Search dblp for Publications

export results for "Taehoon Eom"

 download as .bib file

@article{DBLP:journals/access/AnLHEP22,
  author       = {SeongMo An and
                  Asher Leung and
                  Jin B. Hong and
                  Taehoon Eom and
                  Jong Sou Park},
  title        = {Toward Automated Security Analysis and Enforcement for Cloud Computing
                  Using Graphical Models for Security},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {75117--75134},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3190545},
  doi          = {10.1109/ACCESS.2022.3190545},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AnLHEP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/EomHAPK20,
  author       = {Taehoon Eom and
                  Jin B. Hong and
                  SeongMo An and
                  Jong Sou Park and
                  Dong Seong Kim},
  title        = {A Framework for Real-Time Intrusion Response in Software Defined Networking
                  Using Precomputed Graphical Security Models},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {7235043:1--7235043:15},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/7235043},
  doi          = {10.1155/2020/7235043},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/EomHAPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/EomHAPK19,
  author       = {Taehoon Eom and
                  Jin B. Hong and
                  SeongMo An and
                  Jong Sou Park and
                  Dong Seong Kim},
  title        = {A Systematic Approach to Threat Modeling and Security Analysis for
                  Software Defined Networking},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {137432--137445},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2940039},
  doi          = {10.1109/ACCESS.2019.2940039},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/EomHAPK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AnEPHNFKK19,
  author       = {SeongMo An and
                  Taehoon Eom and
                  Jong Sou Park and
                  Jin Bum Hong and
                  Armstrong Nhlabatsi and
                  Noora Fetais and
                  Khaled M. Khan and
                  Dong Seong Kim},
  title        = {CloudSafe: {A} Tool for an Automated Security Analysis for Cloud Computing},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {602--609},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00086},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00086},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AnEPHNFKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/EomHAPK19,
  author       = {Taehoon Eom and
                  Jin Bum Hong and
                  SeongMo An and
                  Jong Sou Park and
                  Dong Seong Kim},
  title        = {Security and Performance Modeling and Optimization for Software Defined
                  Networking},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {610--617},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00087},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00087},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/EomHAPK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-04271,
  author       = {SeoungMo An and
                  Taehoon Eom and
                  Jong Sou Park and
                  Jin B. Hong and
                  Armstrong Nhlabatsi and
                  Noora Fetais and
                  Khaled M. Khan and
                  Dong Seong Kim},
  title        = {CloudSafe: {A} Tool for an Automated Security Analysis for Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1903.04271},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.04271},
  eprinttype    = {arXiv},
  eprint       = {1903.04271},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-04271.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icssa/EomKAPK18,
  author       = {Taehoon Eom and
                  Heesu Kim and
                  SeongMo An and
                  Jong Sou Park and
                  Dong Seong Kim},
  title        = {Android Malware Detection Using Feature Selections and Random Forest},
  booktitle    = {International Conference on Software Security and Assurance, {ICSSA}
                  2018, Seoul, Korea (South), July 26-27, 2018},
  pages        = {55--61},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICSSA45270.2018.00023},
  doi          = {10.1109/ICSSA45270.2018.00023},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icssa/EomKAPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/EomHPK15,
  author       = {Taehoon Eom and
                  Jin B. Hong and
                  Jong Sou Park and
                  Dong Seong Kim},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {Security Modeling and Analysis of a {SDN} Based Web Service},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {746--756},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_68},
  doi          = {10.1007/978-3-319-27161-3\_68},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/EomHPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/NguyenEAPHK15,
  author       = {Tuan Anh Nguyen and
                  Taehoon Eom and
                  SeongMo An and
                  Jong Sou Park and
                  Jin B. Hong and
                  Dong Seong Kim},
  editor       = {Guojun Wang and
                  Tatsuhiro Tsuchiya and
                  Dong Xiang},
  title        = {Availability Modeling and Analysis for Software Defined Networks},
  booktitle    = {21st {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2015, Zhangjiajie, China, November 18-20, 2015},
  pages        = {159--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PRDC.2015.27},
  doi          = {10.1109/PRDC.2015.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/NguyenEAPHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/HongEPK14,
  author       = {Jin B. Hong and
                  Taehoon Eom and
                  Jong Sou Park and
                  Dong Seong Kim},
  title        = {Scalable Security Analysis Using a Partition and Merge Approach in
                  an Infrastructure as a Service Cloud},
  booktitle    = {2014 {IEEE} 11th Intl Conf on Ubiquitous Intelligence and Computing
                  and 2014 {IEEE} 11th Intl Conf on Autonomic and Trusted Computing
                  and 2014 {IEEE} 14th Intl Conf on Scalable Computing and Communications
                  and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014},
  pages        = {50--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/UIC-ATC-ScalCom.2014.94},
  doi          = {10.1109/UIC-ATC-SCALCOM.2014.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/HongEPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics