Daesung Moon
Orcid: 0000-0002-9961-0401
According to our database1,
Daesung Moon
authored at least 60 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A novel approach for application classification with encrypted traffic using BERT and packet headers.
Comput. Networks, 2024
2022
Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability.
IEICE Trans. Inf. Syst., November, 2022
2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
2019
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions.
J. Supercomput., 2019
J. Supercomput., 2019
CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN.
IEEE Access, 2019
2018
Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat.
Symmetry, 2018
MTD-Spamguard: a moving target defense-based spammer detection system in social network.
Soft Comput., 2018
A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks.
IEICE Trans. Inf. Syst., 2018
2017
DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks.
J. Supercomput., 2017
Four-joint motion data based posture classification for immersive postural correction system.
Multim. Tools Appl., 2017
DFA-AD: a distributed framework architecture for the detection of advanced persistent threats.
Clust. Comput., 2017
2016
Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing.
Wirel. Pers. Commun., 2016
J. Supercomput., 2016
RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks.
J. Supercomput., 2016
Secur. Commun. Networks, 2016
2015
KSII Trans. Internet Inf. Syst., 2015
2014
Symmetry, 2014
Secur. Commun. Networks, 2014
J. Intell. Manuf., 2014
Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT.
J. Appl. Math., 2014
Int. J. Distributed Sens. Networks, 2014
2013
Telecommun. Syst., 2013
Proceedings of the Information Technology Convergence, 2013
2012
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012
2011
KSII Trans. Internet Inf. Syst., 2011
2010
2009
J. Inf. Sci. Eng., 2009
IEICE Electron. Express, 2009
IEICE Electron. Express, 2009
Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System.
EURASIP J. Adv. Signal Process., 2009
Proceedings of the Communication and Networking, 2009
2008
IEICE Electron. Express, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
2007
Int. J. Fuzzy Log. Intell. Syst., 2007
Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computational Science and Its Applications, 2007
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007
Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, 2007
2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
Proceedings of the Trust, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005
Proceedings of the Digital Rights Management: Technologies, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems.
Proceedings of the Image Analysis and Recognition: International Conference, 2004
A Hardware Implementation of Speaker Verification Using Support Vector Machine.
Proceedings of the International Conference on Security and Management, 2004
2003
An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card.
IEEE Trans. Consumer Electron., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Image Analysis, 13th Scandinavian Conference, 2003
2002
Proceedings of the Information Security and Cryptology, 2002
A Fingerprint Matching Algorithm Using Image Recognition and Fuzzy Control.
Proceedings of the International Conference on Artificial Intelligence, 2002