Jun Ho Huh
Jun Ho Huh
Samsung Research, Samsung Electronics
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα samsung.com
Παρατίθεται από
Παρατίθεται από
AMI threats, intrusion detection requirements and deployment recommendations
D Grochocki, JH Huh, R Berthier, R Bobba, WH Sanders, AA Cárdenas, ...
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
A framework integrating attribute-based policies into role-based access control
J Huang, DM Nicol, R Bobba, JH Huh
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
Hybrid spam filtering for mobile communication
JW Yoon, H Kim, JH Huh
computers & security 29 (4), 446-459, 2010
Phishing detection with popular search engines: Simple and effective
JH Huh, H Kim
International Symposium on Foundations and Practice of Security, 194-207, 2011
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
A framework for evaluating intrusion detection architectures in advanced metering infrastructures
AA Cárdenas, R Berthier, RB Bobba, JH Huh, JG Jetcheva, D Grochocki, ...
IEEE Transactions on Smart Grid 5 (2), 906-915, 2014
Surpass: System-initiated user-replaceable passwords
JH Huh, S Oh, H Kim, K Beznosov, A Mohan, SR Rajagopalan
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
H Kim, JH Huh
Electronics Letters 47 (11), 656-658, 2011
PIN selection policies: Are they really effective?
H Kim, JH Huh
computers & security 31 (4), 484-496, 2012
On the Memorability of System-generated PINs: Can Chunking Help?
JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 197--209, 2015
On the memorability of system-generated pins: Can chunking help?
JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 197-209, 2015
Syspal: System-guided pattern locks for android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on Security and Privacy (SP), 338-356, 2017
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
On the Security of Internet Banking in South Korea: a lesson in how not to regulate security
H Kim, JH Huh, R Anderson
Oxford Univ. Computing Laboratory, 2011
Boosting the guessing attack performance on android lock patterns with smudge attacks
S Cha, S Kwag, H Kim, JH Huh
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
A framework for detecting MAC and IP spoofing attacks with network characteristics
J Yu, E Kim, H Kim, J Huh
2016 International Conference on Software Security and Assurance (ICSSA), 49-53, 2016
Towards SDN enabled network control delegation in clouds
MS Malik, M Montanari, JH Huh, RB Bobba, RH Campbell
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
I Don’t Use Apple Pay because it’s less secure...: perception of security and usability in mobile tap-and-pay
JH Huh, S Verma, SSV Rayala, RB Bobba, K Beznosov, H Kim
Workshop on Usable Security, San Diego, CA, 2017
On the practicality of detecting anomalies with encrypted traffic in AMI
R Berthier, DI Urbina, AA Cárdenas, M Guerrero, U Herberg, JG Jetcheva, ...
2014 IEEE International Conference on Smart Grid Communications …, 2014
Evidence of log integrity in policy-based security monitoring
M Montanari, JH Huh, D Dagit, RB Bobba, RH Campbell
IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20