Paper

Journal of overseas specialties

  • S. Nam, S. Jeon, H. Kim and J. Moon. “Recurrent GANs Password Cracker For IoT Password Security Enhancement” MDPI, SENSORS, vol.20 , issue 11 ,2020
  • S. Jeon, and J. Moon. “Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences” ELSEVIER SCIENCE INC, INFORMATION SCIENCES, vol.535 , Oct.2020
  • S. Nam, S. Jeon, and J. Moon. “Generating Optimized Guessing Candidates toward Better Password Cracking from Multi-Dictionaries Using Relativistic GAN” MDPI, APPLIED SCIENCES-BASEL, vol.10 , issue 20 ,Oct. 2020
  • S. Nam, S. Jeon, and J. Moon. “A New Password Cracking Model with Generative Adversarial Networks” World Conference on Information Security Applications, vol.30 , issue 3, Aug. 2019. (Best Paper)
  • M. Chung, W. Ahn, B. Min, J. Seo, J. Moon. “An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants.” JOURNAL OF SUPERCOMPUTING-(SCI), March. 2018.
  • J. Moon, H. Bea, J. Song, and S. Choi. “Algorithmic methods of reference-line construction for estimating long-term strength of plastic pipe system.” POLYMER TESTING-LONDON-(SCI), Sep. 2016.
  • E. Kim and J. Moon. “A new approach to deploying private mobile network exploits.” The Journal of Supercomputing(SCI), Jan. 2016.
  • S. Kim, S. Ma, and J. Moon. “A novel secure architecture of the virtualized server system.” JOURNAL OF SUPERCOMPUTING, 2015.
  • I. Kim, J. Seo, T. Shon, and J. Moon. “A novel approach to detection of mobile rogue access points.” SECURITY AND COMMUNICATION NETWORKS(SCI), Oct. 2014.
  • T. Shon, J. Cho, K. Han, and H. Choi. “Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction.” MONET, vol.19, Issue 3, pp.404-413, Aug. 2014.
  • J. Ji, D. Han, S. Jung, S. Lee, and J. Moon. “Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards.” INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS(SCI), Mar. 2014.
  • J. Choi, J. Seo, T. Shon, J. Cho, and J. Moon. “Simple secure RFID and reader communication schematic for smart meter network.” INFORMATION (JAPAN)(SCOPUS), Jul. 2013.
  • J. Cho, T. Shon, K. Choi, and J. Moon. “Dynamic learning model update of hybrid-classifiers for intrusion detection.” JOURNAL OF SUPERCOMPUTING(SCI), May. 2013.
  • J. Cho, K. Choi, T. Shon, and J. Moon. “Power dissipation and area comparison of 512-bit and 1024-bit key AES.” COMPUTERS MATHEMATICS WITH APPLICATIONS(SCI), May. 2013.
  • J. Cho, H. Lee, K. Choi, and J. Moon. “Visualization of abnormal behavior detection using parallel coordinate and correspondence analysis.” INFORMATION (JAPAN)(SCIE), Mar. 2013.
  • M. Chung, Y. Lee, T. Shon, and J. Moon. “A security model for IPTV with one-time password and Conditional Access System for smart mobile platform.” TELECOMMUNICATION SYSTEMS(SCIE), Feb. 2013.
  • J. Lee, J. Cho, J. Seo, T. Shon, and D. Won. “A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.” MONET,vol.18, Issue 1, pp.122-128, Feb. 2013.
  • G. Lee, O. Lee, S. Park, J. Moon, and C. Oh. “Quantitative color assessment of dermoscopy images using perceptible color regions.” SKIN RESEARCH AND TECHNOLOGY(SCI), Nov. 2012.
  • H. Oh, J. Seo, J. Lim, and J. Moon. “A Method of Detecting Abnormal Malicious Remote Control Codes using Network Domain Information.” INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL(SCIE), May. 2012.
  • I. Lee, S. Jeong, S. Yeo, and J. Moon. “A Novel Method for SQL Injection Attack Detection Based on Removing SQL Query Attribute Values.” MATHEMATICAL AND COMPUTER MODELLING(SCIE), vol.55, pp.258-68, Issues 1-2, Jan. 2012.
  • H. Kim, S. Lim, J. Moon, B. Kim, and E. Jung. “A photographic forensic case study: Myths.” principles and techniques, Mathematical and Computer Modelling, vol.55, Issues 1-2, pp.3-11, Jan. 2012.
  • J. Cho, J. Lee, J. Seo, and T. Shon. “A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.” IEEE, pp.573-577, Oct. 2011.
  • J. Cho, K. Choi, T. Shon, and J. Moon. “A Network Data Abstraction Method for Data Set Verification.” Secure and Trust Computing(SCIE), vol.186, pp.54-62, Jun. 2011.
  • H. Shin, M. Chung, and J. Moon. “A distributed and Dynamic System for Detecting Malware.” The 25th IEEE International Conference on Advanced Information Networking and Applications, Mar. 2011.
  • J. Cho, T. Shon, K. Choi, J. Seo, and J. Moon. “Simple Security Protocols based on EPC Global Generation 2.” An International Interdisciplinary Journal, INT INFORMATION INST(SCIE), 2012.
  • J. Cho, M. Chung, K. Choi, Y. Lee, and J. Moon. “Enhanced Security Protocols for EPC Global Gen2 on Smart Grid Network.” 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and App, 2010.
  • S. Pyo, Christian Tischler, S. Choi, and J. Moon. “On-set slow cracking time detection for the Notched Ring Test.” POLYMER TESTING(SCI), Jun. 2010.
  • J. Cho, C. Lee, S. Cho, J. Song, J. Lim, and J. Moon. “A statistical model for network data analysis: KDD CUP 99′ data evaluation and its comparing with MIT Lincoln Laboratory network data.” SIMULATION MODELLING PRACTICE AND THEORY, vol.18, Issue 4, Apr. 2010.
  • S. Lee, S. Jeong, S. Yeo, and J. Moon. “A Novel Method for SQL Injection Attack Detection Based on Removing SQL Query.” The 2010 FTRA World Convergence Conference, 2010.
  • J. Cho, H. Lee, K. Choi, and J. Moon. “Visualization of Abnormal Behavior Detection using Parallel Coordinate and Correspondence Analysis.” The 2010 FTRA World Convergence Conference, 2010.
  • J. Chung and Y. Lee. “A Security Model for IPTV with One-Time Password and Conditional Access System for Smart Mobile Platforms.” WCC 2010 FTRA World Convergence Conference, 2010.
  • I. Kim, I. Lee, J. Cho, and J. Moon. “Visualization of Network Components for Attack Analysis”, IEEE Symposium Series on Computational Intelligence 2009, 2009
  • S. Kwon, S. Bae, J. Cho, and J. Moon. “Study of Fuzzy Clustering Methods for Malicious Codes Using Native API Call Frequency.” IEEE Symposium Series on Computational Intelligence, 2009.
  • M. Chung, J. Cho, and J. Moon. “An Effective Denial of Service Detection Method using Kernel Based Data.” IEEE Symposium Series on Computational Intelligence, 2009.
  • J. Cho, M. Chung, and J. Moon. “A Kernel Data Analysis Method for Detecting Flood Attacks.” Journal of Information Assurance and Security, 2009.
  • J. Cho, C. Lee, S. Cho, H. Jung, J. Lim, and J. Moon. “A Statistical Model for Network Data Analysis : KDD CUP 99′ Data Evaluation and its Comparing with MIT Lincoln Laboratory Network Data.” Simulation Modelling Practice and Theory, vol.18, Issue 4, pp.431-435, Apr. 2010.
  • H. Oh, S. Kang, J. Seo, I. Lee, and J. Moon. “Study on a Safe and Efficient mOTP(mobile-OTP) Authentication Mechanism for the Mobile Environment.” Journal of Internet Technology, 2009.
  • S. Chae, H. Lee, J. Cho, M. Jung, J. Lim, and J. Moon. “A Regression Method to compare Network Data and Modeling Data using Generalized Additive Model.” Lecture Notes in Computer Science, 2008.
  • I. Kim, J. Cho, J. Moon, and J. Lim. “A Bayesian Approach to Universal Language E-mail Analysis.” The 3rd International Joint Workshop on Information Security and Its Applications, 2008.
  • M. Lee, T. Shon, K. Cho, M. Chung, J. Seo, and J. Moon. “An approach for classifying worms based on temporal behavior and worm packet flows.” Lecture Notes In Computer Science, pp.646-655, 2007.
  • K. Cho, J. Lee, J. Lim, and J. Moon. “Verification Method of Network Simulation for Pervasive Environments.” 2007 Third International conference on Security and Privacy in Communication Networks and the Workshops, 2007.
  • T. Shon and J. Moon. “A hybrid machine learning approach to network anomaly detection.” Information Sciences, 2007.
  • J. Seo, Y. Kim, E. Park, S. Lee, T. Shon, and J. Moon. “Design and implementation of a patch management system to remove security vulnerability in multi-platforms.” LNAI 4223, pp.716-724, 2006.
  • T. Shon, Xeno Kovah, and J. Moon. “Applying genetic algorithm for classifying anomalous TCP/IP packets.” Neurocomputing, 2006.
  • J. Seo, Y. Kim, T. Shon, and J. Moon. “Design of a Centralized Security Patch Management System.” International Workshop on Security Engineering and Information Technology on High Performance Network, 2006.
  • J. Cho, S. Cho, and J. Moon. “Sampling the Smallest Network Packet Dataset for Efficient Intrusion Detection.” European Conference on Computer Network Defence, 2005.
  • J. Seo, c. Lee, T. Shon, K. Cho, and J. Moon. “A New DDoS Detection Model using Multiple SVMs and TRA.” LNCS, SecUbiq 2005, pp.976-985, 2005.
  • J. Seo, C. Lee, J. Kim, T. Shon, and J. Moon. “PPF Model with CTNT to Defend Web Server from DDoS Attack.” LNCS, SecUbiq 2005, 2005.
  • J. Seo, C. Lee, T. Shon, and J. Moon. “SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.” LNCS, GCC 2005, 2005.
  • J. Seo, C. Lee, J. Kim, T. Shon, and J. Moon. “Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks.” Lecture Notes in Computer Science, 2005.
  • T. Shon, J. Seo, and J. Moon. “SVM Approach with a Genetic Algorithm for Network Intrusion Detection.” LNCS, ISCIS 2005, 2005.
  • J. Seo, C. Lee, T. Shon, and J. Moon. “A New Approach to Detect DDoS Attacks using Support Vector Machine.” The 20th International Symposium on Computer and Information Sciences, 2005.
  • J. Kim, J. Cho, and J. Moon. “Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection.” Lecture Notes in Computer Science, 2005.
  • T. Shon, Y. Kim, C. Lee, and J. Moon. “A Machine Learning Framework for Network Anomaly Detection using SVM and GA.” The 6th IEEE Information Assurance Workshop(IAW), 2005.
  • J. Seo, C. Lee, T. Shon, and J. Moon. “SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.” LNCS, GCC 2005, 2005.
  • S. Son, S. Park, G. Park, M. Kim, J. Moon, and C. Oh. “Objective evaluation for severity of atopic dermatitis by morphologic study of skin surface contours.” Skin Research and Technology 2005, 2005.
  • S. Park, S. Ha, D. Yu, S. Son, D. Kim, I. Kim, J. Moon, M. Kim, and C. Oh. “Quantitatave Evaluation of Severity in Psoriatic lesions using three-dimensional morphometry.” Experimental Dermatology, 2004.
  • M. Kim, S. Park, S. Ha, and C. Oh. “Objective Interpretation of severity of SLS induced edima by stereoimaging.” Journal of Dermatogical Science, 2004.
  • J. Seo, C. Lee, and J. Moon. “Depending DDos Attacks using Network Traffic Analysis and Probabilistic Packet Drop.” Lecture Note on Computer Science 3252, 2004.
  • T. Sohn, J. Seo, and J. Moon. “Simple Key Agreement and its Efficient Analysis for Grid Computing Environments.” Lecture Note on Computer Science 3251, 2004.
  • J. Moon, T. Shon, J. Seo, J. Kim, and J. Seo. “An approach for Spam E-mail detection with Support Vector Machine and N-Gram Indexing.” Lecture Note on Computer Science 3280, 2004.
  • T. Shon, J. Moon, adn H. Choi. “Efficiency Evaluation for Key Distribution Models in Satellite Terminals.” Lecture Note on Computer Science 3283, 2004.
  • J. Seo, D. Choi, E. Park, T. Shon, and J. Moon. “patch management System for Multi-platform Environment.” Lecture Note on Computer Science, 3320, 2004.
  • J. Yune, S. Park, H. Oh, D. Kim, D. You, I. Kim, J. Moon, M. Kim and C. Oh. “Objective Assessment of Involved surface area in patient with psoriasis.” Skin and Research and Technology, 2003.
  • S. Lee, E. Im, J. Sohn, T. Sohn, J. Moon, and D. Kim. “A Secure Patch Distribution Architecture.” Intelligent Systems Design and Applications, A. Abraham Eds, Advances in Soft Computing, Springer-Verlag, 2003.
  • T. Sohn, T. Noh, and J. Moon. “Support Vector Machine Based ICMP Covert Channel Atteck Detection.” Computer Security Network, LNCS2776, 2003.
  • T. Sohn, J. Seo, and J. Moon. “A study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.” Information and Communications Security, LNCS2836, 2003.
  • T. Sohn, J. Moon, S. Lee, D. Lee, and J. Lim. “Covert Channel Detection in the ICMP payload using Support Vector Machine.” Computer and Information Science-ISCIS 2003, 2003.
  • T. Sohn, J. Moon, and J. Lim. “A Perfomance Ananlysis of Key Distribution Methods in Satellite Communication Environments.” ICOIN, 2003.
  • T. Sohn, J. Moon, J. Seo, E. Im, and C. Lee. “Safe Patch Distribution Architecture in Intranet Environments.” SAM, 2003.
  • S. Lee, J. Park, H. Byun, J. Moon, and S. Lee. “Automatic generation of structured hyper documents from document images.” International Journal of Pattern Recognition, 2002.
  • S. Kim, S. Hong, S. Son, C. Oh, and J. Moon. “Quantitative histopathologic findings of erythromelanosis follicularis faciei et colli.” Cutaneous Pathology, 2001.
  • J. Moon and C. Oh. “Solar Damages in Skin Tumors: Quantification of Elastotic Material.” Dematology, 2001.
  • J. Cho, Y. Im, J. Park, J. Moon, and D. Park. “Design of GBSB Neural Network Using Solution Space Parameterization and Optimization Approach.” International Journal of Fuzzy Logic and Intelligent System, 2001.
  • J. Cho, J. Park, J. Moon, and D. Park. “Synthesis of GBSB-based Neural Associative Memories Using Evolution Program.” International Journal of Fuzzy Logic and Intelligent System, 2001.
  • J. Park, T. No, J. Seo, I. Park, J. Kim, J. Moon, K. Han, D. Choi, and J. Ko. “Using Adaptive Resonance Theory2 for Intrusion Detection System.” KIISC, 2001.
  • M. Oh, M. Kim, and J. Moon. “Evaluation of skin furrows in aging process using stereo images.” Skin Research and Technology, 1997.

 


National journal of professional studies

  • H. kim, J. Moon. “Runtime-Guard Coverage Guided Fuzzer Avoiding Deoptimization for Optimized Javascript Functions”, Journal of the Korea Institute of Information Security & Cryptology , vol.30 , issue 3 , June. 2020
  • J. Seo, J. Moon. “Detection of NoSQL Injection Attack in Non-Relational Database Using Convolutional Neural Network and Recurrent Neural
    Network” , Journal of the Korea Institute of Information Security & Cryptology , vol.30, issue 3 , June. 2020
  • S. Choi, J. Moon. “An Analysis Techniques for Detecting Game Bot using a Deep Learning Model” ,Korean Institute of Next Generation Computing,THE JOURNAL OF KOREAN INSTITUTE OF NEXT GENERATION COMPUTING , vol.16 , issue 3 , June. 2020
  • M. Kim, J. Moon. “Speaker Verification Model Using Short-Time Fourier Transform and Recurrent Neural Network.”, Journal of the Korea Institute of Information Security & Cryptology, vol.29 , issue 6, Dec. 2019.
  • T. Yoon, J. Moon. “Private Key Backup and Recovery Framework in Blockchain-based Service Environment.”, Journal of Digital Contents Society, vol.20, issue 6, Dec. 2019.
  • J. Min, J. Moon. “A Substitute Model Learning Method Using Data Augmentation with a Decay Factor and Adversarial Data Generation Using Substitute Model.”, Journal of the Korea Institute of Information Security & Cryptology, vol.29 , issue 6 ,Dec. 2019.
  • H. Cho, J. Moon. “A layered-wise data augmenting algorithm for small sampling data.”, Journal of Internet Computing and Services(JICS), vol.20 , issue 6, Dec. 2019.
  • S. Lee, J. Moon. “A Method for Field Based Grey Box Fuzzing with Variational Autoencoder.”, Journal of the Korea Institute of Information Security & Cryptology, Dec. 2018.
  • S. Lee, J. Moon. “PowerShell-based Malware Detection Method Using Command Execution Monitoring and Deep Learning.”, Journal of the Korea Institute of Information Security & Cryptology, Dec. 2018.
  • J. Kim, J. Moon. “Detecting code reuse attack using RNN.”, Journal of Internet Computing and Services(JICS), Jun. 2018.
  • S. Jeon, J. Moon. “A Deep Neural Network Model Based on a Mutation Operator.” KIPS Transactions on Software and Data Engineering, Dec. 2017.
  • J. Jeon, J Moon. “A Study on the Characteristics of a series of Autoencoder for Recognizing Numbers used in CAPTCHA.”. Journal of Internet Computing and Services (JICS), Dec. 2017.
  • J. Seo, J. Moon. “Analysis and Countermeasure for BadUSB Vulnerability.” Institute of Embedded Engineering of Korea, Dec. 2017.
  • D. Kim, J. Moon. “A memory protection method for application programs on the Android operating system.” Journal of Internet Computing and Services (JICS), Dec. 2016.
  • J. Jang, J. Moon. “A Real-Time User Authenticating Method Using Behavior Pattern Through Web.” Journal of the Korea Institute of Information Security & Cryptology, Dec. 2016.
  • J. Kim, J. Moon. “A Study on Data Security of Web Local Storage.” Journal of Internet Computing and Services, Dec. 2016.
  • S. Ma, J. Ju and J. Moon. “The security requirements suggestion based on cloud computing security threats for server virtualization system.” Journal of the Korea Institute of Information Security & Cryptology, Dec. 2015.
  • J. Ju, S. Ma and J. Moon. “Proposal of Security Requirements for Storage Virtualization System against Cloud Computing Security Threats, Dec. 2014.
  • S. Lee, H. Kang and J. Moon. “A Study on Smishing Block of Android Platform Environment.” Journal of the Korea Institute of Information Security & Cryptology, Oct. 2014.
  • C. Yu, J. Moon. “A Study on Protecting for forgery modification of User-input on Webpage.” Journal of the Korea Institute of Information Security & Cryptology, Aug. 2014.
  • J. Lee, S. Lee and J. Moon. “Detecting Rogue AP using k-SVM method.” Journal of the Korea Institute of Information Security & Cryptology, Feb. 2014.
  • C. Lee, S. Kim, Y. Yeo and J. Moon. “Proposal of Security Requirements based on Layers and Roles for the Standardization of Cloud Computing Security Technology.” Journal of Security Engineering, Aug. 2013.
  • S. Bae, J. Cho, T. Shon and J. Moon. “Malicious Code Detection using the Effective Preprocessing Method Based on Native API.” Journal of the Korea Institute of Information Security & Cryptology, Aug. 2012.
  • D. Yang, M. Chung, J. Cho, T. Shon and J. Moon. “Research on User Data Leakage Prevention through Memory Initialization.” Journal of the institute of electronics engineers of Korea, July. 2012.
  • S. Shin, M. Jung and J. Moon. “A study on the effective method of detecting denial of service attack to protect Guest OS in paravirtualization.” Journal of the Korea Institute of Information Security & Cryptology, June. 2012.
  • J. Kim, M. Chung, J. Cho, T. Shon and J. Moon. “Efficient and Secure User Authentication and SDP Encryption Method in SIP.” Journal of the Korea Institute of Information Security & Cryptology, June. 2012.
  • I. Kon, J. Cho, T. Son and J. Moon. “A Study on the Malicious Web Page Detection Systems using Real-Time Behavior Analysis”, Korea Information Processing Society, June. 2012.
  • J. Kim, M. Chung, J. Cho, T. Shon and J. Moon. “Efficient and Secure User Authentication and SDP Encryption Method in SIP”, Journal of the Korea Institute of Information Security & Cryptology, June. 2012.
  • I. Kim, J. Cho, T. Son and J. Moon. “A Method for Detecting Unauthorized Access Point over 3G Network”, Journal of the Korea Institute of Information Security & Cryptology, Apr. 2012.
  • S. Lee, J. Moon. “A Study on Excellent Patent Selection Method using Decision Tree Learning Algorithm”, Journal of Knowledge Information Technology and Systems (JKITS), Apr. 2012.
  • Y. Lee, M. Chung, H. Jeong, T. Son and J. Moon. “A Study on Generic Unpacking using Entropy Variation Analysis”, Journal of the Korea Institute of Information Security & Cryptology, Apr. 2012.
  • S. Jeong, M. Chung, J. Chon, T. Son and J. Moon. “A Research on Cloud Architecture and Function for Virtualization Security of Cloud Computin”, Journal of Security Engineering, Oct. 2011.
  • J. Mo, M. Chung, J. Cho and J. Moon. “Web contents deformation detection method by BHO”. The Journal of Korea Navigation Institute, Aug. 2011.
  • D. Yang, J. Cho, T. Shon and J. Moon. “윈도우 환경의 메모리 취약점을 이용한 공격 및 방어”, Journal of Korea Information Technology Convergence Society, Jul. 2011.
  • H. Shin, J. Moon. “A Study on Minimizing Infection of Web-based Malware through Distributed & Dynamic Detection Method of Malicious Websites, Journal of the Korea Institute of Information Security & Cryptology, Jun. 2011.
  • T. Kim, K. Seo, Y. Lee, J. Lim and J. Moon. “An Effective Feature Generation Method for Distributed Denial of Service Attack Detection using Entropy”, Journal of the Korea Institute of Information Security & Cryptology, Aug. 2010.
  • K. Seo, T. Kim, J. Kim, J. Lim and J. Moon. “A Novel Method of Effective Protection of IPTV Contents with One-Time Password and Conditional Access System”, Journal of the Korea Institute of Information Security & Cryptology, Aug. 2010.
  • J. Park, J. Cho and J. Moon. “Role Based Petri-Net : Role Based Expression Model for an Efficient Design of Attack Scenarios.”, Journal of the Korea Institute of Information Security & Cryptology, Feb. 2010.
  • S. Park and J. Moon. “The Study on the Security Model for ActiveX Control Management through Security Authenticatio”, Journal of the Korea Institute of Information Security & Cryptology, Dec. 2009.
  • S. Choi, J. Cho and J. Moon. “Buffer Overflow Malicious Code Detection by Tracing Executable Area of Memory”, Journal of the Korea Institute of Information Security & Cryptology, Oct. 2009.
  • S. Kang and J. Moon. “An Efficient and Secure Method for Managing Logs of Certified e-Document AuthorityUsing Hash Tree”, Jouranl of Information and Security, Apr. 2009.
  • K. Yu, J. Lee, S. Bae, J. Cho and J. Moon. “A Suitability Evaluation Method for Quantitative Assessment of Intrusion Tolerant System using AHP-Fuzzy Integral”, Journal of KIISE : Computer Systems and Theory, Apr. 2009.
  • O. Kwon, S. Bae, J. Cho and J. Moon. “Malicious Codes Re-grouping Methods using Fuzzy Clustering based on Native API Frequency”, Journal of the Korea Institute of Information Security & Cryptology, Dec. 2008.
  • H. Lee, J. Cho, M. Jung and J. Moon. “An Approach to Detect Spam E-mail with Abnormal Character Composition”, Journal of the Korea Institute of Information Security & Cryptology, Dec. 2008.
  • I. Lee, J. Cho, K. Cho and J. Moon. “A Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values”, Journal of the Korea Institute of Information Security & Cryptology, Oct. 2008.
  • H. Kim, J. Cho, I. Lee and J. Moon. “Effective Feature Selection Model for Network Data Modeling”, JOURNAL OF BROADCAST ENGINEERING, Jan. 2008.
  • J. Cho, H. Kim and J. Moon. “Effective and Statistical Quantification Model for Network Data Comparing”, JOURNAL OF BROADCAST ENGINEERING, Jan. 2008.
  • T. Kang, J. Cho, M. Chung, J. Moon. “Malware Detection Via Hybrid Analysis for API Calls”, Journal of the Korea Institute of Information Security & Cryptology, Dec. 2007.
  • Y. Jun, J. Moon. J. Seo, “A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling”, Journal of the Korea Institute of Information Security & Cryptology, Oct. 2007.
  • J. Cho, J. Moon. “대응분석 방법을 이용한 네트워크 데이터 비교 분석 방법”, 사이버정보전학회, 2006
  • M. Lee, T. Shon, S. Cho, J. Moon. D. Kim, J. Seo and K. Sohn. “A Study of Formalized Presentation of Worm based on time-based Behavioral sequences”, Journal of the Korea Institute of Information Security & Cryptology, Jun. 2006.
  • D. Min, T. Shon and J. Moon. “A Study on the Phishing Attack Protection using URL Spoofing”, Journal of the Korea Institute of Information Security & Cryptology, Oct. 2005.
  • T. Shon, J. Park and J. Moon. “인터넷 트래픽의 정보은닉 기법 분석”, Journal of the Korea Institute of Information Security & Cryptology, Apr. 2004.
  • J. Park, U. Choi, T. Shon and J. Moon. “A Study on Network Forensics Information in Automated Computer Emergency Response System”, Journal of the Korea Institute of Information Security & Cryptology, Aug. 2004.
  • J. Seo, T. Shon, J. Seo and J. Moon. “A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine”, Journal of the Korea Institute of Information Security & Cryptology, Apr. 2004.
  • T. Shon, J. Seo, J. Seo, J. Moon and H. Choi, “A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine”, Journal of the Korea Institute of Information Security & Cryptology, Feb. 2004.
  • J. Seo, D. Min and J. Moon. “A Study on the Multi – Modal Biometrics System”, The Korean Institute of Information Scientists and Engineers, Apr. 2003.
  • T. Sohn, J. Seo, J. Moon. J. Seo, E. Im, and C. Lee. “Design and Implementation of a Secure Software Architecture for Security Patch Distribution”, Journal of the Korea Institute of Information Security & Cryptology, Aug. 2003.
  • T. Sohn, J. Seo, W. Koo, D. Min, J. Moon. H. Park and B. Lee. “보안도구에 대한 우회공격 기법 분류 및 분석”, Korea Institute Of Information Security And Cryptology, Apr. 2003.
  • J. Seo, T. Sohn, J. Moon. J. Seo and C. Lee. “A Study on How to substitute Patch server when it brake downed”, JCCI, Apr. 2003.
  • J. Kim, T. Noh, J. Koh, D. Choi, K. Han and J. Moon. “Network based Intrusion Detection System using Adaptive Resonance Theory 2”, Korea Institute Of Information Security And Cryptology, Jun. 2002.
  • D. Chang, J. Moon. C. Park and K. Yoon. “Parameter Extraction of InGaP/GaAs HBT Small-Signal Equivalent Circuit Using a Genetic Algorithm”, Journal of fuzzy logic and intelligent systems, 2001.

 


University journal

  • Y. Kim., J. Moon, “User Authentication Using Accelerometer Sensor in Wrist-Type Wearable Device”, KIPS Transactions on Computer and Communication Systems, 2016
  • H. Lee, J. Cho and J. Moon, “A Method for Comparing Network Data and Modeling Data using Generalized Additive Modeling”, KoreaCrypt07, 2007
  • J. Cho, H. Lee and J. Moon, “Network Data Set Composition and Evaluation Using a Multivariate Quantification Model”, KoreaCrypt07, 2007
  • Y. Kim, J. Moon, “ARP 증가량으로 본 웜 탐지”, KoreaCrypt04, 2004
  • Y. Kim, S. Lee, J. Seo and J. Moon, “다양한 네트워크 환경에서 보안 취약점 해결을 위한 패치 관리 시스템(PMS)의 설계 및 구현”, KoreaCrypt04, 2004
  • J. Kim, J. Moon, “확률적 패킷 검사를 통한 서비스거부 공격의 자동화 방어 모델에 대한 연구,” KoreaCrypt04, 2004
  • D. Yoon and J. Moon, “비대칭 네트워크 환경화에서 복수 방화벽의 고가용성 및 부하 분산 기능에 관한 연구”, KoreaCrypt04, 2004
  • S. Lee, Y. Kim and J. Moon, “Windows 보안 패치 검색 방식에서의 취약점 분석 및 대응방안에 관한 연구”, KoreaCrypt04, 2004
  • D. Moon, J. Moon, “IPv6 ND(Neighbor Discovery)의 보안 취약성에 관한 연구”, KoreaCrypt04, 2004
  • J. Park, U. Choi, T. Shon and J. Moon, “A Study on Network Forensics Information in Automated Computer Emergency Response System”, KoreaCrypt04, 2004
  • D. Kim, J. Moon, “P2P 방식에서 저작물 보호 시스템에 관한 연구”, Koreacript03, 2003
  • S. Kim, J. Moon and J. Lim, “HFC망에서의 VPN 성능에 관한 연구”, Koreacript03, 2003
  • J. Seo, T. Shon and J. Moon, “N-gram 색인화와 SVM을 사용한 스팸메일 탐지 방안에 관한 연구” Koreacript03, 2003
  • T. Shon, J. Seo, O. Ku, D. Min, S. Lee, D. Kim, Y. Kim and J. Moon, “대규모 네트워크 환경에서의 패치 분배 시스템 개발”, Koreacript03, 2003
  • S .Kim, H. Kim, S. Kim and J. Moon, “그래픽 사용자 인터페이스(GUI), 기반의 리눅스용 포렌식 툴 구현”, Koreacript03, 2003
  • J. Park, T. Sohn and J. Moon, “A Study on Real – Time Encryption Backup Model of Decentralized log data for acquiring completeness in court”, Koreacript03, 2003

 


A dissertation published by an academic conference. (National journal of general studies)

  • M. Jeong, S. Jeong and J. Moon, “대용량 네트워크에서의 비정상 행위의 연결 표현 및 분류 표현 방법”, Agency for Defense Development, 2010
  • S. Jeong, H. Seo, K. Kim and J. Moon. “Research on HTTP Flooding DDoS Attack Detection through HTTP Data Monitoring.” Journal of Korea Information Technology Convergence Society, 2010
  • J. Lee, H. Kim and J. Moon, “인증된 사용자의 암호화된 URL 접근 기법 연구”, Korea Institute Of Information Security And Cryptology, 2008
  • K. Seo, H. Kim and J. Moon, “Phishing 기법 및 Anti-Phishing 기법에 관한 연구”, Korea Institute Of Information Security And Cryptology, 2008
  • T. Kim, I. Lee and J. Moon, “웹 로그의 시각화를 이용한 이상탐지 기법 제안”, Korea Institute Of Information Security And Cryptology, 2008
  • S. Bae, O. Kwon, J. Moon and J. Lim. “Windows Malware detection using a Native API Frequency based Approach.” The Korean Society Of Broad Engineers, 2008
  • I. Lee, S. Lee, J. Moon and J. Lim. “A Study on Efficient Component In Patch Management System.” The Korean Society Of Broad Engineers, 2008
  • O. Kwon, S. Bae, J. Cho and J. Moon. “Proposal of Network Attack/Defence Simulation Framework.” The Korean Society Of Broad Engineers, 2008
  • S. Lee, I. Lee and J. Moon. “An Efficient Patch File Distribution Method for PMS Using P2P.” The Korean Society Of Broad Engineers, 2008
  • S. Lee, I. Lee, J. Cho and J. Moon. “패치분배 시스템을 위한 효과적인 계층적 소프트웨어 아키텍처 표현 방안”, The Korean Institute of Information Scientists and Engineers, 2007
  • S. Bae, M. Jung, J. Cho and J. Moon. “Effective Authentication Method for Hierarchical Patch Distribution.” The Korean Institute of Information Scientists and Engineers, 2007
  • O. Kwon, J. Cho and J. Moon. “Proposal of worm Self-Defense technologies avoiding Behavior-based detection.” The Korean Institute of Information Scientists and Engineers, 2007
  • I. Lee, S. Lee, J. Cho and J. Moon. “Effective Patch Database Composing for Multi-OS and S/W.” The Korean Institute of Information Scientists and Engineers, 2007
  • M. Jeong, J. Cho and J. Moon. “감사데이터에 기반한 웹 공격 탐지방안 연구”, Korea Institute Of Information Security And Cryptology, 2007
  • J. Cho and J. Moon. “침입 탐지 시스템을 위한 효과적인 데이터 셋 구성 방법”, Korea Institute Of Information Security And Cryptology, 2007
  • J. Mo, J. Lim and J. Moon. “A Study of Realtime Detection of Web Application Attack using Bayesian” The Korean Society Of Broad Engineers, pp.75-78, Feb. 2007
  • H. Lee, S. Lee, J. Cho and J. Moon. “Comparing Network Data of Virtual Malware and Real Malware using GAM” The Korean Society Of Broad Engineers, pp.158-161, Feb. 2007
  • K. Cho, H. Lee, J. Lim and J. Moon. “Self-propagation Worm definition of stereo type using NFR” The Korean Society Of Broad Engineers, 2007
  • S. Lee, B. Koo, J. Cho, K. Cho and J. Moon. “Research on Intrusion Detection Visualization using Web Log Data set.” The Korean Society Of Broad Engineers, 2007
  • J. Mo, M. Lee, K. Cho and J. Moon. “인터넷 웜 분석환경에 관한 연구”, Korea Institute Of Information Security And Cryptology, 2006
  • J. Moon, K. Cho, J. Cho, H. Lee, M. Jeong and S. Chae. “MIT의 IDS 성능 평가 데이터와 KDD CUP 99 의 IDS 성능 평가 실험 데이터의 비교 분석”, WISC 06, 2006
  • B. Koo, K. Cho, S. Cho and J. Moon. “HTTP Header를 이용한 실시간 웹 공격 탐지시각화 도구의 설계 및 구현”, Korea Institute Of Information Security And Cryptology, 2006
  • J. Cho and J. Moon. “대응분석 방법을 이용한 네트워크 데이터 비교 분석 방법”, 사이버정보전학회, 2006
  • M. Lee, J. Cho, B. Koo and J. Moon. “A study on the Simulation environment for analyzing internet worm propagation.” Korea Computer Congress, 2005
  • B. Koo, M. Lee, J. Cho and J. Moon. “Implementation of a Mobile Electronic Approval System using XML.” The Korean Institute of Information Scientists and Engineers, 2005
  • J. Cho, M. Lee and J. Moon, “웜특성 분석을 위한 가상망 구성 방법에 대한 연구”, Korea Institute Of Information Security And Cryptology, 2005
  • J. Cho, B. Koo, M. Lee and J. Moon. “A Study on the Dataset Construction for Network Simulation base on Packet Distribution”, The Korean Institute of Information Scientists and Engineers, 2005
  • M. Lee, J. Cho, B. Koo, T. Shon and J. Moon, “NS-2를 이용한 웜 시뮬레이션 환경에 관한 연구”,Korea Institute Of Information Security And Cryptology, 2005
  • B. Koo, J. Lee, J. Moon, D. Kim, J. Seo and E. Park. “Network Worm Propagation Simulator Design and Implementation.” The Korean Institute of Information Scientists and Engineers, 2005
  • S. Lee, G. Cho, M. Lee, J. Moon, D. Kim, J. Seo and E. Park. “Internet worm classification depend on spreading specificity.” The Korean Institute of Information Scientists and Engineers, 2005
  • S. Lee, Y. Kim, J. Moon and J. Seo. “A Study on the DB Construction and the Searching for distributing the Multi-Platform Based Automatic Distribution Method of Security Patches.” The Korean Institute of Information Scientists and Engineers, 2004
  • S. Lee, Y. Kim, J. Moon, J. Seo, D. Choi and E. Park. “Design the Multi-Platform Based Automatic Distribution Method of Security Patches with RMI and SSL.” The Korean Institute of Information Scientists and Engineers, 2004
  • Y. Kim, S. Lee, T. Sohn, J. Moon, J. Seo, J. Yun and E. Park. “Design the Classed Patch Distribution System Framework Considering the Extension.” The Korean Institute of Information Scientists and Engineers, 2004
  • D. Kim, D. Min, S. Lee, Y. Kim, T. Shon, J. Seo and J. Moon, “보안패치 자동 분배 시스템에서 LINUX/UNIX 계열에서의 패치 분배 및 설치시 의존성 해결 방안”, The Korean Institute of Information Scientists and Engineers, 2004
  • D. Kim and J. Moon, “확장 가능한 다계층 패치분배 기술”, The Korean Institute of Information Scientists and Engineers, 2004
  • D. Kim, D. Min, S. Lee, Y. Kim, T. Shon, J. Moon and J. Seo, “패치분배 시스템에서 Unix계열 패치 의존성 해결 연구방안”, WISC2004, 2004년
  • Y. Kim, S. Lee, T. Shon, J. Moon, J. Seo, D. Choi and E. Park, “계층적 보안 패치 분배 시스템의 안정성 확보를 위한 프레임 워크 설계 및 구현”, WISC2004, 2004
  • S. Lee, Y. Kim, T. Sohn, J. Moon, J. Seo and E. Park. “Design and Implement the Security Patch Distribution System for Resolving the Relation at Windows.” The Korean Institute of Information Scientists and Engineers, 2004
  • Y. Kim, S. Lee, T. Sohn, J. Moon, J. Seo, E. Lee and E. Park. “Design the Security Patch Central Management System Using XML.” The Korean Institute of Information Scientists and Engineers, 2004
  • S. Lee, Y. Kim, T. Sohn, J. Moon, J. Seo, E. Lee and D.Lee. “Design the Normalized Secure Patch Distribution & Management System
    “, The Korean Institute of Information Scientists and Engineers, 2004
  • D. Min, T. Shon and J. Moon. “A Study on the Detection in the IP packet based on Self-Organizing Feature Maps.” The Korean Institute of Information Scientists and Engineers, 2004
  • D. Min, T. Shan, W. Koo and J. Moon. “A study on the exchange method of audit data among ESM systems.” The Korean Institute of Information Scientists and Engineers, 2004
  • J. Kim, J. Seo and J. Moon. “An Approach for DoS Detection with Support Vector Machine.” The Korean Institute of Information Scientists and Engineers, 2004
  • D. Min, T. Shon, J. Seo, W. Koo, J. Jang and J. Moon. “Automatic Composition Database For Security Patch Auto-Distribution.” The Korean Institute of Information Scientists and Engineers, 2004
  • J. Park, J. Moon and U. Choi. “A Study on Network Forensics Information in Automated Computer Emergency Response System.” The Korean Institute of Information Scientists and Engineers, 2004
  • J. Seo, J. Yun, E. Im, W. Lee and B. Chang, T. Sohn and J. Moon. “A Method for Secure and Automatic Patch Distribution and Installation.” JCCI, 2003
  • J. Seo, T. Shon, J. Moon, J. Seo and C. Lee, “신뢰할 수 있는 패치서버 및 통신 채널에 대한 연구”, WISC2003, 2003
  • J. Moon, T. Shon, J. Seo and D. Min, “Support Vector Machine을 사용한 ICMP 프로토콜의 은닉 채널 탐지 방안”, WISC2003, 2003
  • T. Sohn, J. Seo, J. Seo and J. Moon. “A Study on the Analysis of Covert Channel in Network Traffic.” The Korean Institute of Information Scientists and Engineers, 2003
  • J. Seo, T. Sohn, J. Seo and J. Moon. “An Approach for Detecting Spam Mail using Support Vector Machine.” The Korean Institute of Information Scientists and Engineers, 2003
  • J. Park, J. Moon and T. Sohn. “A Study on Real – Time Encryption Backup Model of Decentralized log data for acquiring completeness in court.” The Korean Institute of Information Scientists and Engineers, 2003
  • S. Kim, J. Moon and J. Lim, “HFC망에서의 VPN 성능에 관한 연구”, CISC, 2003, 2003
  • J. Seo, D. Choi, J. Yun, E. Park, J. Seo, T. Sohn and J. Moon. “Patch Management System with Multiplatform Support.” The Korean Institute of Information Scientists and Engineers, 2003
  • J. Park, J. Moon and T. Sohn. “A Study on Real – Time Encryption Backup Model of Decentralized log data for acquiring completeness in court” The Korean Institute of Information Scientists and Engineers, pp.847-849, Oct. 2003
  • J. Seo, D. Min and J. Moon. “A Study on the Multi – Modal Biometrics System” The Korean Institute of Information Scientists and Engineers, pp.301-303, Apr. 2003