Digital Library
Search: "[ author: Hoon Choi ]" (14)
A String Analysis based System for Classifying Android Apps Accessing Harmful Sites
Jong Hee Youn , Kwang Hoon Choi , Kwang Man Ko , Hee Wan Park The KIPS Transactions:PartA,
Vol. 19, No. 4, pp. 187-194,
Aug.
2012
10.3745/KIPSTA.2012.19.4.187
A Survey of Phishing Campaign Trends and the Classification of Detection Techniques
Ji-Hoon Park, Sang-Hoon Choi, Ki-Woong Park The Transactions of the Korea Information Processing Society,
Vol. 14, No. 3, pp. 149-160,
Mar.
2025
https://doi.org/10.3745/TKIPS.2025.14.3.149
Keywords: Phishing Campaign, Phishing Detection, Machine Learning, LLM, feature extraction
Keywords: Phishing Campaign, Phishing Detection, Machine Learning, LLM, feature extraction
Dynamic storage management for mobile platform based on the characteristics of mobile applications
Yong Duck You , Sang Hyun Park , Hoon Choi The KIPS Transactions:PartA,
Vol. 13, No. 7, pp. 561-572,
Dec.
2006
10.3745/KIPSTA.2006.13.7.561
A Study on the ITSM and CSC working together for effective business process
Byung Hoon Choi , Sang Geun Kim The KIPS Transactions:PartD,
Vol. 13, No. 3, pp. 405-414,
Jun.
2006
10.3745/KIPSTD.2006.13.3.405
A Multi-Compartment Secret Sharing Method
Cheolhoon Choi, Minsoo Ryu The Transactions of the Korea Information Processing Society,
Vol. 13, No. 2, pp. 34-40,
Feb.
2024
https://doi.org/10.3745/TKIPS.2024.13.2.34
Keywords: Hierarchical Secret Sharing, Lagrange interpolation, polynomial
Keywords: Hierarchical Secret Sharing, Lagrange interpolation, polynomial
PSIP Converter based on PMCP for Terrestrial/Cable Data Broadcasting Retransmission Service
Ji Hoon Choi , Yong Ho Kim , Jin Soo Choi , Jin Woo Hong The KIPS Transactions:PartB ,
Vol. 12, No. 6, pp. 647-654,
Oct.
2005
10.3745/KIPSTB.2005.12.6.647
A Study on How to Build a Zero Trust Security Model
Jin Yong Lee, Byoung Hoon Choi, Namhyun Koh, Samhyun Chun KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 189-196,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.189
Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust
Keywords: 4th Industrial Revolution, Remote Work Environment, Security Strategies, Zero Trust
Design and Implementation of Development Environment for WIPI Applications
Yong Duck You , Choong Bum Park , Hoon Choi , Woo Sik Kim The KIPS Transactions:PartC,
Vol. 12, No. 5, pp. 749-756,
Oct.
2005
10.3745/KIPSTC.2005.12.5.749
Implementation of Worst Case Execution Time Analysis Tool For Embedded Software based on XScale Processor
Hyeon Hui Park , Myeong Su Choi , Seung Min Yang , Yong Hoon Choi , Hyung Taek Lim The KIPS Transactions:PartA,
Vol. 12, No. 5, pp. 365-374,
Oct.
2005
10.3745/KIPSTA.2005.12.5.365
A Classification Model Supporting Dynamic Features of Product Databases
Dong Kyu Kim , Sang Goo Lee , Dong Hoon Choi The KIPS Transactions:PartD,
Vol. 12, No. 1, pp. 165-178,
Feb.
2005
10.3745/KIPSTD.2005.12.1.165