Works by Moon, Daesung
Results: 26
Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat.
- Published in:
- Symmetry (20738994), 2018, v. 10, n. 1, p. 14, doi. 10.3390/sym10010014
- By:
- Publication type:
- Article
MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats.
- Published in:
- Symmetry (20738994), 2014, v. 6, n. 4, p. 997, doi. 10.3390/sym6040997
- By:
- Publication type:
- Article
Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2009, p. 1, doi. 10.1155/2009/845893
- By:
- Publication type:
- Article
Robust Multi-person Tracking for Real-Time Intelligent Video Surveillance.
- Published in:
- ETRI Journal, 2015, v. 37, n. 3, p. 551, doi. 10.4218/etrij.15.0114.0629
- By:
- Publication type:
- Article
Robust Multi-Person Tracking for Real-Time Intelligent Video Surveillance.
- Published in:
- ETRI Journal, 2015, v. 37, n. 2, p. 1, doi. 10.4218/etrij.15.0114.0629
- By:
- Publication type:
- Article
Dictionary Attack on Functional Transform-Based Cancelable Fingerprint Templates.
- Published in:
- ETRI Journal, 2009, v. 31, n. 5, p. 628, doi. 10.4218/etrij.09.0209.0137
- By:
- Publication type:
- Article
Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault.
- Published in:
- Journal of Information Science & Engineering, 2009, v. 25, n. 4, p. 1177
- By:
- Publication type:
- Article
A Practical Implementation of Fuzzy Fingerprint Vault.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 10, p. 1783, doi. 10.3837/tiis.2011.10.006
- By:
- Publication type:
- Article
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space.
- Published in:
- KSII Transactions on Internet & Information Systems, 2015, v. 9, n. 3, p. 1173, doi. 10.3837/tiis.2015.03.019
- By:
- Publication type:
- Article
Four-joint motion data based posture classification for immersive postural correction system.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 9, p. 11235, doi. 10.1007/s11042-016-3299-0
- By:
- Publication type:
- Article
A practical implementation of fuzzy fingerprint vault for smart cards.
- Published in:
- Journal of Intelligent Manufacturing, 2014, v. 25, n. 2, p. 293, doi. 10.1007/s10845-012-0656-3
- By:
- Publication type:
- Article
Small target detection using morphology and modified Gaussian distance function.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 6, p. 555, doi. 10.1002/sec.1069
- By:
- Publication type:
- Article
Improved cancelable fingerprint templates using minutiae-based functional transform.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 10, p. 1543, doi. 10.1002/sec.788
- By:
- Publication type:
- Article
Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT.
- Published in:
- Journal of Applied Mathematics, 2014, p. 1, doi. 10.1155/2014/815039
- By:
- Publication type:
- Article
MTD-Spamguard: a moving target defense-based spammer detection system in social network.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 20, p. 6683, doi. 10.1007/s00500-017-2976-x
- By:
- Publication type:
- Article
Attack Graph Generation with Machine Learning for Network Security †.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 9, p. N.PAG, doi. 10.3390/electronics11091332
- By:
- Publication type:
- Article
Mutation-Based Multivariate Time-Series Anomaly Generation on Latent Space with an Attention-Based Variational Recurrent Neural Network for Robust Anomaly Detection in an Industrial Control System.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 17, p. 7714, doi. 10.3390/app14177714
- By:
- Publication type:
- Article
Intelligent video surveillance system using two-factor human information.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 4, p. 2249, doi. 10.1007/s11235-011-9530-4
- By:
- Publication type:
- Article
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 4543, doi. 10.1007/s11227-016-1850-4
- By:
- Publication type:
- Article
A semantic approach to improving machine readability of a large-scale attack graph.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 6, p. 3028, doi. 10.1007/s11227-018-2394-6
- By:
- Publication type:
- Article
DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 7, p. 2881, doi. 10.1007/s11227-015-1604-8
- By:
- Publication type:
- Article
Host-based intrusion detection system for secure human-centric computing.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 7, p. 2520, doi. 10.1007/s11227-015-1506-9
- By:
- Publication type:
- Article
RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 5, p. 1740, doi. 10.1007/s11227-014-1353-0
- By:
- Publication type:
- Article
Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing.
- Published in:
- Wireless Personal Communications, 2016, v. 91, n. 4, p. 1697, doi. 10.1007/s11277-015-3121-8
- By:
- Publication type:
- Article
Security Enhancement for Smartphone Using Biometrics in Cyber-Physical Systems.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, v. 10, n. 4, p. 1, doi. 10.1155/2014/136538
- By:
- Publication type:
- Article
Security Enhancement for Smartphone Using Biometrics in Cyber-Physical Systems.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/136538
- By:
- Publication type:
- Article