Follow
Youngho Cho
Youngho Cho
Professor of Computer Engineering, Korea National Defense University; IEEE Senior Member
Verified email at kndu.ac.kr - Homepage
Title
Cited by
Cited by
Year
Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks
Y Cho, G Qu, Y Wu
2012 IEEE symposium on security and privacy workshops, 134-141, 2012
1142012
Adaptive product tracking in RFID-enabled large-scale supply chain
JM Ko, C Kwak, Y Cho, CO Kim
Expert Systems with Applications 38 (3), 1583-1590, 2011
712011
Detection and prevention of selective forwarding-based denial-of-service attacks in WSNs
Y Cho, G Qu
International Journal of Distributed Sensor Networks 9 (8), 205920, 2013
402013
A novel video steganography-based botnet communication model in telegram sns messenger
M Kwak, Y Cho
Symmetry 13 (1), 84, 2021
152021
HyperLedger fabric-based proactive defense against inside attackers in the WSN with trust mechanism
K Cho, Y Cho
Electronics 9 (10), 1659, 2020
132020
ICSA: Intelligent chatbot security assistant using Text-CNN and multi-phase real-time defense against SNS phishing attacks
J Yoo, Y Cho
Expert Systems with Applications 207, 117893, 2022
122022
An enhanced trust mechanism with consensus-based false information filtering algorithm against bad-mouthing attacks and false-praise attacks in WSNs
T Suh, Y Cho
Electronics 8 (11), 1359, 2019
122019
DoS attacks and countermeasures on network devices
Q Wang, T Dunlap, Y Cho, G Qu
2017 26th Wireless and Optical Communication Conference (WOCC), 1-6, 2017
112017
Construction and performance analysis of image steganography-based botnet in KakaoTalk openchat
J Jeon, Y Cho
Computers 8 (3), 61, 2019
92019
Design and implementation of automated steganography image-detection system for the KakaoTalk instant messenger
J Park, Y Cho
Computers 9 (4), 103, 2020
82020
A Time-Based Dynamic Operation Model for Webpage Steganography Methods
S Yuk, Y Cho
Electronics 9 (12), 2113, 2020
42020
Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms
Y Cho
Electronics 8 (11), 1338, 2019
42019
FADER: False alarm detection and recovery for trust-aware routing in wireless sensor networks
Y Cho, G Qu
2013 International Conference on Connected Vehicles and Expo (ICCVE), 647-648, 2013
42013
딥페이크 영상 탐지 관련 기술 동향 연구
박준, 조영호
한국정보과학회 학술발표논문집, 724-726, 2019
32019
Enhancing Trust-Aware Routing by False Alarm Detection and Recovery
Y Cho, G Qu
2014 IEEE Military Communications Conference, 52-59, 2014
32014
A study on novel steganography communication technique based on thumbnail images in sns messenger environment
S Yuk, Y Cho
Journal of Internet Computing and Services 22 (6), 151-162, 2021
22021
Detection System of Hidden Javascript URLs in Web Source Codes
H Park, S Cho, JK Park, Y Cho
Proceedings of the Korean Society of Computer Information Conference, 119-122, 2019
22019
Ontology based negotiation case search system for the resolution of exceptions in collaborative production planning
C Kim, Y Cho, J Yoon, C Kwak, Y Seo
On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 24-25, 2005
22005
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
Y Cho, G Qu
Sensors 23 (9), 4407, 2023
12023
TRUST-BASED DEFENSE AGAINST INSIDER PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS
Y Cho
University of Maryland College Park, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20