Jun Ho Huh
Jun Ho Huh
Samsung Research, Samsung Electronics
Dirección de correo verificada de samsung.com
Título
Citado por
Citado por
Año
AMI threats, intrusion detection requirements and deployment recommendations
D Grochocki, JH Huh, R Berthier, R Bobba, WH Sanders, AA Cárdenas, ...
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
1022012
A framework integrating attribute-based policies into role-based access control
J Huang, DM Nicol, R Bobba, JH Huh
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
822012
Hybrid spam filtering for mobile communication
JW Yoon, H Kim, JH Huh
computers & security 29 (4), 446-459, 2010
612010
Phishing detection with popular search engines: Simple and effective
JH Huh, H Kim
International Symposium on Foundations and Practice of Security, 194-207, 2011
512011
On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks
Y Song, G Cho, S Oh, H Kim, JH Huh
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
492015
A framework for evaluating intrusion detection architectures in advanced metering infrastructures
AA Cárdenas, R Berthier, RB Bobba, JH Huh, JG Jetcheva, D Grochocki, ...
IEEE Transactions on Smart Grid 5 (2), 906-915, 2014
472014
Surpass: System-initiated user-replaceable passwords
JH Huh, S Oh, H Kim, K Beznosov, A Mohan, SR Rajagopalan
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
362015
Detecting DNS-poisoning-based phishing attacks from their network performance characteristics
H Kim, JH Huh
Electronics Letters 47 (11), 656-658, 2011
312011
PIN selection policies: Are they really effective?
H Kim, JH Huh
computers & security 31 (4), 484-496, 2012
302012
On the Security of Internet Banking in South Korea: a lesson in how not to regulate security
H Kim, JH Huh, R Anderson
Oxford Univ. Computing Laboratory, 2011
28*2011
On the Memorability of System-generated PINs: Can Chunking Help?
JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 197--209, 2015
242015
On the memorability of system-generated pins: Can chunking help?
JH Huh, H Kim, RB Bobba, MN Bashir, K Beznosov
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 197-209, 2015
242015
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
M Korczynski, A Hamieh, JH Huh, H Holm, SR Rajagopalan, ...
IEEE Communications Magazine 54 (6), 60-67, 2016
212016
SysPal: System-guided pattern locks for Android
G Cho, JH Huh, J Cho, S Oh, Y Song, H Kim
2017 IEEE Symposium on Security and Privacy (SP), 338-356, 2017
202017
Towards SDN enabled network control delegation in clouds
MS Malik, M Montanari, JH Huh, RB Bobba, RH Campbell
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
202013
On the practicality of detecting anomalies with encrypted traffic in AMI
R Berthier, DI Urbina, AA Cárdenas, M Guerrero, U Herberg, JG Jetcheva, ...
2014 IEEE International Conference on Smart Grid Communications …, 2014
182014
Evidence of log integrity in policy-based security monitoring
M Montanari, JH Huh, D Dagit, RB Bobba, RH Campbell
IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012
172012
Reconciling security protection and monitoring requirements in advanced metering infrastructures
R Berthier, JG Jetcheva, D Mashima, JH Huh, D Grochocki, RB Bobba, ...
2013 IEEE International Conference on Smart Grid Communications …, 2013
152013
Trusted logging for grid computing
JH Huh, A Martin
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 30-42, 2008
152008
A framework for detecting MAC and IP spoofing attacks with network characteristics
J Yu, E Kim, H Kim, J Huh
2016 International Conference on Software Security and Assurance (ICSSA), 49-53, 2016
142016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20