Jung-suk Song

Orcid: 0000-0003-1755-8636

Affiliations:
  • Korea Institute of Science and Technology Information (KISTI), Daejeon


According to our database1, Jung-suk Song authored at least 18 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Intrusion Detection Systems Based on Machine Learning Using Feature Expansion Methods.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2021
F/Wvis: Hierarchical Visual Approach for Effective Optimization of Firewall Policy.
IEEE Access, 2021

An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ Monitoring.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
Integrated Visual Analytics Approach against Multivariate Cybersecurity Attack.
Proceedings of the AVI '20: International Conference on Advanced Visual Interfaces, Island of Ischia, Italy, September 28, 2020

2019
Visualization of security event logs across multiple networks and its application to a CSOC.
Clust. Comput., 2019

Platform Design and Implementation for Flexible Data Processing and Building ML Models of IDS Alerts.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
VISNU: A Novel Visualization Methodology of Security Events Optimized for a Centralized SOC.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Visualization of Intrusion Detection Alarms Collected from Multiple Networks.
Proceedings of the Information Security - 20th International Conference, 2017

Detecting Black IP Using for Classification and Analysis Through Source IP of Daily Darknet Traffic.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
How to Design Practical Client Honeypots Based on Virtual Environment.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Automated Verification Methodology of Security Events Based on Heuristic Analysis.
Int. J. Distributed Sens. Networks, 2015

A Malware Classification Method Based on Generic Malware Information.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

2014
A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic.
Secur. Commun. Networks, 2014

A Classification Method of Darknet Traffic for Advanced Security Monitoring and Response.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

2013
An Advanced Incident Response Methodology Based on Correlation Analysis of Polymorphic Security Events.
IEICE Trans. Commun., 2013

A Methodology for Multipurpose DNS Sinkhole Analyzing Double Bounce Emails.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

2012
A Malware Collection and Analysis Framework Based on Darknet Traffic.
Proceedings of the Neural Information Processing - 19th International Conference, 2012


  Loading...