PUBLICATIONS

SCI & SCIE

35

Design of USIM-based secure user authentication scheme in a mobile office environment

  • Jun-Sub Kim, Jin Kwak
  • Multimedia Tools and Applications, Springer
  • 2016-11 / Volume : 75 / No : 22 / Page : 14541-14556
  • ISSN : 1380-7501 / DOI : 10.1007/s11042-015-2869-x
  • Impact Factor : 1.331
34

Research on android malware permission pattern using permission monitoring system

  • Seung-hwan Ju, Hee-suk Seo, Jin Kwak
  • Multimedia Tools and Applications, Springer
  • 2016-11 / Volume : 75 / No : 22 / Page : 14807-14817
  • ISSN : 1380-7501 / DOI : 10.1007/s11042-016-3273-x
  • Impact Factor : 1.331
33

Effective and Reliable Malware Group Classification for a Massive Malware Environment

  • Taejin Lee, Jin Kwak
  • International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation
  • 2016
  • ISSN : 1550-1329
  • Impact Factor : 1.239
32

Enhanced SDIoT Security Framework Model

  • Seongho Choi, Jin Kwak
  • International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation
  • 2016
  • ISSN : 1550-1329
  • Impact Factor : 1.239
31

Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient

  • Taejin Lee, Bomin Choi, Youngsang Shin, Jin Kwak
  • The Journal of Supercomputing, Springer
  • 2015-12 / Page : 1-15
  • ISSN : 0920-8542 / DOI : 10.1007/s11227-015-1594-6
  • Impact Factor : 0.858
30

DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis

  • Dongwoo Kim, Jin Kwak, Jaecheol Ryou
  • International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation
  • 2015-09 / Volume : 2015
  • ISSN : 1550-1329 / DOI : 10.1155/2015/379682
  • Impact Factor : 0.665
29

RFID System with Fairness within the Framework of Security and Privacy

  • Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, Dongho Won
  • Proc. of ESAS 2005, European Workshop on Security and Privacy in Ad hoc and Sensor Networks, Springer-Verlag
  • 2015-07 / Page : 142-152
  • ISSN : 0302-9743 / DOI : 10.1007/11601494_12
28

Digital forensics investigation methodology applicable for social network services

  • Yu-Jong Jang, Jin Kwak
  • Multimedia Tools and Applications, Springer
  • 2015-07 / Volume : 74 / No : 14 / Page : 5029-5040
  • ISSN : 1380-7501 / DOI : 10.1007/s11042-014-2061-8
  • Impact Factor : 1.346
27

Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

  • Woong Go, Jin Kwak
  • Journal of Applied Mathematics, Hindawi Publishing Corporation
  • 2014-05 / Volume : 2014 / Page : 1-9
  • ISSN : 1110-757X / DOI : 10.1155/2014/149649
  • Impact Factor : 0.720
26

Construction of a secure two-factor user authentication system using fingerprint information and password

  • Woong Go, Kwangwoo Lee, Jin Kwak
  • Journal of Intelligent Manufacturing, Springer
  • 2014-04 / Volume : 25 / No : 2 / Page : 217-230
  • ISSN : 0956-5515 / DOI : 10.1007/s10845-012-0669-y
  • Impact Factor : 1.142
TOP