Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Security Problems of 5G Voice Communication

    In April 2019, the world’s first 5G mobile communication was commercialized in South Korea. 5G mobile communication aims to provide 20 Gbps transmission speed which is 20 times faster than 4G mobile communicat...

    Seongmin Park, Hyung** Cho, Youngkwon Park in Information Security Applications (2020)

  2. No Access

    Chapter and Conference Paper

    WheelLogger: Driver Tracing Using Smart Watch

    Location-related data is one of the most sensitive data for user privacy. Theft of location-related information on mobile device poses serious threats to users. Even though the extant confirmation of permissio...

    Joon Young Park, Jong Pil Yun, Dong Hoon Lee in Information Security Applications (2018)

  3. No Access

    Chapter and Conference Paper

    Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud

    We present a new approach to cross channel fraud detection: build graphs representing transactions from all channels and use analytics on features extracted from these graphs. Our underlying hypothesis is communi...

    Ian Molloy, Suresh Chari, Ulrich Finkler in Financial Cryptography and Data Security (2017)

  4. No Access

    Chapter and Conference Paper

    Understanding Craigslist Rental Scams

    Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first sys...

    Youngsam Park, Damon McCoy, Elaine Shi in Financial Cryptography and Data Security (2017)

  5. No Access

    Chapter

    Case Study: Sales Scams

    This chapter focuses on a common type of consumer-facing scam referred to as the sales scam, focusing on the scam’s occurrence on Craigslist, one of the most popular online market websites, with over 60 million ...

    Damon McCoy, Youngsam Park, Elaine Shi in Understanding Social Engineering Based Sca… (2016)

  6. No Access

    Chapter and Conference Paper

    Security Analysis of FHSS-type Drone Controller

    Unmanned Aerial Vehicles (UAVs), or drones, have attracted a considerable amount of attentions due to their utility to civilian as well as military applications. However, the security issues involved in UAV te...

    Hocheol Shin, Kibum Choi, Youngseok Park in Information Security Applications (2016)

  7. No Access

    Chapter

    Case Study: Rental Scams

    In this chapter, a systematic empirical study of the online rental scams on Craigslist and its ecosystem is presented. By develo** several effective detection techniques, several major rental scam campaigns ...

    Damon McCoy, Youngsam Park, Elaine Shi in Understanding Social Engineering Based Sca… (2016)

  8. No Access

    Chapter

    Identifying Scams and Trends

    This chapter focuses on the taxonomy of scam emails collected from various sources and investigates long-term trends in scam emails. We first describe a large-scale compendium of scam emails collected from v...

    Damon McCoy, Youngsam Park, Elaine Shi in Understanding Social Engineering Based Sca… (2016)

  9. Chapter and Conference Paper

    Comparing Password Ranking Algorithms on Real-World Password Datasets

    Password-based authentication is the most widely used authentication mechanism. One major weakness of password-based authentication is that users generally choose predictable and weak passwords. In this paper,...

    Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park in Computer Security – ESORICS 2016 (2016)

  10. Chapter and Conference Paper

    Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users

    Machine learning is increasingly used as a key technique in solving many security problems such as botnet detection, transactional fraud, insider threat, etc. One of the key challenges to the widespread applic...

    Youngja Park, Ian M. Molloy, Suresh N. Chari in Computer Security -- ESORICS 2015 (2015)

  11. Chapter and Conference Paper

    Detecting Insider Information Theft Using Features from File Access Logs

    Access control is a necessary, but often insufficient, mechanism for protecting sensitive resources. In some scenarios, the cost of anticipating information needs and specifying precise access control policies...

    Christopher Gates, Ninghui Li, Zenglin Xu in Computer Security - ESORICS 2014 (2014)

  12. Chapter and Conference Paper

    Estimating Asset Sensitivity by Profiling Users

    We introduce algorithms to automatically score and rank information technology (IT) assets in an enterprise, such as computer systems or data files, by their business value and criticality to the organization....

    Youngja Park, Christopher Gates, Stephen C. Gates in Computer Security – ESORICS 2013 (2013)

  13. Chapter and Conference Paper

    A Simplified Privacy Preserving Message Delivery Protocol in VDTNs

    In Vehicular Ad Hoc Networks (VANETs), because of high mobility of vehicles and frequent change of road segments, an end-to-end communication path between moving vehicles may not exist unfortunately. As a prom...

    Youngho Park, Chul Sur, Kyung-Hyune Rhee in Information and Communication Technology (2013)

  14. No Access

    Chapter and Conference Paper

    Analysis and Control of Uncertainty in Wireless Transmitting Devices

    This paper presents a mathematical approach to estimate the measurement uncertainty in wireless transmitting devices. Although there have been efforts to estimate the uncertainty in measurements of analog circ...

    Youngcheol Park in Computer Applications for Security, Control and System Engineering (2012)

  15. No Access

    Chapter and Conference Paper

    Propagation Effects of Power Supply Fluctuation in Wireless Power Amplifiers

    In this paper, the effect of power supply fluctuations on the output of wireless power amplifier has been estimated. Because of the high trans-conductance of power amplifiers, deviations in power supplies may ...

    Youngcheol Park, Hoi** Yoon in Computer Applications for Security, Contro… (2012)

  16. Chapter and Conference Paper

    Securing Location-Aware Services Based on Online/Offline Signatures in VANETs

    In this paper, we propose a novel privacy-preserving location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In particular, we introduce the notion of location-a...

    Chul Sur, Youngho Park, Takashi Nishide in Availability, Reliability and Security for… (2011)

  17. Chapter and Conference Paper

    Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption

    In this paper we introduce the notion of certificateless proxy re-encryption and also give precise definitions for secure certificateless proxy re-encryption schemes. We present a concrete scheme based on bili...

    Chul Sur, Chae Duk Jung, Youngho Park in Communications and Multimedia Security (2010)

  18. No Access

    Chapter and Conference Paper

    A Robust Conditional Privacy-Preserving Authentication Protocol in VANET

    Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for secure vehicular communications. However, ECPP dose not provide unlinkability a...

    Chae Duk Jung, Chul Sur, Youngho Park in Security and Privacy in Mobile Information… (2009)

  19. No Access

    Chapter and Conference Paper

    Design of a Secure Digital Contents Delivery System in P2P Networks

    The growth of the Internet has created an electronic marketplace for digital goods, such as mp3, software, etc., and peer-to-peer(P2P) networks for distribution and sharing of files have enjoyed enormous popul...

    Youngho Park, Jung-Hwa Shin in Digital Rights Management. Technologies, I… (2006)

  20. No Access

    Chapter and Conference Paper

    Video Fingerprinting System Using Wavelet and Error Correcting Code

    In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the tree, the legitimate users as...

    Hyunho Kang, Brian Kurkoski, Youngran Park, Hyejoo Lee in Information Security Applications (2006)

previous disabled Page of 2