Volgen
EJ Jung
EJ Jung
Geverifieerd e-mailadres voor cs.usfca.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Obfuscated malicious javascript detection using classification techniques
P Likarish, E Jung, I Jo
2009 4th International Conference on Malicious and Unwanted Software …, 2009
2682009
Data mining-based ethereum fraud detection
E Jung, M Le Tilly, A Gehani, Y Ge
2019 IEEE international conference on blockchain (Blockchain), 266-273, 2019
852019
B-apt: Bayesian anti-phishing toolbar
P Likarish, E Jung, D Dunbar, TE Hansen, JP Hourcade
2008 IEEE International Conference on Communications, 1745-1749, 2008
652008
Controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster
E Jung, A Shaheen
US Patent App. 10/926,599, 2006
502006
An efficient LKH tree balancing algorithm for group key management
DW Kwak, SJ Lee, JW Kim, E Jung
IEEE Communications Letters 10 (3), 222-224, 2006
442006
Certificate dispersal in ad-hoc networks
MG Gouda, E Jung
24th International Conference on Distributed Computing Systems, 2004 …, 2004
332004
A targeted web crawling for building malicious javascript collection
P Likarish, E Jung
Proceedings of the ACM first international workshop on Data-intensive …, 2009
242009
Controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster
E Jung, A Shaheen
US Patent App. 10/926,600, 2006
222006
Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster
E Jung, AA Shaheen
US Patent 7,412,063, 2008
172008
Vulnerability analysis of certificate graphs
E Jung, MG Gouda
International Journal of Security and Networks 1 (1-2), 13-23, 2006
152006
You're not who you claim to be: Website identity check for phishing detection
I Jo, E Jung, HY Yeom
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
142010
Towards run-time verification in access control
F Turkmen, E Jung, B Crispo
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
132011
Optimal dispersal of certificate chains
E Jung, ES Elmallah, MG Gouda
International Symposium on Distributed Computing, 435-449, 2004
132004
BayeShield: conversational anti-phishing user interface.
P Likarish, DE Dunbar, JP Hourcade, E Jung
SOUPS 9, 1, 2009
102009
Optimal dispersal of certificate chains
E Jung, ES Elmallah, MG Gouda
IEEE Transactions on Parallel and Distributed Systems 18 (4), 474-484, 2007
102007
Efficiently validating aggregated IoT data integrity
N Kaâniche, E Jung, A Gehani
2018 IEEE Fourth International Conference on Big Data Computing Service and …, 2018
92018
Interactive website filter for safe web browsing
I Jo, E Jung, HY Yeom
Journal of information science and engineering 29 (1), 115-131, 2013
82013
Privacy policy enforcement for health information data access
F Currim, E Jung, X Xiao, I Jo
Proceedings of the 1st ACM international workshop on Medical-grade wireless …, 2009
82009
Controlling Delivery Of Broadcast Encryption Content For A Network Cluster From A Content Server Outside The Cluster
E Jung, AA Shaheen
US Patent App. 12/164,942, 2008
82008
Stabilizing certificate dispersal
MG Gouda, E Jung
Self-Stabilizing Systems: 7th International Symposium, SSS 2005, Barcelona …, 2005
82005
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20