​
Login / Signup
Soonhong Kwon
Publication Activity (10 Years)
Years Active: 2019-2024
Publications (10 Years): 9
Top Topics
Anti Aliasing
Encryption Algorithms
Malware Detection
Digital Content
Top Venues
ICEA
MetaCom
EuCNC/6G Summit
Concurr. Comput. Pract. Exp.
</>
Publications
</>
Soonhong Kwon
,
Jaehyoung Park
,
Taeyang Lee
,
Sungheun Oh
,
Jong-Hyouk Lee
Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm.
Softw. Pract. Exp.
54 (7) (2024)
Soonhong Kwon
,
Wooyoung Son
,
Jong-Hyouk Lee
UCI and EICN Integrated Model for Copyright Distribution Management.
MetaCom
(2023)
Soonhong Kwon
,
Wooyoung Son
,
Jong-Hyouk Lee
Holographic Multi-Channel QR Code based Copyright Distribution Management System.
MetaCom
(2023)
Seungchan Woo
,
Jaehyoung Park
,
Soonhong Kwon
,
Kyungmin Park
,
Jonghyun Kim
,
Jong-Hyouk Lee
Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network.
EuCNC/6G Summit
(2023)
Soonhong Kwon
,
Sang-Jin Son
,
Yangseo Choi
,
Jong-Hyouk Lee
Protocol fuzzing to find security vulnerabilities of RabbitMQ.
Concurr. Comput. Pract. Exp.
33 (23) (2021)
Soonhong Kwon
,
HeeDong Yang
,
Manhee Lee
,
Jong-Hyouk Lee
Machine Learning based Malware Detection with the 2019 KISA Data Challenge Dataset.
ICEA
(2020)
Soonhong Kwon
,
Yangseo Choi
,
Jong-Hyouk Lee
Automatic Seed Generation based Hybrid Fuzzing for Code Coverage Efficiency.
ICEA
(2020)
Soonhong Kwon
,
Jong-Hyouk Lee
DIVDS: Docker Image Vulnerability Diagnostic System.
IEEE Access
8 (2020)
Myoungsu Kim
,
Soonhong Kwon
,
Donald Elmazi
,
Jong-Hyouk Lee
,
Leonard Barolli
,
Kangbin Yim
A Technical Survey on Methods for Detecting Rogue Access Points.
IMIS
(2019)