Jongsub Moon
Orcid: 0000-0002-6457-4316
According to our database1,
Jongsub Moon
authored at least 47 papers
between 2001 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing.
IEEE Access, 2023
2022
Dr.PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search.
Neural Comput. Appl., 2022
A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment.
Comput. Methods Programs Biomed., 2022
2020
Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences.
Inf. Sci., 2020
2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
2018
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants.
J. Supercomput., 2018
2016
2014
Secur. Commun. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
2013
J. Supercomput., 2013
A security model for IPTV with one-time password and Conditional Access System for smart mobile platform.
Telecommun. Syst., 2013
Comput. Math. Appl., 2013
2012
A novel method for SQL injection attack detection based on removing SQL query attribute values.
Math. Comput. Model., 2012
Math. Comput. Model., 2012
2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data.
Simul. Model. Pract. Theory, 2010
2009
Study of fuzzy clustering methods for malicious codes using native API call frequency.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
2008
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
2006
Neurocomputing, 2006
Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006
2005
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
Proceedings of the Computer and Information Sciences, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the New Trends in Computer Networks, 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing.
Proceedings of the Computer and Information Sciences, 2004
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer and Information Sciences, 2003
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003
2002
Pattern Recognit., 2002
2001
Int. J. Pattern Recognit. Artif. Intell., 2001
Design of GBSB Neural Network Using Solution Space Parameterization and Optimization Approach.
Int. J. Fuzzy Log. Intell. Syst., 2001