Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Taehoon Eom"
@article{DBLP:journals/access/AnLHEP22, author = {SeongMo An and Asher Leung and Jin B. Hong and Taehoon Eom and Jong Sou Park}, title = {Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security}, journal = {{IEEE} Access}, volume = {10}, pages = {75117--75134}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3190545}, doi = {10.1109/ACCESS.2022.3190545}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AnLHEP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/EomHAPK20, author = {Taehoon Eom and Jin B. Hong and SeongMo An and Jong Sou Park and Dong Seong Kim}, title = {A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {7235043:1--7235043:15}, year = {2020}, url = {https://doi.org/10.1155/2020/7235043}, doi = {10.1155/2020/7235043}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/EomHAPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/EomHAPK19, author = {Taehoon Eom and Jin B. Hong and SeongMo An and Jong Sou Park and Dong Seong Kim}, title = {A Systematic Approach to Threat Modeling and Security Analysis for Software Defined Networking}, journal = {{IEEE} Access}, volume = {7}, pages = {137432--137445}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2940039}, doi = {10.1109/ACCESS.2019.2940039}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/EomHAPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AnEPHNFKK19, author = {SeongMo An and Taehoon Eom and Jong Sou Park and Jin Bum Hong and Armstrong Nhlabatsi and Noora Fetais and Khaled M. Khan and Dong Seong Kim}, title = {CloudSafe: {A} Tool for an Automated Security Analysis for Cloud Computing}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {602--609}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00086}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00086}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AnEPHNFKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EomHAPK19, author = {Taehoon Eom and Jin Bum Hong and SeongMo An and Jong Sou Park and Dong Seong Kim}, title = {Security and Performance Modeling and Optimization for Software Defined Networking}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {610--617}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00087}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00087}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/EomHAPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-04271, author = {SeoungMo An and Taehoon Eom and Jong Sou Park and Jin B. Hong and Armstrong Nhlabatsi and Noora Fetais and Khaled M. Khan and Dong Seong Kim}, title = {CloudSafe: {A} Tool for an Automated Security Analysis for Cloud Computing}, journal = {CoRR}, volume = {abs/1903.04271}, year = {2019}, url = {http://arxiv.org/abs/1903.04271}, eprinttype = {arXiv}, eprint = {1903.04271}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-04271.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icssa/EomKAPK18, author = {Taehoon Eom and Heesu Kim and SeongMo An and Jong Sou Park and Dong Seong Kim}, title = {Android Malware Detection Using Feature Selections and Random Forest}, booktitle = {International Conference on Software Security and Assurance, {ICSSA} 2018, Seoul, Korea (South), July 26-27, 2018}, pages = {55--61}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICSSA45270.2018.00023}, doi = {10.1109/ICSSA45270.2018.00023}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icssa/EomKAPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/EomHPK15, author = {Taehoon Eom and Jin B. Hong and Jong Sou Park and Dong Seong Kim}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {Security Modeling and Analysis of a {SDN} Based Web Service}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {746--756}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_68}, doi = {10.1007/978-3-319-27161-3\_68}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/EomHPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/NguyenEAPHK15, author = {Tuan Anh Nguyen and Taehoon Eom and SeongMo An and Jong Sou Park and Jin B. Hong and Dong Seong Kim}, editor = {Guojun Wang and Tatsuhiro Tsuchiya and Dong Xiang}, title = {Availability Modeling and Analysis for Software Defined Networks}, booktitle = {21st {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2015, Zhangjiajie, China, November 18-20, 2015}, pages = {159--168}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PRDC.2015.27}, doi = {10.1109/PRDC.2015.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/NguyenEAPHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/HongEPK14, author = {Jin B. Hong and Taehoon Eom and Jong Sou Park and Dong Seong Kim}, title = {Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud}, booktitle = {2014 {IEEE} 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 {IEEE} 11th Intl Conf on Autonomic and Trusted Computing and 2014 {IEEE} 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014}, pages = {50--57}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/UIC-ATC-ScalCom.2014.94}, doi = {10.1109/UIC-ATC-SCALCOM.2014.94}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/HongEPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.