7 |
Security Threat Detection in Cloud Environment ★
- Jeong-Seok Jo, Jin Kwak
- The 10th International Conference on Internet(ICONI 2018)
- 2018-12-16~2018-12-19
|
|
6 |
A Study on Detection Method for Hypervisor-based Workload Migration Security Threats and Vulnerabilities ★
- Young-Min Ko, Seul-Ki Choi, Jin Kwak
- The 10th International Conference on Internet(ICONI 2018)
- 2018-12-16~2018-12-19
|
|
5 |
Analysis of sensitive data flow vulnerabilities for secure precision medicine ★
- Deuk-Hun Kim, Ju-Seong Ko, Jin Kwak
- The 10th International Conference on Internet(ICONI 2018)
- 2018-12-16~2018-12-19
|
|
4 |
Block-chain based Voting System with Distributed Transaction Pool ★
- Ju-Seong Ko, Deuk-Hun Kim, Suk-June Choi, Jin Kwak
- The 13th Asia Pacific International Conference on Information Science and Technology (APIC-IST)
- 2018-06-24~2018-06-27
|
|
3 |
A Study on Mobile Malicious Code Detection Technologies with Reverse Taint Analysis ★
- Seul-Ki Choi, Jeong-Seok Jo, Jin Kwak
- The 13th Asia Pacific International Conference on Information Science and Technology (APIC-IST)
- 2018-06-24~2018-06-27
|
|
2 |
The Framework of 3P-Based Secure eHealth-Information System ★
- Deuk-Hun Kim, Jin Kwak
- 2018 International Conference on Platform Technology and Service (PlatCon)
- 2018-01-29~2018-01-31
|
|
1 |
Permission Management Method for Before and After Applications the Update in Android-based IoT Platform Environment ★
- In-Kyu Park, Jin Kwak
- 2018 International Conference on Platform Technology and Service (PlatCon)
- 2018-01-29~2018-01-31
|
|