Publications

National Conferences

망혼용단말 탐지방법에 대한 연구 및 자동탐지시스템 구현

M. H. Lee and J. W. Yoon, 정보보호학회논문지 제28권 제2호, 2018.4, 457-469

link


IoT환경에서의 부하 균형을 이룬 네트워크 토폴로지 탐색

H. S. Park, H. S. Kim and J. W. Yoon,  한국정보과학회, 2017, [accepted for publication]


효율적인 임무피해평가를 위한 자산-임무 의존성 모델 적 및 최적화된 구현

Y. B. Jeon, H. S. Jung, I. S. Han, and J. W. Yoon, 한국정보과학회, 2017, [accepted for publication]


NS-3 시물레이터를 활용한 토폴로지 규모추정에 대한 실험적 검증

H. S. Kim, H. S. Park and J. W. Yoon, 한국정보전자통신과학기술학회, 2017, [accepted for publication]


AISecurity를 위한 베이지안 추론 기술 소개

Ji Won Yoon, 한국정보과학회, 정보과학회 컴퓨팅의 실제 논문지 22(12), 2016.12, 694-695


허니암호의 메시지 복구보안 기능을 위한 암호패딩 문제점 분석

C.-H. Ji and Ji Won Yoon, 한국정보과학회, 정보과학회논문지 44(6), 2017.6, 637-642


Open CV를 활용한 미확인 항공기 추적을 위한 비정형 대용량 데이터 매칭 시스템 설계

J.-H. Cho and Ji Won Yoon, Journal of Digital Forensics 2016 Dec.: 10(2), [area: Digital Forensics]

link


생체정보 다분할 분산저장 기법을 통한 보안성 향상의 생체인증 시스템 설계

Yoongi Hong and Ji Won Yoon, 한국융합보안학회, 2016, (Accepted for publication with minor revision)[area: biometrics]


Rapid Hybrid Recommender System with BigData Log for Outbound Leisure Product

Kyusik Lee and Ji Won Yoon, 2016, 제22권 제12호, 2016.12, 646-653[area: data mining]

link


Author Identification using Artificial Neural Network

Jisoo Jung and Ji Won Yoon, 한국정보보호학회, 제26권 제5호, 2016.10, 1191-1199 [area: cyber intelligence]


ISIS-related issue analysis system based on Topic model (Topic model 기반의 국가 별 ISIS 관련 관심 이슈 분석 시스템)

Sunghoon Kim, and Ji Won Yoon, 한국정보과학회, 제43권 제11호, 2016.11, 1201-1209 [area: cyber intelligence]


Illegal and Harmful Information Detection Technique Using Combination of Search Words (단어 조합 검색을 이용한 불법·유해정보 탐지 기법)

Byoung-Woo Han, and Ji Won Yoon, 한국정보보호학회, 제26권 제2호, 2016.4, 397-404[area: cyber intelligence]

link


Which country"s end devices are most sharing vulnerabilities in East Asia? (거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구)

Kwang-Won Kim and Ji Won Yoon, 한국정보보호학회, 제25권 제5호, 2015.10, 1281-1291 [area: information security]

link


스마트 기기 환경에서 전력 신호 분석을 통한 프라이버시 침해 위협 (Threatening privacy by identifying appliances and the pattern of the usage from electric signal data)

Jae-Yeon Jo and Ji Won Yoon, 한국정보보호학회 Journal of The Korea Institute of Information Security & Cryptology, 제25권 제5호, 2015.10, 1001-1009, 2015

link


Probabilistic K-nearest neighbour classifier for detection of malware in android mobile

Seung Joon Kang and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, 2015, 정보보호학회논문지 제25권 제4호, 2015.8, 817-827 

link


Optimization of Lightweight Encryption Algorithm (LEA) using threads and shared memory of GPU

Moo Kyu Park and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, 2015,  정보보호학회논문지 제25권 제4호, 2015.8, 719-726 

link


A study on the managed security services (MSS) method for energy-based SCADA Systems (에너지 기반보호시설의 보안관제 방안에 관한 연구)

Jeong-woo Jang, Woo-suk Kim and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 2, Apr. 2015, pp. 279-292, 

link


클라우드 환경에서의 사이버 물리 시스템 관점에서 본 헬스케어 보안 관련 이슈들

Hyelim Lee, Jae Yeon Jo, and Ji Won Yoon, 정보보학회지, 2014, Vol. 24, No. 6, 2014, pp. 7-13

link


A Side Channel Attack with Vibration Signal on Card Terminal (진동 신호를 이용한 카드 단말기 부채털 공격)

Soo Hee Jang, YoungMok Ha and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, Vol. 24, No. 6,  Dec, 2014, pp. 1045-1053

link


A Study of Accident Prevention Effect through Anomaly Analysis in E-Banking (전자금융거래 이상징후 분석을 통한 사고예방 효과성에 관한 연구)

Eun Young Park, and Ji Won Yoon, Journal of Socieity for e-Business Studies, Vol 19, No. 4, Nov. 2014, pp. 119-134

link


A Study on the Countermeasures for Prevention of Opening a Fraud Account (사기이용계좌 개설 방지를 위한 대응방안 연구)

Chang Woo Kim and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 1, Feb., 2015, pp. 173-179

link


Efficient Malware Detector for Android Devices

Hyelim Lee and Ji Won Yoon,  Korea institute of information security and cryptology, 2014 

link


Network Analysis of Korean legislators using Bipartite Network Projection

Ji-yeon Lee, Hyun-joo Jo, and Ji Won Yoon, Journal of Internet Computing and Services(JICS), 2014, August

link


Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector), 개인식별화된 SMS 발송을 통한 스팸식별 및 스미싱 예방 (금융권 중심)

Choon Kyong Joo and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology,  v.24 no.4, 2014, pp.645-653

link


Network Analysis of Legislators and Committees based on bills in the 18th and 19th National Assembly, Korea 

Ji-yeon Lee, Hyun-joo Jo, and, Ji Won Yoon, The Journal of Digital Policy and Management,  2014

link


Incremental -nearest neighbor classifier for detection of outlier signature in mobile POS

Young-Mok Ha, Ji Won Yoon and Young An Kim, Journal of Security Engineering, 2014

link

 

The danger and vulnerability of eavesdropping by using loud-speakers

Seung Joon Lee, Young-Mok Ha, Hyun Ju Jo, and Ji Won Yoon, Journal of The Korea Institute of Information Security & Cryptology, Vol. 23, No.6, Dec. 2013


The Sub Authentication Method For Driver Using Driving Patterns

J.M. Jeong, H.C. Kang, H. J. Jo, Ji Won Yoon and D.H. Lee, Journal of The Korea Institute of Information Security & Cryptology, 2013


A statistical selection of Acceptance Time Window (ATW) to assure the freshness of a protocol run

Eun Ho Shin, H. S. Kim and Ji Won Yoon, Journal of Security Engineering, 2013

link