Younghee Park
Younghee Park
Computer Engineering, San Jose State University
Verified email at sjsu.edu - Homepage
Title
Cited by
Cited by
Year
Fast malware classification by automated behavioral graph matching
Y Park, D Reeves, V Mulukutla, B Sundaravel
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
1722010
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1382007
Deriving common malware behavior through graph clustering
Y Park, DS Reeves, M Stamp
Computers & Security 39, 419-430, 2013
972013
Deriving common malware behavior through graph clustering
Y Park, D Reeves
6th ACM Symposium on Information, Computer and Communications Security(ASIACCS), 2011
972011
Complete assignments of NMR data of 13 hydroxymethoxyflavones
Y Park, BH Moon, H Yang, Y Lee, E Lee, Y Lim
Magnetic Resonance in Chemistry 45 (12), 1072-1075, 2007
702007
Eigenvalue analysis for metamorphic detection
S Deshpande, Y Park, M Stamp
Journal of computer virology and hacking techniques 10 (1), 53-65, 2014
412014
VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls
Juan Dengy, Hongxin Huy, Hongda Liy, Zhizhong Pany, Kuang-Ching Wangy, Gail ...
IEEE Conference on Network Function Virtualization & Software Defined …, 2015
392015
Software decoys for insider threat
Y Park, SJ Stolfo
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
362012
NMR data of flavone derivatives and their anti-oxidative activities
Y Park, Y Lee, H Kim, Y Lee, Y Yoon, B Moon, Y Chong, J Ahn, Y Shim, ...
BULLETIN-KOREAN CHEMICAL SOCIETY 27 (10), 1537, 2006
292006
A sticky policy framework for big data security
S Li, T Zhang, J Gao, Y Park
2015 IEEE First International Conference on Big Data Computing Service and …, 2015
282015
A Sticky Policy Framework for Big Data Security
YP Shuyu Li, Tao Zhang, Jerry Gao
IEEE International Conference on Big Data Computing Service and Applications, 2015
28*2015
Development of Cloud-based UAV Monitoring and Management System
M Itkin, M Kim, Y Park
Journal of Sensors 16, 2016
252016
Identification of bot commands by run-time execution monitoring
Y Park, DS Reeves
2009 Annual Computer Security Applications Conference, 321-330, 2009
212009
The evaluation of a palliative care programme for people suffering from life‐limiting diseases
CWH Chan, YY Chui, SY Chair, MMK Sham, RSK Lo, CSM Ng, HYL Chan, ...
Journal of clinical nursing 23 (1-2), 113-123, 2014
202014
Interval-based flow watermarking for tracing interactive traffic
YJ Pyun, Y Park, DS Reeves, X Wang, P Ning
Computer Networks 56 (5), 1646-1665, 2012
202012
Antibot: Clustering common semantic patterns for bot detection
Y Park, Q Zhang, D Reeves, V Mulukutla
2010 IEEE 34th Annual Computer Software and Applications Conference, 262-272, 2010
202010
Biotransformation of flavonoids with O-methyltransferase from Bacillus cereus
Y JUNG, HORGIL HUR, BGYU KIM, Y Lim, JH AHN, Y PARK
Journal of microbiology and biotechnology 16 (7), 1090-1096, 2006
182006
Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks
SYC Hitesh Padekar, Younghee Park, Hongxin Hu
ACM Symposium on Access Control Models and Technologies (SACMAT), 2016
17*2016
Substitution effect of hydroxyl groups on the 1H and 13C chemical shifts in hydroxyflavonols
S Lee, Y Park, BH Moon, E Lee, S Hong, Y Lim
Bull. Korean Chem. Soc 29, 1597-1600, 2008
172008
Impact of Reviewer Social Interaction on Online Consumer Review Fraud Detection
K Goswami, Y Park, Chungsik Song
Journal of Big Data, 2017
162017
The system can't perform the operation now. Try again later.
Articles 1–20