default search action
Daesung Moon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Jaehak Yu, Yangseo Choi, Ki-Jong Koo, Daesung Moon:
A novel approach for application classification with encrypted traffic using BERT and packet headers. Comput. Networks 254: 110747 (2024) - 2022
- [j31]Nam-Su Jho, Daesung Moon, Taek-Young Youn:
Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability. IEICE Trans. Inf. Syst. 105-D(11): 1872-1879 (2022) - 2020
- [c28]Minjae Kim, Jong Geun Park, Daesung Moon, Jongsoo Jang, Youngsoo Kim, Jonghoon Lee:
Long-Term Evolution Vulnerability Focusing on System Information Block Messages. ICTC 2020: 837-842
2010 – 2019
- 2019
- [j30]Samuel Woo, Daesung Moon, Taek-Young Youn, Yousik Lee, Yongeun Kim:
CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN. IEEE Access 7: 15521-15536 (2019) - [j29]Jooyoung Lee, Daesung Moon, Ikkyun Kim, Youngseok Lee:
A semantic approach to improving machine readability of a large-scale attack graph. J. Supercomput. 75(6): 3028-3045 (2019) - [j28]Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon, Daesung Moon, Jong Hyuk Park:
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions. J. Supercomput. 75(8): 4543-4574 (2019) - 2018
- [j27]Taekeun Park, Koohong Kang, Daesung Moon:
A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks. IEICE Trans. Inf. Syst. 101-D(11): 2706-2709 (2018) - [j26]Jin Ho Park, Shailendra Rathore, Daesung Moon, Jong Hyuk Park:
MTD-Spamguard: a moving target defense-based spammer detection system in social network. Soft Comput. 22(20): 6683-6691 (2018) - [j25]Kyungmin Park, Samuel Woo, Daesung Moon, Hoon Choi:
Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat. Symmetry 10(1): 14 (2018) - 2017
- [j24]Pradip Kumar Sharma, Seo Yeon Moon, Daesung Moon, Jong Hyuk Park:
DFA-AD: a distributed framework architecture for the detection of advanced persistent threats. Clust. Comput. 20(1): 597-609 (2017) - [j23]Kyeong-Ri Ko, Seung-Hoon Chae, Daesung Moon, Chang-Ho Seo, Sung Bum Pan:
Four-joint motion data based posture classification for immersive postural correction system. Multim. Tools Appl. 76(9): 11235-11249 (2017) - [j22]Daesung Moon, Hyungjin Im, Ikkyun Kim, Jong Hyuk Park:
DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J. Supercomput. 73(7): 2881-2895 (2017) - 2016
- [j21]Jong-Ho Kim, Jun-Jae Park, Sang-Ho Ahn, Deok-Gyu Lee, Daesung Moon, Sang-Kyoon Kim:
Small target detection using morphology and modified Gaussian distance function. Secur. Commun. Networks 9(6): 555-560 (2016) - [j20]Daesung Moon, Jae Dong Lee, Young-Sik Jeong, Jong Hyuk Park:
RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks. J. Supercomput. 72(5): 1740-1756 (2016) - [j19]Daesung Moon, Sung Bum Pan, Ikkyun Kim:
Host-based intrusion detection system for secure human-centric computing. J. Supercomput. 72(7): 2520-2536 (2016) - [j18]Daesung Moon, Ikkyun Kim, Jae Woong Joo, Hyungjin Im, Jong Hyuk Park, Young-Sik Jeong:
Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing. Wirel. Pers. Commun. 91(4): 1697-1710 (2016) - 2015
- [j17]Hansung Lee, Daesung Moon, Ikkyun Kim, Hoseok Jung, Daihee Park:
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space. KSII Trans. Internet Inf. Syst. 9(3): 1173-1192 (2015) - 2014
- [j16]Seung-Hoon Chae, Daesung Moon, Kyeong-Ri Ko, Juhyun Shin, Sung Bum Pan:
Security Enhancement for Smartphone Using Biometrics in Cyber-Physical Systems. Int. J. Distributed Sens. Networks 10 (2014) - [j15]Seung-Hoon Chae, Daesung Moon, Deok-Gyu Lee, Sung Bum Pan:
Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT. J. Appl. Math. 2014: 815039:1-815039:8 (2014) - [j14]Daesung Moon, Yongwha Chung, Chang-Ho Seo, Sung-Young Kim, Jeong-Nyeo Kim:
A practical implementation of fuzzy fingerprint vault for smart cards. J. Intell. Manuf. 25(2): 293-302 (2014) - [j13]Daesung Moon, Jang-Hee Yoo, Mun-Kyu Lee:
Improved cancelable fingerprint templates using minutiae-based functional transform. Secur. Commun. Networks 7(10): 1543-1551 (2014) - [j12]Daesung Moon, Hyungjin Im, Jae Dong Lee, Jong Hyuk Park:
MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats. Symmetry 6(4): 997-1010 (2014) - 2013
- [j11]Hae-Min Moon, Seung-Hoon Chae, Daesung Moon, Yongwha Chung, Sung Bum Pan:
Intelligent video surveillance system using two-factor human information. Telecommun. Syst. 52(4): 2249-2257 (2013) - [c27]Seung-Hoon Chae, Daesung Moon, Deok-Gyu Lee, Sung Bum Pan:
Improvement of Lung Segmentation Using Volume Data and Linear Equation. ITCS 2013: 213-221 - 2012
- [c26]Kiyoung Moon, Daesung Moon, Jang-Hee Yoo, Hyun-Suk Cho:
Biometrics Information Protection Using Fuzzy Vault Scheme. SITIS 2012: 124-128 - 2011
- [j10]Sungju Lee, Yongwha Chung, Daesung Moon, Sung Bum Pan, Chang-Ho Seo:
A Practical Implementation of Fuzzy Fingerprint Vault. KSII Trans. Internet Inf. Syst. 5(10): 1783-1798 (2011) - 2010
- [j9]Daesung Moon, Byungkwan Park, Yongwha Chung, Jin-Won Park:
Recovery of flash memories for reliable mobile storages. Mob. Inf. Syst. 6(2): 177-191 (2010)
2000 – 2009
- 2009
- [j8]Daesung Moon, Yongwha Chung, Sung Bum Pan, Jin-Won Park:
Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System. EURASIP J. Adv. Signal Process. 2009 (2009) - [j7]Daesung Moon, Sungju Lee, Yongwha Chung:
Configurable fuzzy fingerprint vault for Match-on-Card system. IEICE Electron. Express 6(14): 993-999 (2009) - [j6]Sungju Lee, Woo-Yong Choi, Daesung Moon, Yongwha Chung, Juman Kim:
Secure fuzzy fingerprint vault against correlation attack. IEICE Electron. Express 6(18): 1368-1373 (2009) - [j5]Sungju Lee, Daesung Moon, Yongwha Chung:
Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault. J. Inf. Sci. Eng. 25(4): 1177-1190 (2009) - [c25]Sung Jin Lim, Seung-Hoon Chae, Daesung Moon, Yongwha Chung, Namil Lee, Sung Bum Pan:
VLSI Architecture for the Fuzzy Fingerprint Vault with Automatic Alignment Module. FGIT-FGCN 2009: 470-476 - 2008
- [j4]Sung Bum Pan, Daesung Moon, Kichul Kim, Yongwha Chung:
A fingerprint matching hardware for smart cards. IEICE Electron. Express 5(4): 136-144 (2008) - [j3]Woo-Yong Choi, Sungju Lee, Daesung Moon, Yongwha Chung, Kiyoung Moon:
A fast algorithm for polynomial reconstruction of fuzzy fingerprint vault. IEICE Electron. Express 5(18): 725-731 (2008) - [c24]Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung Bum Pan, Daesung Moon:
Performance Analysis of Hybrid Fingerprint Matching Methods. FGCN (2) 2008: 66-69 - 2007
- [j2]Hyoun-Joo Go, Daesung Moon, Kiyoung Moon, Myung-Geun Chun:
Steganography based Multi-modal Biometrics System. Int. J. Fuzzy Log. Intell. Syst. 7(1): 71-76 (2007) - [c23]Byoungchol Chang, Dall-ho Ham, Daesung Moon, Yong Suk Choi, Jaehyuk Cha:
Educational Information Search Service Using Ontology. ICALT 2007: 414-415 - [c22]Sungju Lee, Daesung Moon, Seunghwan Jung, Yongwha Chung:
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table. ICANNGA (2) 2007: 432-439 - [c21]Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi:
Fingerprint Template Protection Using Fuzzy Vault. ICCSA (3) 2007: 1141-1151 - [c20]Byoungchol Chang, Dall-ho Ham, Daesung Moon, Yong Suk Choi, Jaehyuk Cha:
Using Ontologies to Search Learning Resources. ICCSA (1) 2007: 1146-1159 - [c19]Hakjae Kim, Sungju Lee, Daesung Moon, Yongwha Chung:
Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques. ICIC (3) 2007: 858-867 - [c18]Sungju Lee, Daesung Moon, Yongwha Chung:
Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault. KES (2) 2007: 816-823 - 2006
- [c17]Sung Bum Pan, Daesung Moon, Kichul Kim, Yongwha Chung:
A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication. CIS 2006: 605-615 - [c16]Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park:
Capacity Planning for Scalable Fingerprint Authentication. KES (1) 2006: 906-915 - [c15]Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon:
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. WISA 2006: 100-109 - [c14]Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park:
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification. WISA 2006: 110-120 - 2005
- [c13]Daesung Moon, Taehae Kim, Seunghwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim:
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems. CIS (2) 2005: 635-642 - [c12]Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn:
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. CISC 2005: 358-369 - [c11]Taehae Kim, Yongwha Chung, Seunghwan Jung, Daesung Moon:
Secure Remote Fingerprint Verification Using Dual Watermarks. DRMTICS 2005: 217-227 - [c10]Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan:
Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. ICIAR 2005: 1106-1117 - [c9]Yongwha Chung, Daesung Moon, Kiyoung Moon, Sung Bum Pan:
Hiding Biometric Data for Secure Transmission. KES (3) 2005: 1049-1057 - [c8]Yongwha Chung, Daesung Moon, Taehae Kim, Sung Bum Pan:
A Secure Fingerprint Authentication System on an Untrusted Computing Environment. TrustBus 2005: 299-310 - 2004
- [c7]Yongwha Chung, Byung-Hee Hwang, Woo-Yong Choi, Daesung Moon, Sung Bum Pan, Sang-Hwa Chung:
A Hardware Implementation of Speaker Verification Using Support Vector Machine. Security and Management 2004: 353-358 - [c6]Yongwha Chung, Daesung Moon, Sung Bum Pan, Min Kim, Kichul Kim:
A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems. ICIAR (2) 2004: 770-777 - [c5]Yongwha Chung, Daesung Moon, Taehae Kim, Jin-Won Park:
Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model. PDCAT 2004: 833-838 - 2003
- [j1]Sung Bum Pan, Daesung Moon, Youn-Hee Gil, Dosung Ahn, Yongwha Chung:
An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card. IEEE Trans. Consumer Electron. 49(2): 453-459 (2003) - [c4]Daesung Moon, Youn-Hee Gil, Sung Bum Pan, Yongwha Chung:
Implementation of the USB Token System for Fingerprint Verification. SCIA 2003: 998-1005 - [c3]Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park:
Fingerprint-Based Authentication for USB Token Systems. WISA 2003: 355-364 - 2002
- [c2]Daesung Moon, Youn-Hee Gil, Sung Bum Pan, Yongwha Chung:
A Fingerprint Matching Algorithm Using Image Recognition and Fuzzy Control. IC-AI 2002: 135-138 - [c1]Youn-Hee Gil, Daesung Moon, Sung Bum Pan, Yongwha Chung:
Fingerprint Verification System Involving Smart Card. ICISC 2002: 510-524
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint