Younghee Park
Younghee Park
Computer Engineering, San Jose State University
Verified email at sjsu.edu - Homepage
TitleCited byYear
Fast malware classification by automated behavioral graph matching
Y Park, D Reeves, V Mulukutla, B Sundaravel
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
1542010
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1372007
Deriving common malware behavior through graph clustering
Y Park, DS Reeves, M Stamp
Computers & Security 39, 419-430, 2013
852013
Deriving common malware behavior through graph clustering
Y Park, D Reeves
6th ACM Symposium on Information, Computer and Communications Security(ASIACCS), 2011
852011
Complete assignments of NMR data of 13 hydroxymethoxyflavones
Y Park, BH Moon, H Yang, Y Lee, E Lee, Y Lim
Magnetic Resonance in Chemistry 45 (12), 1072-1075, 2007
802007
Eigenvalue analysis for metamorphic detection
S Deshpande, Y Park, M Stamp
Journal of computer virology and hacking techniques 10 (1), 53-65, 2014
402014
VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls
Juan Dengy, Hongxin Huy, Hongda Liy, Zhizhong Pany, Kuang-Ching Wangy, Gail ...
IEEE Conference on Network Function Virtualization & Software Defined …, 2015
352015
Software decoys for insider threat
Y Park, SJ Stolfo
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
342012
A sticky policy framework for big data security
S Li, T Zhang, J Gao, Y Park
2015 IEEE First International Conference on Big Data Computing Service and …, 2015
252015
A Sticky Policy Framework for Big Data Security
YP Shuyu Li, Tao Zhang, Jerry Gao
IEEE International Conference on Big Data Computing Service and Applications, 2015
25*2015
Interval-based flow watermarking for tracing interactive traffic
YJ Pyun, Y Park, DS Reeves, X Wang, P Ning
Computer Networks 56 (5), 1646-1665, 2012
192012
Identification of bot commands by run-time execution monitoring
Y Park, DS Reeves
2009 Annual Computer Security Applications Conference, 321-330, 2009
192009
Development of Cloud-based UAV Monitoring and Management System
M Itkin, M Kim, Y Park
Journal of Sensors 16, 2016
182016
Antibot: Clustering common semantic patterns for bot detection
Y Park, Q Zhang, D Reeves, V Mulukutla
2010 IEEE 34th Annual Computer Software and Applications Conference, 262-272, 2010
182010
Biotransformation of flavonoids with O-methyltransferase from Bacillus cereus
Y JUNG, HORGIL HUR, BGYU KIM, Y Lim, Y PARK, JH Ahn
Journal of microbiology and biotechnology 16 (7), 1090-1096, 2006
172006
Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks
SYC Hitesh Padekar, Younghee Park, Hongxin Hu
ACM Symposium on Access Control Models and Technologies (SACMAT), 2016
15*2016
A study on the awareness and practice of the pregnant women about oral health care
YN Park, CS Shim
Journal of Korean society of Dental Hygiene 8 (3), 53-64, 2008
122008
Adaptive watermarking against deliberate random delay for attack attribution through stepping stones
YH Park, DS Reeves
Proc. Of the Ninth International Conference on Information and …, 2007
122007
Watermarking for detecting freeloader misbehavior in software-defined networks
Y Park, SY Chang, LM Krishnamurthy
2016 International conference on computing, networking and communications …, 2016
112016
Machine-learning based Threat-aware System in Software Defined Networks
C Song, Y Park, K Golani, Y Kim, K Bhatt, K Goswami
26th International Conference on Computer Communications and Networks (ICCCN …, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20