default search action
Jung-Ho Eom
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c20]Jung-Ho Eom, Dong-Won Yoon, Jung-Ho Choo:
Design of an Integrated Cyber Defense Platform for Communication Network Security of Intelligent Smart Units. ICCSA (Workshops 3) 2023: 218-230 - [c19]Jung-Ho Choo, Yu-Jin Kim, Jung-Ho Eom:
A Study on the Maintenance of Distributed Lag Model in Time Series Prediction Model. ICCSA (Workshops 2) 2023: 374-391
2010 – 2019
- 2017
- [c18]Chang-Hoi Hur, Seong-Pyo Kim, Yoon-Soo Kim, Jung-Ho Eom:
Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution. FiCloud Workshops 2017: 69-74 - 2015
- [j4]Ho-Jae Lee, Min-Woo Park, Jung-Ho Eom, Tai-Myoung Chung:
New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology. KSII Trans. Internet Inf. Syst. 9(11): 4662-4679 (2015) - [j3]Young-Hyun Choi, Min-Woo Park, Jung-Ho Eom, Tai-Myoung Chung:
Dynamic binary analyzer for scanning vulnerabilities with taint analysis. Multim. Tools Appl. 74(7): 2301-2320 (2015) - 2014
- [j2]Min-Woo Park, Young-Hyun Choi, Jung-Ho Eom, Tai-Myoung Chung:
Dangerous Wi-Fi access point: attacks to benign smartphone applications. Pers. Ubiquitous Comput. 18(6): 1373-1386 (2014) - [c17]Sang-Pil Cheon, Jung-Min Kang, Min-Woo Park, Jung-Ho Eom:
The scheme of 3-level authentication mechanism for preventing internal information leakage. DICTAP 2014: 154-157 - 2013
- [c16]Jae-Won Min, Young-Hyun Choi, Jung-Ho Eom, Tai-Myoung Chung:
Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis. ICCSA (3) 2013: 175-186 - [c15]Min-Woo Park, Young-Hyun Choi, Jung-Ho Eom, Tai-Myoung Chung:
The Permission-Based Malicious Behaviors Monitoring Model for the Android OS. ICCSA (1) 2013: 382-395 - [c14]Sung-Hwan Kim, Jung-Ho Eom, Tai-Myoung Chung:
Big Data Security Hardening Methodology Using Attributes Relationship. ICISA 2013: 1-2 - [c13]Young-Hyun Choi, Jae-Won Min, Min-Woo Park, Jung-Ho Eom, Tai-Myoung Chung:
A Framework of Static Analyzer for Taint Analysis of Binary Executable File. ITCS 2013: 185-192 - [c12]Sung-Hwan Kim, Min-Woo Park, Jung-Ho Eom, Tai-Myoung Chung:
The Methodology for Hardening SCADA Security Using Countermeasure Ordering. MUE 2013: 485-492 - 2012
- [c11]Sung-Hwan Kim, Jung-Ho Eom, Tai-Myoung Chung:
A study on optimization of security function for reducing vulnerabilities in SCADA. CyberSec 2012: 65-69 - [c10]Jung-Ho Eom, Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung:
Cyber military strategy for cyberspace superiority in cyber warfare. CyberSec 2012: 295-299 - [c9]Sangho Lee, Jung-Ho Eom, Bonghan Lee, Jin-Hyuk Choi:
A Conceptual Study on Knowledge-Based Personal Information Gathering Methods for Conducting Psychological Warfare in Cyberspace. ICHIT (2) 2012: 287-293 - [c8]Nam-Uk Kim, Jung-Ho Eom, Sung-Hwan Kim, Tai-Myoung Chung:
The Architecture of User-End Client for Mobile Clout Service. ICHIT (2) 2012: 699-706
2000 – 2009
- 2009
- [c7]Seon-Ho Park, Young-Ju Han, Jung-Ho Eom, Tai-Myoung Chung:
Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. APNOMS 2009: 375-384 - [c6]Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung:
A Study on Access Control Model for Context-Aware Workflow. NCM 2009: 1526-1531 - 2007
- [c5]Young-Ju Han, Jung-Ho Eom, Seon-Ho Park, Tai-Myoung Chung:
Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks. APNOMS 2007: 543-546 - [c4]Jung-Ho Eom, Seon-Ho Park, Young-Ju Han, Tai-Myoung Chung:
Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security. International Conference on Computational Science (3) 2007: 1024-1031 - [c3]Young-Ju Han, Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung:
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks. ICCSA (2) 2007: 195-206 - 2006
- [c2]Jung-Ho Eom, Sang-Hun Lee, Hyung-Jin Lim, Tai-Myoung Chung:
Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management. ICCSA (2) 2006: 239-248 - [c1]Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung:
Modeling Active Cyber Attack for Network Vulnerability Assessment. ISPA Workshops 2006: 971-980 - 2005
- [j1]Jung-Ho Eom, Seon-Ho Park, Tae-Kyung Kim, Tai-Myoung Chung:
Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation. J. Inf. Process. Syst. 1(1): 79-85 (2005)
Coauthor Index
aka: Tai-Myoung Chung
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint