Cho, Junsung
130  results:
Search for persons X
?
1

On the Security and Usability Implications of Providing Mul..:

Cho, Geumhwan ; Huh, Jun Ho ; Kim, Soolin...
ACM Transactions on Privacy and Security (TOPS).  23 (2020)  4 - p. 1-32 , 2020
 
?
4

ACIDroid : a practical app cache integrity protection sy..:

, In: Proceedings of the 35th Annual ACM Symposium on Applied Computing,
Choi, Jusop ; Kim, Soolin ; Cho, Junsung... - p. 376-383 , 2020
 
?
5

On the Security and Usability Implications of Providing Mul..:

Cho, Geumhwan ; Huh, Jun Ho ; Kim, Soolin...
ACM Transactions on Privacy and Security.  23 (2020)  4 - p. 1-32 , 2020
 
?
 
?
7

Design and Analysis of Push Notification-Based Malware on A..:

Hyun, Sangwon ; Cho, Junsung ; Cho, Geumhwan.
Security and Communication Networks.  2018 (2018)  - p. 1-12 , 2018
 
?
8

The Personal Identification Chord : A Four ButtonAuthent..:

, In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security,
Oakley, Ian ; Huh, Jun Ho ; Cho, Junsung... - p. 75-87 , 2018
 
?
9

Combating online fraud attacks in mobile-based advertising:

Cho, Geumhwan ; Cho, Junsung ; Song, Youngbae..
EURASIP Journal on Information Security.  2016 (2016)  1 - p. , 2016
 
?
10

Modified 'Y-Configured Stents with Waffle Cone Technique' f..:

Cho, Jun-Sung ; Kim, Young-Joon
Journal of Korean Neurosurgical Society.  50 (2011)  6 - p. 517 , 2011
 
?
11

Data-Driven Selection of Security Application Frameworks Du..:

Cervantes, Humberto ; Kazman, Rick ; Ryoo, Jungwoo...
Proceedings of the 52nd Hawaii International Conference on System Sciences.  , 2019
 
?
 
?
14

SENTINEL: A Secure and Efficient Authentication Framework f..:

Geumhwan Cho ; Junsung Cho ; Sangwon Hyun.
Electrical, Electronics and Communications Engineering.  , 2020
 
1-15