Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks Y Cho, G Qu, Y Wu 2012 IEEE symposium on security and privacy workshops, 134-141, 2012 | 114 | 2012 |
Adaptive product tracking in RFID-enabled large-scale supply chain JM Ko, C Kwak, Y Cho, CO Kim Expert Systems with Applications 38 (3), 1583-1590, 2011 | 71 | 2011 |
Detection and prevention of selective forwarding-based denial-of-service attacks in WSNs Y Cho, G Qu International Journal of Distributed Sensor Networks 9 (8), 205920, 2013 | 40 | 2013 |
A novel video steganography-based botnet communication model in telegram sns messenger M Kwak, Y Cho Symmetry 13 (1), 84, 2021 | 15 | 2021 |
HyperLedger fabric-based proactive defense against inside attackers in the WSN with trust mechanism K Cho, Y Cho Electronics 9 (10), 1659, 2020 | 13 | 2020 |
ICSA: Intelligent chatbot security assistant using Text-CNN and multi-phase real-time defense against SNS phishing attacks J Yoo, Y Cho Expert Systems with Applications 207, 117893, 2022 | 12 | 2022 |
An enhanced trust mechanism with consensus-based false information filtering algorithm against bad-mouthing attacks and false-praise attacks in WSNs T Suh, Y Cho Electronics 8 (11), 1359, 2019 | 12 | 2019 |
DoS attacks and countermeasures on network devices Q Wang, T Dunlap, Y Cho, G Qu 2017 26th Wireless and Optical Communication Conference (WOCC), 1-6, 2017 | 11 | 2017 |
Construction and performance analysis of image steganography-based botnet in KakaoTalk openchat J Jeon, Y Cho Computers 8 (3), 61, 2019 | 9 | 2019 |
Design and implementation of automated steganography image-detection system for the KakaoTalk instant messenger J Park, Y Cho Computers 9 (4), 103, 2020 | 8 | 2020 |
A Time-Based Dynamic Operation Model for Webpage Steganography Methods S Yuk, Y Cho Electronics 9 (12), 2113, 2020 | 4 | 2020 |
Intelligent On-Off Web Defacement Attacks and Random Monitoring-Based Detection Algorithms Y Cho Electronics 8 (11), 1338, 2019 | 4 | 2019 |
FADER: False alarm detection and recovery for trust-aware routing in wireless sensor networks Y Cho, G Qu 2013 International Conference on Connected Vehicles and Expo (ICCVE), 647-648, 2013 | 4 | 2013 |
딥페이크 영상 탐지 관련 기술 동향 연구 박준, 조영호 한국정보과학회 학술발표논문집, 724-726, 2019 | 3 | 2019 |
Enhancing Trust-Aware Routing by False Alarm Detection and Recovery Y Cho, G Qu 2014 IEEE Military Communications Conference, 52-59, 2014 | 3 | 2014 |
A study on novel steganography communication technique based on thumbnail images in sns messenger environment S Yuk, Y Cho Journal of Internet Computing and Services 22 (6), 151-162, 2021 | 2 | 2021 |
Detection System of Hidden Javascript URLs in Web Source Codes H Park, S Cho, JK Park, Y Cho Proceedings of the Korean Society of Computer Information Conference, 119-122, 2019 | 2 | 2019 |
Ontology based negotiation case search system for the resolution of exceptions in collaborative production planning C Kim, Y Cho, J Yoon, C Kwak, Y Seo On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 24-25, 2005 | 2 | 2005 |
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks Y Cho, G Qu Sensors 23 (9), 4407, 2023 | 1 | 2023 |
TRUST-BASED DEFENSE AGAINST INSIDER PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS Y Cho University of Maryland College Park, 2013 | 1 | 2013 |