Obfuscated malicious javascript detection using classification techniques P Likarish, E Jung, I Jo 2009 4th International Conference on Malicious and Unwanted Software …, 2009 | 271 | 2009 |
Data mining-based ethereum fraud detection E Jung, M Le Tilly, A Gehani, Y Ge 2019 IEEE international conference on blockchain (Blockchain), 266-273, 2019 | 92 | 2019 |
B-apt: Bayesian anti-phishing toolbar P Likarish, E Jung, D Dunbar, TE Hansen, JP Hourcade 2008 IEEE International Conference on Communications, 1745-1749, 2008 | 65 | 2008 |
Controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster E Jung, A Shaheen US Patent App. 10/926,599, 2006 | 51 | 2006 |
An efficient LKH tree balancing algorithm for group key management DW Kwak, SJ Lee, JW Kim, E Jung IEEE Communications Letters 10 (3), 222-224, 2006 | 44 | 2006 |
Certificate dispersal in ad-hoc networks MG Gouda, E Jung 24th International Conference on Distributed Computing Systems, 2004 …, 2004 | 33 | 2004 |
A targeted web crawling for building malicious javascript collection P Likarish, E Jung Proceedings of the ACM first international workshop on Data-intensive …, 2009 | 24 | 2009 |
Controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster E Jung, A Shaheen US Patent App. 10/926,600, 2006 | 22 | 2006 |
Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster E Jung, AA Shaheen US Patent 7,412,063, 2008 | 17 | 2008 |
Vulnerability analysis of certificate graphs E Jung, MG Gouda International Journal of Security and Networks 1 (1-2), 13-23, 2006 | 15 | 2006 |
You're not who you claim to be: Website identity check for phishing detection I Jo, E Jung, HY Yeom 2010 Proceedings of 19th International Conference on Computer Communications …, 2010 | 14 | 2010 |
Towards run-time verification in access control F Turkmen, E Jung, B Crispo 2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011 | 13 | 2011 |
Optimal dispersal of certificate chains E Jung, ES Elmallah, MG Gouda International Symposium on Distributed Computing, 435-449, 2004 | 13 | 2004 |
BayeShield: conversational anti-phishing user interface. P Likarish, DE Dunbar, JP Hourcade, E Jung SOUPS 9, 1, 2009 | 10 | 2009 |
Optimal dispersal of certificate chains E Jung, ES Elmallah, MG Gouda IEEE Transactions on Parallel and Distributed Systems 18 (4), 474-484, 2007 | 10 | 2007 |
Efficiently validating aggregated IoT data integrity N Kaâniche, E Jung, A Gehani 2018 IEEE Fourth International Conference on Big Data Computing Service and …, 2018 | 9 | 2018 |
Interactive website filter for safe web browsing I Jo, E Jung, HY Yeom Journal of information science and engineering 29 (1), 115-131, 2013 | 8 | 2013 |
Privacy policy enforcement for health information data access F Currim, E Jung, X Xiao, I Jo Proceedings of the 1st ACM international workshop on Medical-grade wireless …, 2009 | 8 | 2009 |
Controlling Delivery Of Broadcast Encryption Content For A Network Cluster From A Content Server Outside The Cluster E Jung, AA Shaheen US Patent App. 12/164,942, 2008 | 8 | 2008 |
Stabilizing certificate dispersal MG Gouda, E Jung Self-Stabilizing Systems: 7th International Symposium, SSS 2005, Barcelona …, 2005 | 8 | 2005 |