Jeman Park
Orcid: 0000-0003-4387-8780Affiliations:
- Kyung Hee University, Department of Software Convergence, South Korea
- Georgia Institute of Technology, Cyber Forensics Innovation Lab (CyFi), Atlanta, GA, USA (former)
- University of Central Florida, Security Analytics Lab (SEAL), Orlando, FL, USA (former, PhD 2020)
- Korea University, Wireless Data Communications Laboratory, Seoul, South Korea (former)
According to our database1,
Jeman Park
authored at least 31 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2022
IEEE/ACM Trans. Netw., 2022
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces.
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Corrigendum to "Domain name system security and privacy: A contemporary survey" Computer Networks Volume 185 (2020) 107699.
Comput. Networks, 2021
Comput. Networks, 2021
2020
Self-Controllable Super-Resolution Deep Learning Framework for Surveillance Drones in Security Applications.
EAI Endorsed Trans. Security Safety, 2020
Assessing the effectiveness of pulsing denial of service attacks under realistic network synchronization assumptions.
Comput. Networks, 2020
Understanding the Proxy Ecosystem: A Comparative Analysis of Residential and Open Proxies on the Internet.
IEEE Access, 2020
On the Performance of Generative Adversarial Network (GAN) Variants: A Clinical Data Study.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Reinforced Edge Selection using Deep Learning for Robust Surveillance in Unmanned Aerial Vehicles.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
IEEE Trans. Netw. Serv. Manag., 2019
IEEE Internet Things J., 2019
Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT.
Trans. Emerg. Telecommun. Technol., 2019
CoRR, 2019
CoRR, 2019
Breaking graph-based IoT malware detection systems using adversarial examples: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019
2018
Network-based Analysis and Classification of Malware using Behavioral Artifacts Ordering.
EAI Endorsed Trans. Security Safety, 2018
Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS Attacks.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018
2015
IEEE Commun. Lett., 2015
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015