Zobrazeno 1 - 10
of 55
pro vyhledávání: '"Yoojae Won"'
Autor:
Sunghyun Yu, Yoojae Won
Publikováno v:
Mathematical Biosciences and Engineering, Vol 20, Iss 2, Pp 2183-2202 (2023)
Privacy protection in computer communication is gaining attention because plaintext transmission without encryption can be eavesdropped on and intercepted. Accordingly, the use of encrypted communication protocols is on the rise, along with the numbe
Externí odkaz:
https://doaj.org/article/3e0b8caa23c0430db62369c57cbe4a31
Publikováno v:
Sensors, Vol 22, Iss 14, p 5153 (2022)
Countries require measures to prevent food fraud, such as forgery of certificates or content change during production, which can occur throughout the supply chain, even if they have a certification system for quality food management. Therefore, there
Externí odkaz:
https://doaj.org/article/ea7c511efebb4b6793e2d65572f3eee7
Publikováno v:
Symmetry, Vol 10, Iss 11, p 622 (2018)
Recently, the rapid development of mobile devices and communication technologies has dramatically increased the demand for location-based services that provide users with location-oriented information and services. User location in outdoor spaces is
Externí odkaz:
https://doaj.org/article/8e9c564e603044ce8b313fa251b280aa
Autor:
Sunghyun Yu, Yoojae Won
Publikováno v:
Mathematical Biosciences and Engineering. 20:2183-2202
Privacy protection in computer communication is gaining attention because plaintext transmission without encryption can be eavesdropped on and intercepted. Accordingly, the use of encrypted communication protocols is on the rise, along with the numbe
Publikováno v:
Sustainability, Vol 13, Iss 8982, p 8982 (2021)
Sustainability
Volume 13
Issue 16
Sustainability
Volume 13
Issue 16
There is a critical vulnerability in the 5G AKA protocol of the 3GPP. We propose a protocol that compensates for these vulnerabilities and speed up the existing protocol
and the study implements this protocol to experiment with the vulnerabiliti
and the study implements this protocol to experiment with the vulnerabiliti
Publikováno v:
Computers & Electrical Engineering. 78:1-10
In operating system (OS) fingerprinting, the OS is identified using network packets and a rule-based matching method. However, this matching method has problems when the network packet information is insufficient or the OS is relatively new. This stu
Autor:
Yoojae Won, Yonggun Kim
Publikováno v:
The Journal of Supercomputing. 76:5301-5319
In the corporate environment, we use a variety of software. To increase security, patch management systems are used to manage software patches. This study analyzes existing patch management systems to identify security threats. Furthermore, we utiliz
Publikováno v:
Advances in Computer Science and Ubiquitous Computing ISBN: 9789811593420
Various types of data are being collected given the recent increase in the kinds of services provided by companies. Among them, data collectors of web services collect MyData indiscriminately and benefit from them. Moreover, data providers are unawar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::86c88fc963d80daff73bbec62f76057b
https://doi.org/10.1007/978-981-15-9343-7_69
https://doi.org/10.1007/978-981-15-9343-7_69
Autor:
Yoojae Won, Sangmoon Jung
Publikováno v:
Soft Computing. 22:6731-6740
Numerous countermeasures have been proposed since the first appearance of ransomware. However, many ransomware mutants continue to be created, and the damage they cause has been continually increasing. Existing antivirus tools are signature-dependent
Publikováno v:
The Journal of Supercomputing. 75:1941-1952
With the recent advancements in information and communication technologies, the creation and storage of documents has become digitalized. Therefore, many documents are stored on computers. Documents containing personal information can be leaked by in