Yongsu Park
Orcid: 0009-0009-2188-1867
According to our database1,
Yongsu Park
authored at least 42 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0.
Sensors, February, 2024
A simple and efficient Distributed Trigger Counting algorithm based on local thresholds.
ICT Express, 2024
2021
J. Supercomput., 2021
2020
Sensors, 2020
x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4.
IEEE Access, 2020
2019
2018
IEEE Trans. Ind. Electron., 2018
KSII Trans. Internet Inf. Syst., 2018
New flash memory acquisition methods based on firmware update protocols for LG Android smartphones.
Digit. Investig., 2018
2017
Proceedings of the 14th International Conference on Ubiquitous Robots and Ambient Intelligence, 2017
2016
Dynamic analysis of Reaction Force sensing Series Elastic Actuator as unlumped two mass system.
Proceedings of the IECON 2016, 2016
2015
IEICE Trans. Commun., 2015
2014
Analyzing Network Privacy Preserving Methods: A Perspective of Social Network Characteristics.
IEICE Trans. Inf. Syst., 2014
2013
Simul., 2013
J. Syst. Softw., 2013
2012
Inf. Process. Lett., 2012
2010
J. Syst. Softw., 2010
Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010
2009
A new data hiding scheme for binary image authentication with small image distortion.
Inf. Sci., 2009
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009
2008
An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids.
Inf. Sci., 2008
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks.
IEICE Trans. Commun., 2008
2007
A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates.
IEICE Trans. Commun., 2007
IEICE Trans. Commun., 2007
IEEE Commun. Lett., 2007
An Improvement of Park-Chung-Cho's Stream Authentication Scheme by Using Information Dispersal Algorithm.
Proceedings of the Advances in Neural Networks, 2007
2006
J. Inf. Sci. Eng., 2006
Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
IEICE Trans. Inf. Syst., 2006
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks.
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
2005
An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading.
IEICE Trans. Inf. Syst., 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
Proceedings of the Applied Parallel Computing, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
Inf. Process. Lett., 2003