Younghee Park
Younghee Park
Computer Engineering, San Jose State University
Verified email at - Homepage
Cited by
Cited by
Fast malware classification by automated behavioral graph matching
Y Park, D Reeves, V Mulukutla, B Sundaravel
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
Deriving common malware behavior through graph clustering
Y Park, D Reeves
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
ECG Biometric Authentication: A Comparative Analysis
M Ingale, R Cordeiro, S Thentu, Y Park, N Karimian
ACCESS 8, 117853 - 117866, 2020
CNN-based android malware detection
M Ganesh, P Pednekar, P Prabhuswamy, DS Nair, Y Park, H Jeon
2017 international conference on software security and assurance (ICSSA), 60-65, 2017
VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls
Juan Dengy, Hongxin Huy, Hongda Liy, Zhizhong Pany, Kuang-Ching Wangy, Gail ...
IEEE Conference on Network Function Virtualization & Software Defined …, 2015
Software decoys for insider threat
Y Park, SJ Stolfo
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
Development of Cloud-based UAV Monitoring and Management System
M Itkin, M Kim, Y Park
Journal of Sensors 16, 2016
P4guard: Designing p4 based firewall
R Datta, S Choi, A Chowdhary, Y Park
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-6, 2018
Machine-learning based Threat-aware System in Software Defined Networks
C Song, Y Park, K Golani, Y Kim, K Bhatt, K Goswami
26th International Conference on Computer Communications and Networks (ICCCN …, 2017
Impact of Reviewer Social Interaction on Online Consumer Review Fraud Detection
K Goswami, Y Park, Chungsik Song
Journal of Big Data, 2017
Fast IP hopping randomization to secure hop-by-hop access in SDN
SY Chang, Y Park, BBA Babu
IEEE Transactions on Network and Service Management 16 (1), 308-320, 2018
Eigenvalue analysis for metamorphic detection
S Deshpande, Y Park, M Stamp
Journal of computer virology and hacking techniques 10, 53-65, 2014
Uncle-block attack: Blockchain mining threat beyond block withholding for rational and uncooperative miners
SY Chang, Y Park, S Wuthier, CW Chen
Applied Cryptography and Network Security: 17th International Conference …, 2019
Chair, S
AWK Chan, J Voas, X Bai, P Brune, H Cai, D Cao, Y Cao, JY Chung, ...
Y., Sit, JW-H., Wong, EM-L., Lee, DT-F., & Fung, OW-M, 31-40, 2016
A Sticky Policy Framework for Big Data Security
YP Shuyu Li, Tao Zhang, Jerry Gao
IEEE International Conference on Big Data Computing Service and Applications, 2015
Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks
SYC Hitesh Padekar, Younghee Park, Hongxin Hu
ACM Symposium on Access Control Models and Technologies (SACMAT), 2016
Hyperglycemia identification using ECG in deep learning era
R Cordeiro, N Karimian, Y Park
Sensors 21 (18), 6263, 2021
Interval-based flow watermarking for tracing interactive traffic
YJ Pyun, Y Park, DS Reeves, X Wang, P Ning
Computer Networks 56 (5), 1646-1665, 2012
Antibot: Clustering common semantic patterns for bot detection
Y Park, Q Zhang, D Reeves, V Mulukutla
2010 IEEE 34th Annual Computer Software and Applications Conference, 262-272, 2010
The system can't perform the operation now. Try again later.
Articles 1–20