Younghee Park
Younghee Park
Computer Engineering, San Jose State University
Verified email at sjsu.edu - Homepage
Title
Cited by
Cited by
Year
Fast malware classification by automated behavioral graph matching
Y Park, D Reeves, V Mulukutla, B Sundaravel
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
2272010
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1472007
Deriving common malware behavior through graph clustering
Y Park, DS Reeves, M Stamp
computers & security 39, 419-430, 2013
1182013
Deriving common malware behavior through graph clustering
Y Park, D Reeves
6th ACM Symposium on Information, Computer and Communications Security(ASIACCS), 2011
1182011
VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls
Juan Dengy, Hongxin Huy, Hongda Liy, Zhizhong Pany, Kuang-Ching Wangy, Gail ...
IEEE Conference on Network Function Virtualization & Software Defined …, 2015
502015
Software decoys for insider threat
Y Park, SJ Stolfo
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
482012
Eigenvalue analysis for metamorphic detection
S Deshpande, Y Park, M Stamp
Journal of computer virology and hacking techniques 10 (1), 53-65, 2014
442014
Development of Cloud-based UAV Monitoring and Management System
M Itkin, M Kim, Y Park
Journal of Sensors 16, 2016
342016
A sticky policy framework for big data security
S Li, T Zhang, J Gao, Y Park
2015 IEEE First International Conference on Big Data Computing Service and …, 2015
322015
A Sticky Policy Framework for Big Data Security
YP Shuyu Li, Tao Zhang, Jerry Gao
IEEE International Conference on Big Data Computing Service and Applications, 2015
32*2015
CNN-based android malware detection
M Ganesh, P Pednekar, P Prabhuswamy, DS Nair, Y Park, H Jeon
2017 International Conference on Software Security and Assurance (ICSSA), 60-65, 2017
292017
Impact of Reviewer Social Interaction on Online Consumer Review Fraud Detection
K Goswami, Y Park, Chungsik Song
Journal of Big Data, 2017
272017
Identification of bot commands by run-time execution monitoring
Y Park, DS Reeves
2009 Annual Computer Security Applications Conference, 321-330, 2009
242009
Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks
SYC Hitesh Padekar, Younghee Park, Hongxin Hu
ACM Symposium on Access Control Models and Technologies (SACMAT), 2016
23*2016
Interval-based flow watermarking for tracing interactive traffic
YJ Pyun, Y Park, DS Reeves, X Wang, P Ning
Computer Networks 56 (5), 1646-1665, 2012
232012
Antibot: Clustering common semantic patterns for bot detection
Y Park, Q Zhang, D Reeves, V Mulukutla
2010 IEEE 34th Annual Computer Software and Applications Conference, 262-272, 2010
232010
Fast IP hopping randomization to secure hop-by-hop access in SDN
SY Chang, Y Park, BBA Babu
IEEE Transactions on Network and Service Management 16 (1), 308-320, 2018
202018
Machine-learning based Threat-aware System in Software Defined Networks
C Song, Y Park, K Golani, Y Kim, K Bhatt, K Goswami
26th International Conference on Computer Communications and Networks (ICCCN …, 2017
192017
Uncle-block attack: Blockchain mining threat beyond block withholding for rational and uncooperative miners
SY Chang, Y Park, S Wuthier, CW Chen
International Conference on Applied Cryptography and Network Security, 241-258, 2019
172019
P4guard: Designing p4 based firewall
R Datta, S Choi, A Chowdhary, Y Park
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-6, 2018
162018
The system can't perform the operation now. Try again later.
Articles 1–20