Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Joobeom Yun"'
Publikováno v:
IEEE Access, Vol 12, Pp 88279-88302 (2024)
Automatic Speech Recognition (ASR) systems have improved and eased how humans interact with devices. ASR system converts an acoustic waveform into the relevant text form. Modern ASR inculcates deep neural networks (DNNs) to provide faster and better
Externí odkaz:
https://doaj.org/article/2f25cf94438d4cf6a8b90bb7e200f6c2
Publikováno v:
IEEE Access, Vol 11, Pp 141343-141357 (2023)
Embedded devices are becoming increasingly common and, as a result, more susceptible to security threats. Consequently, analyzing the firmware of these devices is essential for detecting and mitigating vulnerabilities. Hardware dependencies pose a ma
Externí odkaz:
https://doaj.org/article/2ed217a375084473a197204b03f0ab31
Publikováno v:
IEEE Access, Vol 10, Pp 23532-23544 (2022)
The development of artificial neural networks and artificial intelligence has helped to address problems and improve services in various fields, such as autonomous driving, image classification, medical diagnosis, and speech recognition. However, thi
Externí odkaz:
https://doaj.org/article/3f8610d439d9488eb60a5d47d2f36c8b
Publikováno v:
IEEE Access, Vol 9, Pp 101627-101642 (2021)
With the growing prevalence of the Internet of Things (IoT), related security threats have kept pace. The need to dynamically detect vulnerabilities in IoT devices cannot be overstated. In this work, we present FIRM-COV, the first high coverage-orien
Externí odkaz:
https://doaj.org/article/152dab4cc4bf4a0287d3c9543952ef14
Autor:
Youngjoo Shin, Joobeom Yun
Publikováno v:
IEEE Access, Vol 9, Pp 108851-108860 (2021)
Crypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating in cloud environments where inev
Externí odkaz:
https://doaj.org/article/70dd293ae2f5413ca97b53b024eac5f5
Publikováno v:
IEEE Access, Vol 9, Pp 131166-131190 (2021)
Recently, software testing has become a significant component of information security. The most reliable technique for automated software testing is a fuzzing tool that feeds programs with random test-input and detects software vulnerabilities that a
Externí odkaz:
https://doaj.org/article/25f760cef3494b609b91dbbec08cd9d7
Publikováno v:
Sensors, Vol 21, Iss 6, p 2060 (2021)
In an internet of things (IoT) platform with a copious number of IoT devices and active variation of operational purpose, IoT devices should be able to dynamically change their system images to play various roles. However, the employment of such feat
Externí odkaz:
https://doaj.org/article/5b588f894e434d059d28fb896070b6a9
Publikováno v:
Future Internet, Vol 12, Iss 4, p 74 (2020)
Fuzz testing is a simple automated software testing approach that discovers software vulnerabilities at a high level of performance by using randomly generated seeds. However, it is restrained by coverage and thus, there are chances of finding bugs e
Externí odkaz:
https://doaj.org/article/ed854016c679496dacfb9550c003919d
Publikováno v:
Energies, Vol 13, Iss 6, p 1332 (2020)
Nowadays, various computing services are often hosted on cloud platforms for their availability and cost effectiveness. However, such services are frequently exposed to vulnerabilities. Therefore, many countermeasures have been invented to defend aga
Externí odkaz:
https://doaj.org/article/76d4e8583dff4b359444c3ce0d9bd14d
Publikováno v:
Applied Sciences, Vol 8, Iss 12, p 2532 (2018)
With the successful proliferation of data outsourcing services, security and privacy issues have drawn significant attention. Data authentication in particular plays an essential role in the storage of outsourced digital content and keeping it safe f
Externí odkaz:
https://doaj.org/article/a319e4c157f64933901d2fc8ff1c38cb