Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: DaeHun Nyang
@inproceedings{DBLP:conf/csonet/ChoiJNM23, author = {Soohyeon Choi and Rhongho Jang and DaeHun Nyang and David Mohaisen}, editor = {Minh Ho{\`{a}}ng H{\`{a}} and Xingquan Zhu and My T. Thai}, title = {Untargeted Code Authorship Evasion with Seq2Seq Transformation}, booktitle = {Computational Data and Social Networks - 12th International Conference, CSoNet 2023, Hanoi, Vietnam, December 11-13, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14479}, pages = {83--92}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0669-3\_8}, doi = {10.1007/978-981-97-0669-3\_8}, timestamp = {Mon, 11 Mar 2024 15:20:45 +0100}, biburl = {https://dblp.org/rec/conf/csonet/ChoiJNM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/AlkinoonAAJNM23, author = {Mohammed Alkinoon and Abdulrahman Alabduljabbar and Hattan Althebeiti and Rhongho Jang and DaeHun Nyang and David Mohaisen}, title = {Understanding the Security and Performance of the Web Presence of Hospitals: {A} Measurement Study}, booktitle = {32nd International Conference on Computer Communications and Networks, {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCN58024.2023.10230186}, doi = {10.1109/ICCCN58024.2023.10230186}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/AlkinoonAAJNM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChoiMNM23, author = {Soohyeon Choi and Manar Mohaisen and Daehun Nyang and David Mohaisen}, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from {VR} Motion Sensors}, booktitle = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {399--417}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9\_24}, doi = {10.1007/978-981-99-7356-9\_24}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ChoiMNM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KimJJMN23, author = {Sian Kim and Changhun Jung and RhongHo Jang and David Mohaisen and DaeHun Nyang}, title = {A Robust Counting Sketch for Data Plane Intrusion Detection}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/a-robust-counting-sketch-for-data-plane-intrusion-detection/}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/KimJJMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AlthebeitiGANM23, author = {Hattan Althebeiti and Ran Gedawy and Ahod Alghuried and Daehun Nyang and David Mohaisen}, editor = {Howon Kim and Jonghee M. Youn}, title = {Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {159--174}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_13}, doi = {10.1007/978-981-99-8024-6\_13}, timestamp = {Thu, 18 Jan 2024 08:27:16 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AlthebeitiGANM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-13255, author = {Mohammed Abuhamad and Changhun Jung and David Mohaisen and DaeHun Nyang}, title = {{SHIELD:} Thwarting Code Authorship Attribution}, journal = {CoRR}, volume = {abs/2304.13255}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.13255}, doi = {10.48550/ARXIV.2304.13255}, eprinttype = {arXiv}, eprint = {2304.13255}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-13255.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-13278, author = {Mohammed Alkinoon and Abdulrahman Alabduljabbar and Hattan Althebeiti and Rhongho Jang and DaeHun Nyang and David Mohaisen}, title = {Understanding the Security and Performance of the Web Presence of Hospitals: {A} Measurement Study}, journal = {CoRR}, volume = {abs/2304.13278}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.13278}, doi = {10.48550/ARXIV.2304.13278}, eprinttype = {arXiv}, eprint = {2304.13278}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-13278.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-14359, author = {Abdulrahman Alabduljabbar and Runyu Ma and Ahmed Abusnaina and Rhongho Jang and Songqing Chen and DaeHun Nyang and David Mohaisen}, title = {Measuring and Modeling the Free Content Web}, journal = {CoRR}, volume = {abs/2304.14359}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.14359}, doi = {10.48550/ARXIV.2304.14359}, eprinttype = {arXiv}, eprint = {2304.14359}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-14359.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-15366, author = {Soohyeon Choi and Rhongho Jang and DaeHun Nyang and David Mohaisen}, title = {Untargeted Code Authorship Evasion with Seq2Seq Transformation}, journal = {CoRR}, volume = {abs/2311.15366}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.15366}, doi = {10.48550/ARXIV.2311.15366}, eprinttype = {arXiv}, eprint = {2311.15366}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-15366.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlikhanovJAMNN22, author = {Jumabek Alikhanov and Rhongho Jang and Mohammed Abuhamad and David Mohaisen and Daehun Nyang and Youngtae Noh}, title = {Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches}, journal = {{IEEE} Access}, volume = {10}, pages = {5801--5823}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3137318}, doi = {10.1109/ACCESS.2021.3137318}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlikhanovJAMNN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/OmarCNM22, author = {Marwan Omar and Soohyeon Choi and Daehun Nyang and David Mohaisen}, title = {Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions}, journal = {{IEEE} Access}, volume = {10}, pages = {86038--86056}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3197769}, doi = {10.1109/ACCESS.2022.3197769}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/OmarCNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcmi/JungAMHN22, author = {Changhun Jung and Mohammed Abuhamad and David Mohaisen and Kyungja Han and DaeHun Nyang}, title = {{WBC} image classification and generative models based on convolutional neural network}, journal = {{BMC} Medical Imaging}, volume = {22}, number = {1}, pages = {94}, year = {2022}, url = {https://doi.org/10.1186/s12880-022-00818-1}, doi = {10.1186/S12880-022-00818-1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcmi/JungAMHN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChoiAAASWCNAM22, author = {Jinchun Choi and Afsah Anwar and Abdulrahman Alabduljabbar and Hisham Alasmary and Jeffrey Spaulding and An Wang and Songqing Chen and DaeHun Nyang and Amro Awad and David Mohaisen}, title = {Understanding Internet of Things malware by analyzing endpoints in their static artifacts}, journal = {Comput. Networks}, volume = {206}, pages = {108768}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.108768}, doi = {10.1016/J.COMNET.2022.108768}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChoiAAASWCNAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AlasmaryAAAAWNA22, author = {Hisham Alasmary and Afsah Anwar and Ahmed Abusnaina and Abdulrahman Alabduljabbar and Mohammed Abuhamad and An Wang and Daehun Nyang and Amro Awad and David Mohaisen}, title = {ShellCore: Automating Malicious IoT Software Detection Using Shell Commands Representation}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {4}, pages = {2485--2496}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3086398}, doi = {10.1109/JIOT.2021.3086398}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/AlasmaryAAAAWNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/AhmadSGNM22, author = {Ashar Ahmad and Muhammad Saad and Mohammed A. AlGhamdi and DaeHun Nyang and David Mohaisen}, title = {BlockTrail: {A} Service for Secure and Transparent Blockchain-Driven Audit Trails}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {1}, pages = {1367--1378}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2021.3097744}, doi = {10.1109/JSYST.2021.3097744}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/AhmadSGNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AbusnainaAAAJSN22, author = {Ahmed Abusnaina and Mohammed Abuhamad and Hisham Alasmary and Afsah Anwar and Rhongho Jang and Saeed Salem and DaeHun Nyang and David Mohaisen}, title = {{DL-FHMC:} Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3432--3447}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3097296}, doi = {10.1109/TDSC.2021.3097296}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AbusnainaAAAJSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/JangJMLN22, author = {Rhongho Jang and Changhun Jung and David Mohaisen and KyungHee Lee and DaeHun Nyang}, title = {A One-Page Text Entry Method Optimized for Rectangle Smartwatches}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {10}, pages = {3443--3454}, year = {2022}, url = {https://doi.org/10.1109/TMC.2021.3057226}, doi = {10.1109/TMC.2021.3057226}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/JangJMLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JungKJMN22, author = {Changhun Jung and Sian Kim and Rhongho Jang and David Mohaisen and DaeHun Nyang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {A Scalable and Dynamic {ACL} System for In-Network Defense}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1679--1693}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560606}, doi = {10.1145/3548606.3560606}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JungKJMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/AlqadhiATSNM22, author = {Mohamed Alqadhi and Abdulrahman Alabduljabbar and Kyle Thomas and Saeed Salem and DaeHun Nyang and David Mohaisen}, editor = {Thang N. Dinh and Minming Li}, title = {Do Content Management Systems Impact the Security of Free Content Websites?}, booktitle = {Computational Data and Social Networks - 11th International Conference, CSoNet 2022, Virtual Event, December 5-7, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13831}, pages = {141--154}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26303-3\_13}, doi = {10.1007/978-3-031-26303-3\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csonet/AlqadhiATSNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cysss/OmarCNM22, author = {Marwan Omar and Soohyeon Choi and Daehun Nyang and David Mohaisen}, editor = {Eric Chan{-}Tin and Shelia Kennison}, title = {Quantifying the Performance of Adversarial Training on Language Models with Distribution Shifts}, booktitle = {CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, Nagasaki, Japan, 30 May 2022}, pages = {3--9}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494108.3522764}, doi = {10.1145/3494108.3522764}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cysss/OmarCNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/DaoJJMN22, author = {Dinhnguyen Dao and Rhongho Jang and Changhun Jung and David Mohaisen and DaeHun Nyang}, title = {Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows}, booktitle = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022}, pages = {331--342}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSN53405.2022.00042}, doi = {10.1109/DSN53405.2022.00042}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/DaoJJMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AbusnainaAAAJNM22, author = {Ahmed Abusnaina and Afsah Anwar and Sultan Alshamrani and Abdulrahman Alabduljabbar and RhongHo Jang and DaeHun Nyang and David Mohaisen}, title = {Systematically Evaluating the Robustness of ML-based IoT Malware Detection Systems}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {308--320}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545960}, doi = {10.1145/3545948.3545960}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/AbusnainaAAAJNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-00768, author = {Marwan Omar and Soohyeon Choi and DaeHun Nyang and David Mohaisen}, title = {Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions}, journal = {CoRR}, volume = {abs/2201.00768}, year = {2022}, url = {https://arxiv.org/abs/2201.00768}, eprinttype = {arXiv}, eprint = {2201.00768}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-00768.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-12083, author = {Mohamed Alqadhi and Abdulrahman Alabduljabbar and Kyle Thomas and Saeed Salem and DaeHun Nyang and David Mohaisen}, title = {Do Content Management Systems Impact the Security of Free Content Websites? {A} Correlation Analysis}, journal = {CoRR}, volume = {abs/2210.12083}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.12083}, doi = {10.48550/ARXIV.2210.12083}, eprinttype = {arXiv}, eprint = {2210.12083}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-12083.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JungCJMN21, author = {Changhun Jung and Jinchun Choi and Rhongho Jang and David Mohaisen and DaeHun Nyang}, title = {A network-independent tool-based usable authentication system for Internet of Things devices}, journal = {Comput. Secur.}, volume = {108}, pages = {102338}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102338}, doi = {10.1016/J.COSE.2021.102338}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JungCJMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-blc/AhmadASNKM21, author = {Ashar Ahmad and Abdulrahman Alabduljabbar and Muhammad Saad and Daehun Nyang and Joongheon Kim and David Mohaisen}, title = {Empirically comparing the performance of blockchain's consensus algorithms}, journal = {{IET} Blockchain}, volume = {1}, number = {1}, pages = {56--64}, year = {2021}, url = {https://doi.org/10.1049/blc2.12007}, doi = {10.1049/BLC2.12007}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-blc/AhmadASNKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AbuhamadANM21, author = {Mohammed Abuhamad and Ahmed Abusnaina and Daehun Nyang and David Mohaisen}, title = {Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: {A} Contemporary Survey}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {1}, pages = {65--84}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3020076}, doi = {10.1109/JIOT.2020.3020076}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/AbuhamadANM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SaadKNM21, author = {Muhammad Saad and Joongheon Kim and DaeHun Nyang and David Mohaisen}, title = {Contra-{\({_\ast}\)}: Mechanisms for countering spam attacks on blockchain's memory pools}, journal = {J. Netw. Comput. Appl.}, volume = {179}, pages = {102971}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2020.102971}, doi = {10.1016/J.JNCA.2020.102971}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SaadKNM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BaekJMLN21, author = {SungHa Baek and Youngdon Jung and David Mohaisen and Sungjin Lee and DaeHun Nyang}, title = {SSD-Assisted Ransomware Detection and Data Recovery Techniques}, journal = {{IEEE} Trans. Computers}, volume = {70}, number = {10}, pages = {1762--1776}, year = {2021}, url = {https://doi.org/10.1109/TC.2020.3011214}, doi = {10.1109/TC.2020.3011214}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/BaekJMLN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbuhamadAMN21, author = {Mohammed Abuhamad and Tamer AbuHmed and David Mohaisen and Daehun Nyang}, title = {Large-scale and Robust Code Authorship Identification with Deep Feature Learning}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {23:1--23:35}, year = {2021}, url = {https://doi.org/10.1145/3461666}, doi = {10.1145/3461666}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AbuhamadAMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SaadQRNM21, author = {Muhammad Saad and Zhan Qin and Kui Ren and DaeHun Nyang and David Mohaisen}, title = {e-PoS: Making Proof-of-Stake Decentralized and Fair}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {32}, number = {8}, pages = {1961--1973}, year = {2021}, url = {https://doi.org/10.1109/TPDS.2020.3048853}, doi = {10.1109/TPDS.2020.3048853}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/SaadQRNM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/AbusnainaAAAJNM21, author = {Ahmed Abusnaina and Afsah Anwar and Sultan Alshamrani and Abdulrahman Alabduljabbar and Rhongho Jang and DaeHun Nyang and David Mohaisen}, title = {Systemically Evaluating the Robustness of ML-based IoT Malware Detectors}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021 - Supplemental Volume}, pages = {3--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN-S52858.2021.00012}, doi = {10.1109/DSN-S52858.2021.00012}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/AbusnainaAAAJNM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/AhmadSKNM21, author = {Ashar Ahmad and Muhammad Saad and Joongheon Kim and DaeHun Nyang and David Mohaisen}, title = {Performance Evaluation of Consensus Protocols in Blockchain-based Audit Systems}, booktitle = {International Conference on Information Networking, {ICOIN} 2021, Jeju Island, South Korea, January 13-16, 2021}, pages = {654--656}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICOIN50884.2021.9333867}, doi = {10.1109/ICOIN50884.2021.9333867}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/AhmadSKNM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/AlshamraniAANM21, author = {Sultan Alshamrani and Ahmed Abusnaina and Mohammed Abuhamad and Daehun Nyang and David Mohaisen}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube}, booktitle = {Companion of The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {508--515}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442442.3452314}, doi = {10.1145/3442442.3452314}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/AlshamraniAANM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-00330, author = {Muhammad Saad and Zhan Qin and Kui Ren and DaeHun Nyang and David Mohaisen}, title = {e-PoS: Making Proof-of-Stake Decentralized and Fair}, journal = {CoRR}, volume = {abs/2101.00330}, year = {2021}, url = {https://arxiv.org/abs/2101.00330}, eprinttype = {arXiv}, eprint = {2101.00330}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-00330.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-09050, author = {Sultan Alshamrani and Ahmed Abusnaina and Mohammed Abuhamad and Daehun Nyang and David Mohaisen}, title = {Hate, Obscenity, and Insults: Measuring the Exposure of Children to Inappropriate Comments in YouTube}, journal = {CoRR}, volume = {abs/2103.09050}, year = {2021}, url = {https://arxiv.org/abs/2103.09050}, eprinttype = {arXiv}, eprint = {2103.09050}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-09050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14217, author = {Afsah Anwar and Jinchun Choi and Abdulrahman Alabduljabbar and Hisham Alasmary and Jeffrey Spaulding and An Wang and Songqing Chen and DaeHun Nyang and Amro Awad and David Mohaisen}, title = {Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts}, journal = {CoRR}, volume = {abs/2103.14217}, year = {2021}, url = {https://arxiv.org/abs/2103.14217}, eprinttype = {arXiv}, eprint = {2103.14217}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14217.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14221, author = {Hisham Alasmary and Afsah Anwar and Ahmed Abusnaina and Abdulrahman Alabduljabbar and Mohammad Abuhamad and An Wang and DaeHun Nyang and Amro Awad and David Mohaisen}, title = {ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation}, journal = {CoRR}, volume = {abs/2103.14221}, year = {2021}, url = {https://arxiv.org/abs/2103.14221}, eprinttype = {arXiv}, eprint = {2103.14221}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14221.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-13373, author = {Ahmed Abusnaina and Afsah Anwar and Sultan Alshamrani and Abdulrahman Alabduljabbar and RhongHo Jang and Daehun Nyang and David Mohaisen}, title = {ML-based IoT Malware Detection Under Adversarial Settings: {A} Systematic Evaluation}, journal = {CoRR}, volume = {abs/2108.13373}, year = {2021}, url = {https://arxiv.org/abs/2108.13373}, eprinttype = {arXiv}, eprint = {2108.13373}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-13373.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-02759, author = {Sunyoung Kim and Changhun Jung and RhongHo Jang and David Mohaisen and DaeHun Nyang}, title = {Count-Less: {A} Counting Sketch for the Data Plane of High Speed Switches}, journal = {CoRR}, volume = {abs/2111.02759}, year = {2021}, url = {https://arxiv.org/abs/2111.02759}, eprinttype = {arXiv}, eprint = {2111.02759}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-02759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChoiAAAAPNM20, author = {Jinchun Choi and Mohammed Abuhamad and Ahmed Abusnaina and Afsah Anwar and Sultan Alshamrani and Jeman Park and Daehun Nyang and David Mohaisen}, title = {Understanding the Proxy Ecosystem: {A} Comparative Analysis of Residential and Open Proxies on the Internet}, journal = {{IEEE} Access}, volume = {8}, pages = {111368--111380}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3000959}, doi = {10.1109/ACCESS.2020.3000959}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChoiAAAAPNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ParkMNM20, author = {Jeman Park and Manar Mohaisen and DaeHun Nyang and Aziz Mohaisen}, title = {Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions}, journal = {Comput. Networks}, volume = {173}, pages = {107146}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107146}, doi = {10.1016/J.COMNET.2020.107146}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ParkMNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/SaadSNKSNM20, author = {Muhammad Saad and Jeffrey Spaulding and Laurent Njilla and Charles A. Kamhoua and Sachin Shetty and DaeHun Nyang and David Mohaisen}, title = {Exploring the Attack Surface of Blockchain: {A} Comprehensive Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {3}, pages = {1977--2008}, year = {2020}, url = {https://doi.org/10.1109/COMST.2020.2975999}, doi = {10.1109/COMST.2020.2975999}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/SaadSNKSNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AbuhamadAMN20, author = {Mohammed Abuhamad and Tamer AbuHmed and David Mohaisen and DaeHun Nyang}, title = {AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {6}, pages = {5008--5020}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2975779}, doi = {10.1109/JIOT.2020.2975779}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/AbuhamadAMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AbuhamadANM20, author = {Mohammed Abuhamad and Tamer AbuHmed and DaeHun Nyang and David Mohaisen}, title = {Multi-{\(\chi\)}: Identifying Multiple Authors from Source Code Files}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {3}, pages = {25--41}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0044}, doi = {10.2478/POPETS-2020-0044}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/AbuhamadANM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AnwarKCACSNM20, author = {Afsah Anwar and Aminollah Khormali and Jinchun Choi and Hisham Alasmary and Saeed Salem and DaeHun Nyang and David Mohaisen}, title = {Measuring the Cost of Software Vulnerabilities}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {7}, number = {23}, pages = {e1}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.164551}, doi = {10.4108/EAI.13-7-2018.164551}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/AnwarKCACSNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/SaadCNKM20, author = {Muhammad Saad and Jinchun Choi and DaeHun Nyang and Joongheon Kim and Aziz Mohaisen}, title = {Toward Characterizing Blockchain-Based Cryptocurrencies for Highly Accurate Predictions}, journal = {{IEEE} Syst. J.}, volume = {14}, number = {1}, pages = {321--332}, year = {2020}, url = {https://doi.org/10.1109/JSYST.2019.2927707}, doi = {10.1109/JSYST.2019.2927707}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/SaadCNKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohaisenGRLKNN20, author = {Aziz Mohaisen and Zhongshu Gu and Kui Ren and Zhenhua Li and Charles A. Kamhoua and Laurent L. Njilla and DaeHun Nyang}, title = {Look-Aside at Your Own Risk: Privacy Implications of {DNSSEC} Look-Aside Validation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {4}, pages = {745--759}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2816026}, doi = {10.1109/TDSC.2018.2816026}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohaisenGRLKNN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/JangKMN20, author = {Rhongho Jang and Jeonil Kang and Aziz Mohaisen and DaeHun Nyang}, title = {Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {19}, number = {5}, pages = {1056--1071}, year = {2020}, url = {https://doi.org/10.1109/TMC.2019.2903052}, doi = {10.1109/TMC.2019.2903052}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/JangKMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/AlshamraniAALNM20, author = {Sultan Alshamrani and Ahmed Abusnaina and Mohammed Abuhamad and Anho Lee and DaeHun Nyang and David Mohaisen}, editor = {Sriram Chellappan and Kim{-}Kwang Raymond Choo and NhatHai Phan}, title = {An Analysis of Users Engagement on Twitter During the {COVID-19} Pandemic: Topical Trends and Sentiments}, booktitle = {Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12575}, pages = {73--86}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66046-8\_7}, doi = {10.1007/978-3-030-66046-8\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csonet/AlshamraniAALNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/AlasmaryAJAANM20, author = {Hisham Alasmary and Ahmed Abusnaina and Rhongho Jang and Mohammed Abuhamad and Afsah Anwar and DaeHun Nyang and David Mohaisen}, title = {Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {888--898}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00089}, doi = {10.1109/ICDCS47774.2020.00089}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/AlasmaryAJAANM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JangMMMN20, author = {Rhongho Jang and DaeHong Min and Seongkwang Moon and David Mohaisen and DaeHun Nyang}, title = {SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {1339--1348}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOM41043.2020.9155252}, doi = {10.1109/INFOCOM41043.2020.9155252}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/JangMMMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AbusnainaJKNM20, author = {Ahmed Abusnaina and Rhongho Jang and Aminollah Khormali and DaeHun Nyang and David Mohaisen}, title = {{DFD:} Adversarial Learning-based Approach to Defend Against Website Fingerprinting}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {2459--2468}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOM41043.2020.9155465}, doi = {10.1109/INFOCOM41043.2020.9155465}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/AbusnainaJKNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/KhormaliACNM20, author = {Aminollah Khormali and Ahmed Abusnaina and Songqing Chen and DaeHun Nyang and David Mohaisen}, title = {From Blue-Sky to Practical Adversarial Learning}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {118--127}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00025}, doi = {10.1109/TPS-ISA50397.2020.00025}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/KhormaliACNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AbusnainaANC0M20, author = {Ahmed Abusnaina and Mohammed Abuhamad and DaeHun Nyang and Songqing Chen and An Wang and David Mohaisen}, editor = {Ilsun You}, title = {Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {362--374}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_27}, doi = {10.1007/978-3-030-65299-9\_27}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AbusnainaANC0M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-08578, author = {Mohammed Abuhamad and Ahmed Abusnaina and DaeHun Nyang and David Mohaisen}, title = {Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: {A} Survey}, journal = {CoRR}, volume = {abs/2001.08578}, year = {2020}, url = {https://arxiv.org/abs/2001.08578}, eprinttype = {arXiv}, eprint = {2001.08578}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-08578.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-04842, author = {Muhammad Saad and Joongheon Kim and DaeHun Nyang and David Mohaisen}, title = {Contra-*: Mechanisms for Countering Spam Attacks on Blockchain Memory Pools}, journal = {CoRR}, volume = {abs/2005.04842}, year = {2020}, url = {https://arxiv.org/abs/2005.04842}, eprinttype = {arXiv}, eprint = {2005.04842}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-04842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-07145, author = {Ahmed Abusnaina and Mohammed Abuhamad and Hisham Alasmary and Afsah Anwar and Rhongho Jang and Saeed Salem and DaeHun Nyang and David Mohaisen}, title = {A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification}, journal = {CoRR}, volume = {abs/2005.07145}, year = {2020}, url = {https://arxiv.org/abs/2005.07145}, eprinttype = {arXiv}, eprint = {2005.07145}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-07145.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-00146, author = {Aminollah Khormali and DaeHun Nyang and David Mohaisen}, title = {Generating Adversarial Examples with an Optimized Quality}, journal = {CoRR}, volume = {abs/2007.00146}, year = {2020}, url = {https://arxiv.org/abs/2007.00146}, eprinttype = {arXiv}, eprint = {2007.00146}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-00146.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/SpauldingPKNM19, author = {Jeffrey Spaulding and Jeman Park and Joongheon Kim and DaeHun Nyang and Aziz Mohaisen}, title = {Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using {DRIFT}}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {30}, number = {4}, year = {2019}, url = {https://doi.org/10.1002/ett.3505}, doi = {10.1002/ETT.3505}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/SpauldingPKNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AbuhamadRAUKN19, author = {Mohammed Abuhamad and Ji{-}su Rhim and Tamer AbuHmed and Sana Ullah and Sanggil Kang and DaeHun Nyang}, title = {Code authorship identification using convolutional neural networks}, journal = {Future Gener. Comput. Syst.}, volume = {95}, pages = {104--115}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.12.038}, doi = {10.1016/J.FUTURE.2018.12.038}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AbuhamadRAUKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AlasmaryKAPCAAN19, author = {Hisham Alasmary and Aminollah Khormali and Afsah Anwar and Jeman Park and Jinchun Choi and Ahmed Abusnaina and Amro Awad and DaeHun Nyang and Aziz Mohaisen}, title = {Analyzing and Detecting Emerging Internet of Things Malware: {A} Graph-Based Approach}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {5}, pages = {8977--8988}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2925929}, doi = {10.1109/JIOT.2019.2925929}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/AlasmaryKAPCAAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ParkCNM19, author = {Jeman Park and Jinchun Choi and DaeHun Nyang and Aziz Mohaisen}, title = {Transparency in the New gTLD Era: Evaluating the {DNS} Centralized Zone Data Service}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {16}, number = {4}, pages = {1782--1796}, year = {2019}, url = {https://doi.org/10.1109/TNSM.2019.2941572}, doi = {10.1109/TNSM.2019.2941572}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/ParkCNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/AbusnainaNYM19, author = {Ahmed Abusnaina and DaeHun Nyang and Murat Yuksel and Aziz Mohaisen}, title = {Examining the Security of DDoS Detection Systems in Software Defined Networks}, booktitle = {Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2019, Companion Volume, Orlando, FL, USA, December 9-12, 2019}, pages = {49--50}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3360468.3368174}, doi = {10.1145/3360468.3368174}, timestamp = {Thu, 28 Nov 2019 12:23:19 +0100}, biburl = {https://dblp.org/rec/conf/conext/AbusnainaNYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/AbusnainaAASNM19, author = {Ahmed Abusnaina and Hisham Alasmary and Mohammed Abuhamad and Saeed Salem and DaeHun Nyang and Aziz Mohaisen}, editor = {Andrea Tagarelli and Hanghang Tong}, title = {Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems}, booktitle = {Computational Data and Social Networks - 8th International Conference, CSoNet 2019, Ho Chi Minh City, Vietnam, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11917}, pages = {268--281}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34980-6\_30}, doi = {10.1007/978-3-030-34980-6\_30}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csonet/AbusnainaAASNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/AbusnainaKNYM19, author = {Ahmed Abusnaina and Aminollah Khormali and DaeHun Nyang and Murat Yuksel and Aziz Mohaisen}, title = {Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937669}, doi = {10.1109/DSC47296.2019.8937669}, timestamp = {Mon, 16 Mar 2020 18:03:41 +0100}, biburl = {https://dblp.org/rec/conf/desec/AbusnainaKNYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChoiAA0CNM19, author = {Jinchun Choi and Ahmed Abusnaina and Afsah Anwar and An Wang and Songqing Chen and DaeHun Nyang and Aziz Mohaisen}, title = {Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937574}, doi = {10.1109/DSC47296.2019.8937574}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChoiAA0CNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/ChoiAASNM19, author = {Jinchun Choi and Afsah Anwar and Hisham Alasmary and Jeffrey Spaulding and DaeHun Nyang and Aziz Mohaisen}, editor = {Songqing Chen and Ryokichi Onishi and Ganesh Ananthanarayanan and Qun Li}, title = {IoT malware ecosystem in the wild: a glimpse into analysis and exposures}, booktitle = {Proceedings of the 4th {ACM/IEEE} Symposium on Edge Computing, {SEC} 2019, Arlington, Virginia, USA, November 7-9, 2019}, pages = {413--418}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3318216.3363379}, doi = {10.1145/3318216.3363379}, timestamp = {Thu, 21 Sep 2023 13:15:55 +0200}, biburl = {https://dblp.org/rec/conf/edge/ChoiAASNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/SaadNKKNM19, author = {Muhammad Saad and Laurent Njilla and Charles A. Kamhoua and Joongheon Kim and DaeHun Nyang and Aziz Mohaisen}, title = {Mempool optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2019, Seoul, Korea (South), May 14-17, 2019}, pages = {285--292}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BLOC.2019.8751476}, doi = {10.1109/BLOC.2019.8751476}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbc2/SaadNKKNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/JangMNMN19, author = {Rhongho Jang and Seongkwang Moon and Youngtae Noh and Aziz Mohaisen and DaeHun Nyang}, title = {InstaMeasure: Instant Per-flow Detection Using Large In-DRAM Working Set of Active Flows}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {2047--2056}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00202}, doi = {10.1109/ICDCS.2019.00202}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/JangMNMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/SonJNN19, author = {Jinho Son and Hyunwoo Jo and DaeHun Nyang and Youngtae Noh}, editor = {Junehwa Song and Minkyong Kim and Nicholas D. Lane and Rajesh Krishna Balan and Fahim Kawsar and Yunxin Liu}, title = {Distributed Network Resource Sharing {AP} in Inter-WLAN Environments}, booktitle = {Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, Seoul, Republic of Korea, June 17-21, 2019}, pages = {584--585}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3307334.3328637}, doi = {10.1145/3307334.3328637}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/SonJNN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JangMNMN19, author = {Rhongho Jang and Seongkwang Moon and Youngtae Noh and Aziz Mohaisen and DaeHun Nyang}, title = {A cost-effective anomaly detection system using in-DRAM working set of active flows table: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {286--287}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326294}, doi = {10.1145/3317549.3326294}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JangMNMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChoiAASNM19, author = {Jinchun Choi and Afsah Anwar and Hisham Alasmary and Jeffrey Spaulding and DaeHun Nyang and Aziz Mohaisen}, title = {Analyzing endpoints in the internet of things malware: poster}, booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019}, pages = {288--289}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317549.3326295}, doi = {10.1145/3317549.3326295}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ChoiAASNM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-01185, author = {Aziz Mohaisen and Omar Alrawi and Jeman Park and Joongheon Kim and DaeHun Nyang and Manar Mohaisen}, title = {Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering}, journal = {CoRR}, volume = {abs/1901.01185}, year = {2019}, url = {http://arxiv.org/abs/1901.01185}, eprinttype = {arXiv}, eprint = {1901.01185}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-01185.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-03531, author = {Jinchun Choi and Afsah Anwar and Hisham Alasmary and Jeffrey Spaulding and DaeHun Nyang and Aziz Mohaisen}, title = {Analyzing Endpoints in the Internet of Things Malware}, journal = {CoRR}, volume = {abs/1902.03531}, year = {2019}, url = {http://arxiv.org/abs/1902.03531}, eprinttype = {arXiv}, eprint = {1902.03531}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-03531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-03955, author = {Hisham Alasmary and Aminollah Khormali and Afsah Anwar and Jeman Park and Jinchun Choi and DaeHun Nyang and Aziz Mohaisen}, title = {Analyzing, Comparing, and Detecting Emerging Malware: {A} Graph-based Approach}, journal = {CoRR}, volume = {abs/1902.03955}, year = {2019}, url = {http://arxiv.org/abs/1902.03955}, eprinttype = {arXiv}, eprint = {1902.03955}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-03955.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-04143, author = {RhongHo Jang and Seongkwang Moon and Youngtae Noh and Aziz Mohaisen and DaeHun Nyang}, title = {Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table}, journal = {CoRR}, volume = {abs/1902.04143}, year = {2019}, url = {http://arxiv.org/abs/1902.04143}, eprinttype = {arXiv}, eprint = {1902.04143}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-04143.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-03487, author = {Muhammad Saad and Jeffrey Spaulding and Laurent Njilla and Charles A. Kamhoua and Sachin Shetty and DaeHun Nyang and Aziz Mohaisen}, title = {Exploring the Attack Surface of Blockchain: {A} Systematic Overview}, journal = {CoRR}, volume = {abs/1904.03487}, year = {2019}, url = {http://arxiv.org/abs/1904.03487}, eprinttype = {arXiv}, eprint = {1904.03487}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-03487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-09735, author = {Aminollah Khormali and Ahmed Abusnaina and Songqing Chen and DaeHun Nyang and Aziz Mohaisen}, title = {{COPYCAT:} Practical Adversarial Attacks on Visualization-Based Malware Detection}, journal = {CoRR}, volume = {abs/1909.09735}, year = {2019}, url = {http://arxiv.org/abs/1909.09735}, eprinttype = {arXiv}, eprint = {1909.09735}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-09735.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-01091, author = {Changhun Jung and Mohammed Abuhamad and Jumabek Alikhanov and Aziz Mohaisen and Kyungja Han and DaeHun Nyang}, title = {W-Net: {A} CNN-based Architecture for White Blood Cells Image Classification}, journal = {CoRR}, volume = {abs/1910.01091}, year = {2019}, url = {http://arxiv.org/abs/1910.01091}, eprinttype = {arXiv}, eprint = {1910.01091}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-01091.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NyangKLKCLM18, author = {DaeHun Nyang and Hyoungshick Kim and Woojoo Lee and Sung{-}bae Kang and Geumhwan Cho and Mun{-}Kyu Lee and Aziz Mohaisen}, title = {Two-Thumbs-Up: Physical protection for {PIN} entry secure against recording attacks}, journal = {Comput. Secur.}, volume = {78}, pages = {1--15}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.05.012}, doi = {10.1016/J.COSE.2018.05.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NyangKLKCLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/MohaisenAPKNM18, author = {Aziz Mohaisen and Omar Alrawi and Jeman Park and Joongheon Kim and DaeHun Nyang and Manar Mohaisen}, title = {Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {16}, pages = {e2}, year = {2018}, url = {https://doi.org/10.4108/eai.13-7-2018.156002}, doi = {10.4108/EAI.13-7-2018.156002}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/MohaisenAPKNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbuhamadAMN18, author = {Mohammed Abuhamad and Tamer AbuHmed and Aziz Mohaisen and DaeHun Nyang}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Large-Scale and Language-Oblivious Code Authorship Identification}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {101--114}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243738}, doi = {10.1145/3243734.3243738}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AbuhamadAMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/AlasmaryA0CNM18, author = {Hisham Alasmary and Afsah Anwar and Jeman Park and Jinchun Choi and DaeHun Nyang and Aziz Mohaisen}, editor = {Xuemin Chen and Arunabha Sen and Wei Wayne Li and My T. Thai}, title = {Graph-Based Comparison of IoT and Android Malware}, booktitle = {Computational Data and Social Networks - 7th International Conference, CSoNet 2018, Shanghai, China, December 18-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11280}, pages = {259--272}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04648-4\_22}, doi = {10.1007/978-3-030-04648-4\_22}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csonet/AlasmaryA0CNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/JungKMN18, author = {Changhun Jung and Jeonil Kang and Aziz Mohaisen and DaeHun Nyang}, title = {Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions}, booktitle = {2018 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2018, Calgary, AB, Canada, April 15-20, 2018}, pages = {6956--6960}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICASSP.2018.8462341}, doi = {10.1109/ICASSP.2018.8462341}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/JungKMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/BaekJMLN18, author = {SungHa Baek and Youngdon Jung and Aziz Mohaisen and Sungjin Lee and DaeHun Nyang}, title = {SSD-Insider: Internal Defense of Solid-State Drive against Ransomware with Perfect Data Recovery}, booktitle = {38th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2018, Vienna, Austria, July 2-6, 2018}, pages = {875--884}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICDCS.2018.00089}, doi = {10.1109/ICDCS.2018.00089}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/BaekJMLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/0001NM18, author = {Jeman Park and DaeHun Nyang and Aziz Mohaisen}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514210}, doi = {10.1109/PST.2018.8514210}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/0001NM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AnwarKNM18, author = {Afsah Anwar and Aminollah Khormali and DaeHun Nyang and Aziz Mohaisen}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, pages = {377--395}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9\_21}, doi = {10.1007/978-3-030-01701-9\_21}, timestamp = {Fri, 11 Jan 2019 16:12:16 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AnwarKNM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-11263, author = {DaeHun Nyang}, title = {Gruut: {A} Fully-Decentralized {P2P} Public Ledger}, journal = {CoRR}, volume = {abs/1806.11263}, year = {2018}, url = {http://arxiv.org/abs/1806.11263}, eprinttype = {arXiv}, eprint = {1806.11263}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-11263.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/KangN17, author = {Jeonil Kang and DaeHun Nyang}, title = {A Privacy-Preserving Mobile Payment System for Mass Transit}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {18}, number = {8}, pages = {2192--2205}, year = {2017}, url = {https://doi.org/10.1109/TITS.2016.2636919}, doi = {10.1109/TITS.2016.2636919}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/KangN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotweb/SpauldingNM17, author = {Jeffrey Spaulding and DaeHun Nyang and Aziz Mohaisen}, editor = {Qun Li and Songqing Chen}, title = {Understanding the effectiveness of typosquatting techniques}, booktitle = {Proceedings of the fifth {ACM/IEEE} Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2017, San Jose / Silicon Valley, CA, USA, October 12 - 14, 2017}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3132465.3132467}, doi = {10.1145/3132465.3132467}, timestamp = {Thu, 21 Sep 2023 13:15:55 +0200}, biburl = {https://dblp.org/rec/conf/hotweb/SpauldingNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/JangKMN17, author = {RhongHo Jang and Jeonil Kang and Aziz Mohaisen and DaeHun Nyang}, editor = {Kisung Lee and Ling Liu}, title = {Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2515--2520}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.153}, doi = {10.1109/ICDCS.2017.153}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/JangKMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JangCNN17, author = {RhongHo Jang and DongGyu Cho and Youngtae Noh and DaeHun Nyang}, title = {RFlow\({}^{\mbox{+}}\): An SDN-based {WLAN} monitoring and management framework}, booktitle = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017, Atlanta, GA, USA, May 1-4, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFOCOM.2017.8056995}, doi = {10.1109/INFOCOM.2017.8056995}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JangCNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/KimMLN17, author = {Joongheon Kim and Yeong Jong Mo and Woojoo Lee and DaeHun Nyang}, title = {Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {192--193}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.22}, doi = {10.1109/PAC.2017.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/KimMLN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/MohaisenG0NKN17, author = {Aziz Mohaisen and Zhongshu Gu and Kui Ren and Laurent Njilla and Charles A. Kamhoua and DaeHun Nyang}, title = {Understanding the Privacy Implications of {DNSSEC} Look-Aside Validation}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {208--209}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.38}, doi = {10.1109/PAC.2017.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/MohaisenG0NKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JangKMN17, author = {RhongHo Jang and Jeonil Kang and Aziz Mohaisen and DaeHun Nyang}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Highly-accurate rogue access point detection using intentional channel interference: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {277--278}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106024}, doi = {10.1145/3098243.3106024}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JangKMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/JangCMNN17, author = {RhongHo Jang and DongGyu Cho and Aziz Mohaisen and Youngtae Noh and DaeHun Nyang}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Two-level network monitoring and management in {WLAN} using software-defined networking: poster}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {279--280}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3106025}, doi = {10.1145/3098243.3106025}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/JangCMNN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LeeMSN16, author = {Mun{-}Kyu Lee and Pierre Michaud and Jeong Seop Sim and DaeHun Nyang}, title = {A simple proof of optimality for the {MIN} cache replacement policy}, journal = {Inf. Process. Lett.}, volume = {116}, number = {2}, pages = {168--170}, year = {2016}, url = {https://doi.org/10.1016/j.ipl.2015.09.004}, doi = {10.1016/J.IPL.2015.09.004}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/LeeMSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/HwangECLN16, author = {Jung Yeon Hwang and Sungwook Eom and Ku{-}Young Chang and Pil Joong Lee and DaeHun Nyang}, title = {Anonymity-based authenticated key agreement with full binding property}, journal = {J. Commun. Networks}, volume = {18}, number = {2}, pages = {190--200}, year = {2016}, url = {https://doi.org/10.1109/JCN.2016.000028}, doi = {10.1109/JCN.2016.000028}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/HwangECLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/NyangS16, author = {DaeHun Nyang and DongOh Shin}, title = {Recyclable Counter With Confinement for Real-Time Per-Flow Measurement}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {5}, pages = {3191--3203}, year = {2016}, url = {https://doi.org/10.1109/TNET.2016.2514523}, doi = {10.1109/TNET.2016.2514523}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/NyangS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/ImCNL16, author = {Jong{-}Hyuk Im and Jinchun Choi and DaeHun Nyang and Mun{-}Kyu Lee}, title = {Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption}, booktitle = {2016 {IEEE} 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2016, Auckland, New Zealand, August 8-12, 2016}, pages = {878--881}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.150}, doi = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2016.150}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/ImCNL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaengMLN15, author = {YoungJae Maeng and Aziz Mohaisen and Mun{-}Kyu Lee and DaeHun Nyang}, title = {Transaction authentication using complementary colors}, journal = {Comput. Secur.}, volume = {48}, pages = {167--181}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.001}, doi = {10.1016/J.COSE.2014.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaengMLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/thms/AbuHmedLN15, author = {Tamer AbuHmed and KyungHee Lee and DaeHun Nyang}, title = {{UOIT} Keyboard: {A} Constructive Keyboard for Small Touchscreen Devices}, journal = {{IEEE} Trans. Hum. Mach. Syst.}, volume = {45}, number = {6}, pages = {782--789}, year = {2015}, url = {https://doi.org/10.1109/THMS.2015.2449309}, doi = {10.1109/THMS.2015.2449309}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/thms/AbuHmedLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HwangCCN15, author = {Jung Yeon Hwang and Liqun Chen and Hyun Sook Cho and DaeHun Nyang}, title = {Short Dynamic Group Signature Scheme Supporting Controllable Linkability}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {6}, pages = {1109--1124}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2390497}, doi = {10.1109/TIFS.2015.2390497}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HwangCCN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/KangNL14, author = {Jeonil Kang and DaeHun Nyang and KyungHee Lee}, title = {Two-factor face authentication using matrix permutation transformation and a user password}, journal = {Inf. Sci.}, volume = {269}, pages = {1--20}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.02.011}, doi = {10.1016/J.INS.2014.02.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/KangNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/NyangMK14, author = {DaeHun Nyang and Aziz Mohaisen and Jeonil Kang}, title = {Keylogging-Resistant Visual Authentication Protocols}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {13}, number = {11}, pages = {2566--2579}, year = {2014}, url = {https://doi.org/10.1109/TMC.2014.2307331}, doi = {10.1109/TMC.2014.2307331}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/NyangMK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HwangLCCN13, author = {Jung Yeon Hwang and Sokjoon Lee and Byung{-}Ho Chung and Hyun Sook Cho and DaeHun Nyang}, title = {Group signatures with controllable linkability for dynamic membership}, journal = {Inf. Sci.}, volume = {222}, pages = {761--778}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2012.07.065}, doi = {10.1016/J.INS.2012.07.065}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HwangLCCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HwangECLN12, author = {Jung Yeon Hwang and Sungwook Eom and Ku{-}Young Chang and Pil Joong Lee and DaeHun Nyang}, editor = {Dong Hoon Lee and Moti Yung}, title = {Anonymity-Based Authenticated Key Agreement with Full Binding Property}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {177--191}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_13}, doi = {10.1007/978-3-642-35416-8\_13}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HwangECLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/AbuHmedKNL11, author = {Tamer AbuHmed and Jeonil Kang and DaeHun Nyang and KyungHee Lee}, title = {A Software-Based Group Attestation for Wireless Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {13}, number = {1-2}, pages = {121--154}, year = {2011}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-13-number-1-2-2011/ahswn-13-1-2-p-121-154/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/AbuHmedKNL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KimYLN11, author = {Kitae Kim and Ikkwon Yie and Seongan Lim and Daehun Nyang}, title = {Batch Verification and Finding Invalid Signatures in a Group Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {2}, pages = {61--70}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p61-70.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KimYLN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/deis/KiHNLL11, author = {JuHee Ki and Jung Yeon Hwang and DaeHun Nyang and Dong Hoon Lee and Jongin Lim}, editor = {Ezendu Ariwa and Eyas El{-}Qawasmeh}, title = {Privacy-Enhanced Deniable Authentication E-Mail Service}, booktitle = {Digital Enterprise and Information Systems - International Conference, {DEIS} 2011, London, UK, July 20 - 22, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {194}, pages = {16--29}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22603-8\_2}, doi = {10.1007/978-3-642-22603-8\_2}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/deis/KiHNLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/MohaisenAKKN11, author = {Abedelaziz Mohaisen and Tamer AbuHmed and Hun Jeong Kang and Yongdae Kim and DaeHun Nyang}, editor = {Suk{-}Han Lee and Lajos Hanzo and Min Young Chung and Sang{-}Won Lee and Kwangsu Cho}, title = {Mistaking friends for foes: an analysis of a social network-based Sybil defense in mobile networks}, booktitle = {Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2011, Seoul, Republic of Korea, February 21 - 23, 2011}, pages = {28}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1968613.1968648}, doi = {10.1145/1968613.1968648}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/MohaisenAKKN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2010, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24209-0}, doi = {10.1007/978-3-642-24209-0}, isbn = {978-3-642-24208-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-2245, author = {DaeHun Nyang and Abedelaziz Mohaisen and Taekyoung Kwon and Brent ByungHoon Kang and Angelos Stavrou}, title = {Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface}, journal = {CoRR}, volume = {abs/1112.2245}, year = {2011}, url = {http://arxiv.org/abs/1112.2245}, eprinttype = {arXiv}, eprint = {1112.2245}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-2245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MohaisenJHN10, author = {Abedelaziz Mohaisen and Nam{-}Su Jho and Dowon Hong and DaeHun Nyang}, title = {Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {2}, pages = {315--325}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.315}, doi = {10.1587/TRANSINF.E93.D.315}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MohaisenJHN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/KimYN10, author = {Kitae Kim and Ikkwon Yie and Daehun Nyang}, title = {On the Security of Two Group Signature Schemes with Forward Security}, journal = {Informatica (Slovenia)}, volume = {34}, number = {2}, pages = {237--242}, year = {2010}, url = {http://www.informatica.si/index.php/informatica/article/view/295}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/KimYN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/MohaisenN10, author = {Abedelaziz Mohaisen and DaeHun Nyang}, title = {On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network}, journal = {J. Commun.}, volume = {5}, number = {2}, pages = {164--168}, year = {2010}, url = {https://doi.org/10.4304/jcm.5.2.164-168}, doi = {10.4304/JCM.5.2.164-168}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcm/MohaisenN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimN10, author = {Kitae Kim and Daehun Nyang}, title = {Security Analysis of a Threshold Proxy Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2010}, url = {http://eprint.iacr.org/2010/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NyangY09, author = {DaeHun Nyang and Akihiro Yamamura}, title = {More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {7}, pages = {1720--1723}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1720}, doi = {10.1587/TRANSFUN.E92.A.1720}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NyangY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MohaisenNL09, author = {Abedelaziz Mohaisen and DaeHun Nyang and KyungHee Lee}, title = {Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks}, journal = {Int. J. Netw. Secur.}, volume = {8}, number = {3}, pages = {282--292}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n3/ijns-2009-v8-n3-p282-292.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MohaisenNL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MohaisenNMLH09, author = {Abedelaziz Mohaisen and DaeHun Nyang and YoungJae Maeng and KyungHee Lee and Dowon Hong}, title = {Grid-Based Key Pre-Distribution in Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {3}, number = {2}, pages = {195--208}, year = {2009}, url = {https://doi.org/10.3837/tiis.2009.02.005}, doi = {10.3837/TIIS.2009.02.005}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MohaisenNMLH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AbuHmedNN09, author = {Tamer AbuHmed and Nandinbold Nyamaa and DaeHun Nyang}, title = {Software-Based Remote Code Attestation in Wireless Sensor Network}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425280}, doi = {10.1109/GLOCOM.2009.5425280}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/AbuHmedNN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/NiNW09, author = {YongQing Ni and DaeHun Nyang and Xu Wang}, title = {A-Kad: an anonymous {P2P} protocol based on Kad network}, booktitle = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China}, pages = {747--752}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MOBHOC.2009.5336924}, doi = {10.1109/MOBHOC.2009.5336924}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/NiNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0903-2682, author = {Abedelaziz Mohaisen and Dowon Hong and DaeHun Nyang}, title = {Privacy in Location Based Services: Primitives Toward the Solution}, journal = {CoRR}, volume = {abs/0903.2682}, year = {2009}, url = {http://arxiv.org/abs/0903.2682}, eprinttype = {arXiv}, eprint = {0903.2682}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0903-2682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NyangL09, author = {DaeHun Nyang and Mun{-}Kyu Lee}, title = {Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2009}, url = {http://eprint.iacr.org/2009/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NyangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MohaisenNA08, author = {Abedelaziz Mohaisen and DaeHun Nyang and Tamer AbuHmed}, title = {Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {2}, number = {5}, pages = {222--238}, year = {2008}, url = {https://doi.org/10.3837/tiis.2008.05.001}, doi = {10.3837/TIIS.2008.05.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MohaisenNA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/MohaisenHN08, author = {Abedelaziz Mohaisen and Dowon Hong and DaeHun Nyang}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Yun Ji Na}, title = {Privacy in Location Based Services: Primitives Toward the Solution}, booktitle = {{NCM} 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 1}, pages = {572--579}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/NCM.2008.137}, doi = {10.1109/NCM.2008.137}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/MohaisenHN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/MohaisenJHJN08, author = {Abedelaziz Mohaisen and Ik Rae Jeong and Dowon Hong and Nam{-}Su Jho and DaeHun Nyang}, editor = {Frode Eika Sandnes and Yan Zhang and Chunming Rong and Laurence Tianruo Yang and Jianhua Ma}, title = {Data Randomization for Lightweight Secure Data Aggregation in Sensor Network}, booktitle = {Ubiquitous Intelligence and Computing, 5th International Conference, {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5061}, pages = {338--351}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69293-5\_27}, doi = {10.1007/978-3-540-69293-5\_27}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/MohaisenJHJN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/MohaisenMKNLHH08, author = {Abedelaziz Mohaisen and YoungJae Maeng and Jeonil Kang and DaeHun Nyang and KyungHee Lee and Dowon Hong and Jong Wook Han}, editor = {Frode Eika Sandnes and Yan Zhang and Chunming Rong and Laurence Tianruo Yang and Jianhua Ma}, title = {Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network}, booktitle = {Ubiquitous Intelligence and Computing, 5th International Conference, {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5061}, pages = {548--562}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69293-5\_43}, doi = {10.1007/978-3-540-69293-5\_43}, timestamp = {Tue, 03 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/MohaisenMKNLHH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0803-0037, author = {Tamer AbuHmed and Abedelaziz Mohaisen and DaeHun Nyang}, title = {A Survey on Deep Packet Inspection for Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/0803.0037}, year = {2008}, url = {http://arxiv.org/abs/0803.0037}, eprinttype = {arXiv}, eprint = {0803.0037}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0803-0037.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0803-1111, author = {Abedelaziz Mohaisen and DaeHun Nyang and KyungHee Lee}, title = {Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/0803.1111}, year = {2008}, url = {http://arxiv.org/abs/0803.1111}, eprinttype = {arXiv}, eprint = {0803.1111}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0803-1111.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/KimCNHS07, author = {Sinkyu Kim and Jae{-}Woo Choi and DaeHun Nyang and GeneBeck Hahn and JooSeok Song}, title = {Smart Proactive Caching Scheme for Fast Authenticated Handoff in Wireless {LAN}}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {3}, pages = {476--480}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9048-0}, doi = {10.1007/S11390-007-9048-0}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/KimCNHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/NyangL07, author = {DaeHun Nyang and KyungHee Lee}, editor = {Constantine Stephanidis}, title = {Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features}, booktitle = {Universal Access in Human Computer Interaction. Coping with Diversity, 4th International Conference on Universal Access in Human-Computer Interaction, {UAHCI} 2007, Held as Part of {HCI} International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4554}, pages = {491--496}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73279-2\_55}, doi = {10.1007/978-3-540-73279-2\_55}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/NyangL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KangNMCK07, author = {Jeonil Kang and DaeHun Nyang and Abedelaziz Mohaisen and Young{-}Geun Choi and KoonSoon Kim}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4707}, pages = {886--899}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74484-9\_75}, doi = {10.1007/978-3-540-74484-9\_75}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KangNMCK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ChoiKN07, author = {Young{-}Geun Choi and Jeonil Kang and DaeHun Nyang}, editor = {Osvaldo Gervasi and Marina L. Gavrilova}, title = {Proactive Code Verification Protocol in Wireless Sensor Network}, booktitle = {Computational Science and Its Applications - {ICCSA} 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4706}, pages = {1085--1096}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74477-1\_97}, doi = {10.1007/978-3-540-74477-1\_97}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ChoiKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/MohaisenNML07, author = {Abedelaziz Mohaisen and DaeHun Nyang and YoungJae Maeng and KyungHee Lee}, editor = {Hongke Zhang and Stephan Olariu and Jiannong Cao and David B. Johnson}, title = {Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network}, booktitle = {Mobile Ad-Hoc and Sensor Networks, Third International Conference, {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4864}, pages = {822--833}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77024-4\_74}, doi = {10.1007/978-3-540-77024-4\_74}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/msn/MohaisenNML07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/MohaisenMN07, author = {Abedelaziz Mohaisen and YoungJae Maeng and DaeHun Nyang}, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {On Grid-Based Key Pre-distribution: Toward a Better Connectivity in Wireless Sensor Network}, booktitle = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, pages = {527--537}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3\_53}, doi = {10.1007/978-3-540-77018-3\_53}, timestamp = {Fri, 09 Apr 2021 17:11:17 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/MohaisenMN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/MaengMN07, author = {YoungJae Maeng and Abedelaziz Mohaisen and DaeHun Nyang}, editor = {Jadwiga Indulska and Jianhua Ma and Laurence Tianruo Yang and Theo Ungerer and Jiannong Cao}, title = {Secret Key Revocation in Sensor Networks}, booktitle = {Ubiquitous Intelligence and Computing, 4th International Conference, {UIC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4611}, pages = {1222--1232}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73549-6\_119}, doi = {10.1007/978-3-540-73549-6\_119}, timestamp = {Wed, 31 Jan 2024 08:24:33 +0100}, biburl = {https://dblp.org/rec/conf/uic/MaengMN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LeiNLL06, author = {Zhu Lei and DaeHun Nyang and KyungHee Lee and Hyotaek Lim}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {683--693}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_71}, doi = {10.1007/978-3-540-74377-4\_71}, timestamp = {Tue, 19 Nov 2019 12:34:54 +0100}, biburl = {https://dblp.org/rec/conf/cis/LeiNLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/LeeNS06, author = {HongKi Lee and DaeHun Nyang and JooSeok Song}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {281--290}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_29}, doi = {10.1007/11807964\_29}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/LeeNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/MohaisenN06, author = {Abedelaziz Mohaisen and DaeHun Nyang}, editor = {Kay R{\"{o}}mer and Holger Karl and Friedemann Mattern}, title = {Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks}, booktitle = {Wireless Sensor Networks, Third European Workshop, {EWSN} 2006, Zurich, Switzerland, February 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3868}, pages = {83--98}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11669463\_9}, doi = {10.1007/11669463\_9}, timestamp = {Thu, 14 Oct 2021 10:30:13 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/MohaisenN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/LimNKLL06, author = {Jihyung Lim and DaeHun Nyang and Jeonil Kang and KyungHee Lee and Hyotaek Lim}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3983}, pages = {380--387}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751632\_41}, doi = {10.1007/11751632\_41}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/LimNKLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/NyangM06, author = {DaeHun Nyang and Abedelaziz Mohaisen}, editor = {Jianhua Ma and Hai Jin and Laurence Tianruo Yang and Jeffrey J. P. Tsai}, title = {Cooperative Public Key Authentication Protocol in Wireless Sensor Network}, booktitle = {Ubiquitous Intelligence and Computing, Third International Conference, {UIC} 2006, Wuhan, China, September 3-6, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4159}, pages = {864--873}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11833529\_88}, doi = {10.1007/11833529\_88}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/NyangM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/KangN05, author = {Jeonil Kang and DaeHun Nyang}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {{RFID} Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {164--175}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_14}, doi = {10.1007/11601494\_14}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/KangN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ParkKN05, author = {JuSung Park and Jeonil Kang and DaeHun Nyang}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan{-}Shun Dai and Laurence Tianruo Yang}, title = {Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for {RFID}}, booktitle = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3823}, pages = {383--392}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596042\_40}, doi = {10.1007/11596042\_40}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/ParkKN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwbrs/KangNL05, author = {Jeonil Kang and DaeHun Nyang and KyungHee Lee}, editor = {Stan Z. Li and Zhenan Sun and Tieniu Tan and Sharath Pankanti and G{\'{e}}rard Chollet and David Zhang}, title = {Two Factor Face Authentication Scheme with Cancelable Feature}, booktitle = {Advances in Biometric Person Authentication, International Workshop on Biometric Recognition Systems, IWBRS2005, Beijing, China, October 22-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3781}, pages = {67--76}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11569947\_9}, doi = {10.1007/11569947\_9}, timestamp = {Thu, 17 Oct 2019 12:39:20 +0200}, biburl = {https://dblp.org/rec/conf/iwbrs/KangNL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/others/05/LimCN05, author = {Hyotaek Lim and Saebom Choi and DaeHun Nyang}, editor = {Tuna Tugcu and Erol Gelenbe and M. Ufuk {\c{C}}aglayan and Fatih Alag{\"{o}}z}, title = {Implementation and Performance Analysis of iSCSI-based Virtual Storage System with Wireless Networks}, booktitle = {New Trends in Computer Networks}, series = {Advances in Computer Science and Engineering : Reports and Monographs}, volume = {1}, publisher = {Imperial College Press}, year = {2005}, url = {https://doi.org/10.1142/9781860947308\_0016}, doi = {10.1142/9781860947308\_0016}, timestamp = {Mon, 22 Jun 2020 14:58:58 +0200}, biburl = {https://dblp.org/rec/books/others/05/LimCN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/LimND04, author = {Hyotaek Lim and DaeHun Nyang and David Hung{-}Chang Du}, editor = {Hyun{-}Kook Kahng}, title = {An Efficient Video Prefix-Caching Scheme in Wide Area Networks}, booktitle = {Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference {ICOIN} 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3090}, pages = {679--688}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25978-7\_68}, doi = {10.1007/978-3-540-25978-7\_68}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/icoin/LimND04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/KangOCCN04, author = {You Sung Kang and KyungHee Oh and Byung{-}Ho Chung and Kyoil Chung and DaeHun Nyang}, editor = {Hyun{-}Kook Kahng}, title = {Analysis and Countermeasure on Vulnerability of {WPA} Key Exchange Mechanism}, booktitle = {Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference {ICOIN} 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3090}, pages = {915--924}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25978-7\_92}, doi = {10.1007/978-3-540-25978-7\_92}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icoin/KangOCCN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/NyangS00, author = {DaeHun Nyang and Joo{-}Seok Song}, title = {Knowledge-proof based versatile smart card verification protocol}, journal = {Comput. Commun. Rev.}, volume = {30}, number = {3}, pages = {39--44}, year = {2000}, url = {https://doi.org/10.1145/382179.383016}, doi = {10.1145/382179.383016}, timestamp = {Thu, 10 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccr/NyangS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/NyangLS99, author = {DaeHun Nyang and S. Y. Lim and JooSeok Song}, title = {A complete test sequence using cyclic sequence for conformance testing}, journal = {Comput. Commun.}, volume = {22}, number = {15-16}, pages = {1447--1456}, year = {1999}, url = {https://doi.org/10.1016/S0140-3664(99)00102-4}, doi = {10.1016/S0140-3664(99)00102-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/NyangLS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NyangS99, author = {DaeHun Nyang and JooSeok Song}, editor = {JooSeok Song}, title = {Preventing Double-Spent Coins from Revealing User's Whole Secret}, booktitle = {Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1787}, pages = {30--37}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719994\_3}, doi = {10.1007/10719994\_3}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/NyangS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.