Soonhong Kwon

Orcid: 0009-0000-2729-3948

According to our database1, Soonhong Kwon authored at least 12 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
6
1
1
1
1
5
2
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm.
Softw. Pract. Exp., 2024

Smart Contract Kill Switch for Security in a Private Blockchain-based Software Transaction System.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024

2023
UCI and EICN Integrated Model for Copyright Distribution Management.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Holographic Multi-Channel QR Code based Copyright Distribution Management System.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

OTT Service Copyright Management Framework Using ODRL Based on Hyperledger Fabric.
Proceedings of the 2023 International Conference on Intelligent Computing and Its Emerging Applications, 2023

VDIRS: Vulnerable Docker Image Response System.
Proceedings of the 2023 International Conference on Intelligent Computing and Its Emerging Applications, 2023

Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

2021
Protocol fuzzing to find security vulnerabilities of RabbitMQ.
Concurr. Comput. Pract. Exp., 2021

2020
DIVDS: Docker Image Vulnerability Diagnostic System.
IEEE Access, 2020

Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
A Technical Survey on Methods for Detecting Rogue Access Points.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019


  Loading...