35 |
Design of USIM-based secure user authentication scheme in a mobile office environment ★
- Jun-Sub Kim, Jin Kwak
- Multimedia Tools and Applications, Springer
- 2016-11 / Volume : 75 / No : 22 / Page : 14541-14556
- ISSN : 1380-7501 / DOI : 10.1007/s11042-015-2869-x
- Impact Factor : 1.331
|
|
34 |
Research on android malware permission pattern using permission monitoring system ★
- Seung-hwan Ju, Hee-suk Seo, Jin Kwak
- Multimedia Tools and Applications, Springer
- 2016-11 / Volume : 75 / No : 22 / Page : 14807-14817
- ISSN : 1380-7501 / DOI : 10.1007/s11042-016-3273-x
- Impact Factor : 1.331
|
|
33 |
Effective and Reliable Malware Group Classification for a Massive Malware Environment ★
- Taejin Lee, Jin Kwak
- International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation
- 2016
- ISSN : 1550-1329
- Impact Factor : 1.239
|
|
32 |
Enhanced SDIoT Security Framework Model ★
- Seongho Choi, Jin Kwak
- International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation
- 2016
- ISSN : 1550-1329
- Impact Factor : 1.239
|
|
31 |
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient ★
- Taejin Lee, Bomin Choi, Youngsang Shin, Jin Kwak
- The Journal of Supercomputing, Springer
- 2015-12 / Page : 1-15
- ISSN : 0920-8542 / DOI : 10.1007/s11227-015-1594-6
- Impact Factor : 0.858
|
|
30 |
DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis ★
- Dongwoo Kim, Jin Kwak, Jaecheol Ryou
- International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation
- 2015-09 / Volume : 2015
- ISSN : 1550-1329 / DOI : 10.1155/2015/379682
- Impact Factor : 0.665
|
|
29 |
RFID System with Fairness within the Framework of Security and Privacy
- Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won
- Proc. of ESAS 2005, European Workshop on Security and Privacy in Ad hoc and Sensor Networks, Springer-Verlag
- 2015-07 / Page : 142-152
- ISSN : 0302-9743 / DOI : 10.1007/11601494_12
|
|
28 |
Digital forensics investigation methodology applicable for social network services ★
- Yu-Jong Jang, Jin Kwak
- Multimedia Tools and Applications, Springer
- 2015-07 / Volume : 74 / No : 14 / Page : 5029-5040
- ISSN : 1380-7501 / DOI : 10.1007/s11042-014-2061-8
- Impact Factor : 1.346
|
|
27 |
Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure ★
- Woong Go, Jin Kwak
- Journal of Applied Mathematics, Hindawi Publishing Corporation
- 2014-05 / Volume : 2014 / Page : 1-9
- ISSN : 1110-757X / DOI : 10.1155/2014/149649
- Impact Factor : 0.720
|
|
26 |
Construction of a secure two-factor user authentication system using fingerprint information and password
- Woong Go, Kwangwoo Lee, Jin Kwak
- Journal of Intelligent Manufacturing, Springer
- 2014-04 / Volume : 25 / No : 2 / Page : 217-230
- ISSN : 0956-5515 / DOI : 10.1007/s10845-012-0669-y
- Impact Factor : 1.142
|
|