Jung-Ho Eom
According to our database1,
Jung-Ho Eom
authored at least 24 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Design of an Integrated Cyber Defense Platform for Communication Network Security of Intelligent Smart Units.
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
Proceedings of the Computational Science and Its Applications - ICCSA 2023 Workshops, 2023
2017
Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution.
Proceedings of the 5th International Conference on Future Internet of Things and Cloud Workshops, 2017
2015
Multim. Tools Appl., 2015
New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology.
KSII Trans. Internet Inf. Syst., 2015
2014
Pers. Ubiquitous Comput., 2014
The scheme of 3-level authentication mechanism for preventing internal information leakage.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014
2013
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Information Technology Convergence, 2013
Proceedings of the International Conference on Information Science and Applications, 2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
2012
A Conceptual Study on Knowledge-Based Personal Information Gathering Methods for Conducting Psychological Warfare in Cyberspace.
Proceedings of the Convergence and Hybrid Information Technology, 2012
Proceedings of the Convergence and Hybrid Information Technology, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009
2007
Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2007
Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks.
Proceedings of the Managing Next Generation Networks and Services, 2007
2006
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Qualitative Method-Based the Effective Risk Mitigation Method in the Risk Management.
Proceedings of the Computational Science and Its Applications, 2006
2005
Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation.
J. Inf. Process. Syst., 2005