837/TIIS.2009.02.005},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/MohaisenNMLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AbuHmedNN09,
  author       = {Tamer AbuHmed and
                  Nandinbold Nyamaa and
                  DaeHun Nyang},
  title        = {Software-Based Remote Code Attestation in Wireless Sensor Network},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425280},
  doi          = {10.1109/GLOCOM.2009.5425280},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/AbuHmedNN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/NiNW09,
  author       = {YongQing Ni and
                  DaeHun Nyang and
                  Xu Wang},
  title        = {A-Kad: an anonymous {P2P} protocol based on Kad network},
  booktitle    = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China},
  pages        = {747--752},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MOBHOC.2009.5336924},
  doi          = {10.1109/MOBHOC.2009.5336924},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/NiNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-2682,
  author       = {Abedelaziz Mohaisen and
                  Dowon Hong and
                  DaeHun Nyang},
  title        = {Privacy in Location Based Services: Primitives Toward the Solution},
  journal      = {CoRR},
  volume       = {abs/0903.2682},
  year         = {2009},
  url          = {http://arxiv.org/abs/0903.2682},
  eprinttype    = {arXiv},
  eprint       = {0903.2682},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0903-2682.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NyangL09,
  author       = {DaeHun Nyang and
                  Mun{-}Kyu Lee},
  title        = {Improvement of Das's Two-Factor Authentication Protocol in Wireless
                  Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NyangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/MohaisenNA08,
  author       = {Abedelaziz Mohaisen and
                  DaeHun Nyang and
                  Tamer AbuHmed},
  title        = {Two-level Key Pool Design-based Random Key Pre-distribution in Wireless
                  Sensor Networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {2},
  number       = {5},
  pages        = {222--238},
  year         = {2008},
  url          = {https://doi.org/10.3837/tiis.2008.05.001},
  doi          = {10.3837/TIIS.2008.05.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/MohaisenNA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/MohaisenHN08,
  author       = {Abedelaziz Mohaisen and
                  Dowon Hong and
                  DaeHun Nyang},
  editor       = {Jinhwa Kim and
                  Dursun Delen and
                  Jinsoo Park and
                  Franz Ko and
                  Yun Ji Na},
  title        = {Privacy in Location Based Services: Primitives Toward the Solution},
  booktitle    = {{NCM} 2008, The Fourth International Conference on Networked Computing
                  and Advanced Information Management, Gyeongju, Korea, September 2-4,
                  2008 - Volume 1},
  pages        = {572--579},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/NCM.2008.137},
  doi          = {10.1109/NCM.2008.137},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ncm/MohaisenHN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/MohaisenJHJN08,
  author       = {Abedelaziz Mohaisen and
                  Ik Rae Jeong and
                  Dowon Hong and
                  Nam{-}Su Jho and
                  DaeHun Nyang},
  editor       = {Frode Eika Sandnes and
                  Yan Zhang and
                  Chunming Rong and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {Data Randomization for Lightweight Secure Data Aggregation in Sensor
                  Network},
  booktitle    = {Ubiquitous Intelligence and Computing, 5th International Conference,
                  {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5061},
  pages        = {338--351},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69293-5\_27},
  doi          = {10.1007/978-3-540-69293-5\_27},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/MohaisenJHJN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/MohaisenMKNLHH08,
  author       = {Abedelaziz Mohaisen and
                  YoungJae Maeng and
                  Jeonil Kang and
                  DaeHun Nyang and
                  KyungHee Lee and
                  Dowon Hong and
                  Jong Wook Han},
  editor       = {Frode Eika Sandnes and
                  Yan Zhang and
                  Chunming Rong and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {Protection Techniques of Secret Information in Non-tamper Proof Devices
                  of Smart Home Network},
  booktitle    = {Ubiquitous Intelligence and Computing, 5th International Conference,
                  {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5061},
  pages        = {548--562},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69293-5\_43},
  doi          = {10.1007/978-3-540-69293-5\_43},
  timestamp    = {Tue, 03 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/MohaisenMKNLHH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0803-0037,
  author       = {Tamer AbuHmed and
                  Abedelaziz Mohaisen and
                  DaeHun Nyang},
  title        = {A Survey on Deep Packet Inspection for Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/0803.0037},
  year         = {2008},
  url          = {http://arxiv.org/abs/0803.0037},
  eprinttype    = {arXiv},
  eprint       = {0803.0037},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0803-0037.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0803-1111,
  author       = {Abedelaziz Mohaisen and
                  DaeHun Nyang and
                  KyungHee Lee},
  title        = {Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless
                  Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/0803.1111},
  year         = {2008},
  url          = {http://arxiv.org/abs/0803.1111},
  eprinttype    = {arXiv},
  eprint       = {0803.1111},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0803-1111.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/KimCNHS07,
  author       = {Sinkyu Kim and
                  Jae{-}Woo Choi and
                  DaeHun Nyang and
                  GeneBeck Hahn and
                  JooSeok Song},
  title        = {Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless
                  {LAN}},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {3},
  pages        = {476--480},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9048-0},
  doi          = {10.1007/S11390-007-9048-0},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/KimCNHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/NyangL07,
  author       = {DaeHun Nyang and
                  KyungHee Lee},
  editor       = {Constantine Stephanidis},
  title        = {Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features},
  booktitle    = {Universal Access in Human Computer Interaction. Coping with Diversity,
                  4th International Conference on Universal Access in Human-Computer
                  Interaction, {UAHCI} 2007, Held as Part of {HCI} International 2007,
                  Beijing, China, July 22-27, 2007, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4554},
  pages        = {491--496},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73279-2\_55},
  doi          = {10.1007/978-3-540-73279-2\_55},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/NyangL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KangNMCK07,
  author       = {Jeonil Kang and
                  DaeHun Nyang and
                  Abedelaziz Mohaisen and
                  Young{-}Geun Choi and
                  KoonSoon Kim},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized
                  Ad Hoc Network},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings.
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4707},
  pages        = {886--899},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74484-9\_75},
  doi          = {10.1007/978-3-540-74484-9\_75},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KangNMCK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/ChoiKN07,
  author       = {Young{-}Geun Choi and
                  Jeonil Kang and
                  DaeHun Nyang},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova},
  title        = {Proactive Code Verification Protocol in Wireless Sensor Network},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2007, International
                  Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4706},
  pages        = {1085--1096},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74477-1\_97},
  doi          = {10.1007/978-3-540-74477-1\_97},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/ChoiKN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/MohaisenNML07,
  author       = {Abedelaziz Mohaisen and
                  DaeHun Nyang and
                  YoungJae Maeng and
                  KyungHee Lee},
  editor       = {Hongke Zhang and
                  Stephan Olariu and
                  Jiannong Cao and
                  David B. Johnson},
  title        = {Structures for Communication-Efficient Public Key Revocation in Ubiquitous
                  Sensor Network},
  booktitle    = {Mobile Ad-Hoc and Sensor Networks, Third International Conference,
                  {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4864},
  pages        = {822--833},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77024-4\_74},
  doi          = {10.1007/978-3-540-77024-4\_74},
  timestamp    = {Tue, 14 Apr 2020 13:23:09 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/MohaisenNML07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/MohaisenMN07,
  author       = {Abedelaziz Mohaisen and
                  YoungJae Maeng and
                  DaeHun Nyang},
  editor       = {Takashi Washio and
                  Zhi{-}Hua Zhou and
                  Joshua Zhexue Huang and
                  Xiaohua Hu and
                  Jinyan Li and
                  Chao Xie and
                  Jieyue He and
                  Deqing Zou and
                  Kuan{-}Ching Li and
                  M{\'{a}}rio M. Freire},
  title        = {On Grid-Based Key Pre-distribution: Toward a Better Connectivity in
                  Wireless Sensor Network},
  booktitle    = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD}
                  2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4819},
  pages        = {527--537},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77018-3\_53},
  doi          = {10.1007/978-3-540-77018-3\_53},
  timestamp    = {Fri, 09 Apr 2021 17:11:17 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/MohaisenMN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/MaengMN07,
  author       = {YoungJae Maeng and
                  Abedelaziz Mohaisen and
                  DaeHun Nyang},
  editor       = {Jadwiga Indulska and
                  Jianhua Ma and
                  Laurence Tianruo Yang and
                  Theo Ungerer and
                  Jiannong Cao},
  title        = {Secret Key Revocation in Sensor Networks},
  booktitle    = {Ubiquitous Intelligence and Computing, 4th International Conference,
                  {UIC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4611},
  pages        = {1222--1232},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73549-6\_119},
  doi          = {10.1007/978-3-540-73549-6\_119},
  timestamp    = {Wed, 31 Jan 2024 08:24:33 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/MaengMN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LeiNLL06,
  author       = {Zhu Lei and
                  DaeHun Nyang and
                  KyungHee Lee and
                  Hyotaek Lim},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {683--693},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_71},
  doi          = {10.1007/978-3-540-74377-4\_71},
  timestamp    = {Tue, 19 Nov 2019 12:34:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LeiNLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/LeeNS06,
  author       = {HongKi Lee and
                  DaeHun Nyang and
                  JooSeok Song},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {Message and Its Origin Authentication Protocol for Data Aggregation
                  in Sensor Networks},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {281--290},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_29},
  doi          = {10.1007/11807964\_29},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/LeeNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/MohaisenN06,
  author       = {Abedelaziz Mohaisen and
                  DaeHun Nyang},
  editor       = {Kay R{\"{o}}mer and
                  Holger Karl and
                  Friedemann Mattern},
  title        = {Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless
                  Sensor Networks},
  booktitle    = {Wireless Sensor Networks, Third European Workshop, {EWSN} 2006, Zurich,
                  Switzerland, February 13-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3868},
  pages        = {83--98},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11669463\_9},
  doi          = {10.1007/11669463\_9},
  timestamp    = {Thu, 14 Oct 2021 10:30:13 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/MohaisenN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/LimNKLL06,
  author       = {Jihyung Lim and
                  DaeHun Nyang and
                  Jeonil Kang and
                  KyungHee Lee and
                  Hyotaek Lim},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {Distributed Certificate Authority Under the GRID-Location Aided Routing
                  Protocol},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3983},
  pages        = {380--387},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751632\_41},
  doi          = {10.1007/11751632\_41},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/LimNKLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/NyangM06,
  author       = {DaeHun Nyang and
                  Abedelaziz Mohaisen},
  editor       = {Jianhua Ma and
                  Hai Jin and
                  Laurence Tianruo Yang and
                  Jeffrey J. P. Tsai},
  title        = {Cooperative Public Key Authentication Protocol in Wireless Sensor
                  Network},
  booktitle    = {Ubiquitous Intelligence and Computing, Third International Conference,
                  {UIC} 2006, Wuhan, China, September 3-6, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4159},
  pages        = {864--873},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11833529\_88},
  doi          = {10.1007/11833529\_88},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/NyangM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KangN05,
  author       = {Jeonil Kang and
                  DaeHun Nyang},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {{RFID} Authentication Protocol with Strong Resistance Against Traceability
                  and Denial of Service Attacks},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {164--175},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_14},
  doi          = {10.1007/11601494\_14},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KangN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ParkKN05,
  author       = {JuSung Park and
                  Jeonil Kang and
                  DaeHun Nyang},
  editor       = {Tomoya Enokido and
                  Lu Yan and
                  Bin Xiao and
                  Daeyoung Kim and
                  Yuan{-}Shun Dai and
                  Laurence Tianruo Yang},
  title        = {Selective Collision Based Medium Access Control Protocol for Proactive
                  Protection of Privacy for {RFID}},
  booktitle    = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005
                  Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December
                  6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3823},
  pages        = {383--392},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596042\_40},
  doi          = {10.1007/11596042\_40},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/ParkKN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwbrs/KangNL05,
  author       = {Jeonil Kang and
                  DaeHun Nyang and
                  KyungHee Lee},
  editor       = {Stan Z. Li and
                  Zhenan Sun and
                  Tieniu Tan and
                  Sharath Pankanti and
                  G{\'{e}}rard Chollet and
                  David Zhang},
  title        = {Two Factor Face Authentication Scheme with Cancelable Feature},
  booktitle    = {Advances in Biometric Person Authentication, International Workshop
                  on Biometric Recognition Systems, IWBRS2005, Beijing, China, October
                  22-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3781},
  pages        = {67--76},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11569947\_9},
  doi          = {10.1007/11569947\_9},
  timestamp    = {Thu, 17 Oct 2019 12:39:20 +0200},
  biburl       = {https://dblp.org/rec/conf/iwbrs/KangNL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/others/05/LimCN05,
  author       = {Hyotaek Lim and
                  Saebom Choi and
                  DaeHun Nyang},
  editor       = {Tuna Tugcu and
                  Erol Gelenbe and
                  M. Ufuk {\c{C}}aglayan and
                  Fatih Alag{\"{o}}z},
  title        = {Implementation and Performance Analysis of iSCSI-based Virtual Storage
                  System with Wireless Networks},
  booktitle    = {New Trends in Computer Networks},
  series       = {Advances in Computer Science and Engineering : Reports and Monographs},
  volume       = {1},
  publisher    = {Imperial College Press},
  year         = {2005},
  url          = {https://doi.org/10.1142/9781860947308\_0016},
  doi          = {10.1142/9781860947308\_0016},
  timestamp    = {Mon, 22 Jun 2020 14:58:58 +0200},
  biburl       = {https://dblp.org/rec/books/others/05/LimCN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/LimND04,
  author       = {Hyotaek Lim and
                  DaeHun Nyang and
                  David Hung{-}Chang Du},
  editor       = {Hyun{-}Kook Kahng},
  title        = {An Efficient Video Prefix-Caching Scheme in Wide Area Networks},
  booktitle    = {Information Networking, Networking Technologies for Broadband and
                  Mobile Networks, International Conference {ICOIN} 2004, Busan, Korea,
                  February 18-20, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3090},
  pages        = {679--688},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25978-7\_68},
  doi          = {10.1007/978-3-540-25978-7\_68},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/LimND04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/KangOCCN04,
  author       = {You Sung Kang and
                  KyungHee Oh and
                  Byung{-}Ho Chung and
                  Kyoil Chung and
                  DaeHun Nyang},
  editor       = {Hyun{-}Kook Kahng},
  title        = {Analysis and Countermeasure on Vulnerability of {WPA} Key Exchange
                  Mechanism},
  booktitle    = {Information Networking, Networking Technologies for Broadband and
                  Mobile Networks, International Conference {ICOIN} 2004, Busan, Korea,
                  February 18-20, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3090},
  pages        = {915--924},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25978-7\_92},
  doi          = {10.1007/978-3-540-25978-7\_92},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/KangOCCN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/NyangS00,
  author       = {DaeHun Nyang and
                  Joo{-}Seok Song},
  title        = {Knowledge-proof based versatile smart card verification protocol},
  journal      = {Comput. Commun. Rev.},
  volume       = {30},
  number       = {3},
  pages        = {39--44},
  year         = {2000},
  url          = {https://doi.org/10.1145/382179.383016},
  doi          = {10.1145/382179.383016},
  timestamp    = {Thu, 10 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/NyangS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/NyangLS99,
  author       = {DaeHun Nyang and
                  S. Y. Lim and
                  JooSeok Song},
  title        = {A complete test sequence using cyclic sequence for conformance testing},
  journal      = {Comput. Commun.},
  volume       = {22},
  number       = {15-16},
  pages        = {1447--1456},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0140-3664(99)00102-4},
  doi          = {10.1016/S0140-3664(99)00102-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/NyangLS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NyangS99,
  author       = {DaeHun Nyang and
                  JooSeok Song},
  editor       = {JooSeok Song},
  title        = {Preventing Double-Spent Coins from Revealing User's Whole Secret},
  booktitle    = {Information Security and Cryptology - ICISC'99, Second International
                  Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1787},
  pages        = {30--37},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719994\_3},
  doi          = {10.1007/10719994\_3},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NyangS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics