default search action
Chang Choi
- > Home > Persons > Chang Choi
Publications
- 2019
- [j42]Chang Choi, Junho Choi:
Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service. IEEE Access 7: 110510-110517 (2019) - [j41]Chang Choi, Christian Esposito, Mungyu Lee, Junho Choi:
Metamorphic malicious code behavior detection using probabilistic inference methods. Cogn. Syst. Res. 56: 142-150 (2019) - [c38]Junho Choi, Chang Choi, Sunghwan Kim, Hoon Ko:
Medical Information Protection Frameworks for Smart Healthcare based on IoT. WIMS 2019: 29:1-29:5 - 2018
- [j33]Chang Choi, Chulwoong Choi, Junho Choi, Pankoo Kim:
Improved performance optimization for massive small files in cloud computing environment. Ann. Oper. Res. 265(2): 305-317 (2018) - [j31]Chang Choi, Christian Esposito, Haoxiang Wang, Zhe Liu, Junho Choi:
Intelligent Power Equipment Management Based on Distributed Context-Aware Inference in Smart Cities. IEEE Commun. Mag. 56(7): 212-217 (2018) - [c34]Gihoon Kim, Chang Choi, Junho Choi:
Ontology modeling for APT attack detection in an IoT-based power system. RACS 2018: 160-164 - 2017
- [j19]Chang Choi, Junho Choi, Pankoo Kim:
Abnormal behaviour pattern mining for unknown threat detection. Comput. Syst. Sci. Eng. 32(2) (2017) - [c32]Mungyu Lee, Junho Choi, Chang Choi, Pankoo Kim:
APT attack behavior pattern mining using the FP-growth algorithm. CCNC 2017: 1-4 - 2016
- [j13]Junho Choi, Chang Choi, Hoon Ko, Pankoo Kim:
Intelligent Healthcare Service Using Health Lifelog Analysis. J. Medical Syst. 40(8): 188:1-188:10 (2016) - [c23]Htet Myet Lynn, Chang Choi, Junho Choi, Juhyun Shin, Pankoo Kim:
The Method of Semi-supervised Automatic Keyword Extraction for Web Documents using Transition Probability Distribution Generator. RACS 2016: 1-6 - 2015
- [j11]Junho Choi, Chang Choi, Ilsun You, Pankoo Kim:
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence. J. Univers. Comput. Sci. 21(3): 369-383 (2015) - [j10]Junho Choi, Woon Sung, Chang Choi, Pankoo Kim:
Personal information leakage detection method using the inference-based access control model on the Android platform. Pervasive Mob. Comput. 24: 138-149 (2015) - [c22]Junho Choi, Chang Choi, Htet Myet Lynn, Pankoo Kim:
Ontology Based APT Attack Behavior Analysis in Cloud Computing. BWCCA 2015: 375-379 - [c21]Chang Choi, Junho Choi, Htet Myet Lynn, Pankoo Kim:
Travel Destination Recommendation Based on Probabilistic Spatio-temporal Inference. ICCASA 2015: 94-100 - [c20]Chang Choi, Xuefeng Piao, Junho Choi, Mungyu Lee, Pankoo Kim:
Malicious behavior pattern mining using control flow graph. RACS 2015: 119-122 - [p1]Junho Choi, Chang Choi, Eunji Lee, Pankoo Kim:
Markov Logic Network Based Social Relation Inference for Personalized Social Search. New Trends in Computational Collective Intelligence 2015: 195-202 - 2014
- [j9]Junho Choi, Chang Choi, Byeong-Kyu Ko, Pankoo Kim:
A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Comput. 18(9): 1697-1703 (2014) - [j8]Ilsun You, Junho Choi, Chang Choi, Pankoo Kim:
Intelligent healthcare service based on context inference using smart device. Soft Comput. 18(12): 2577-2586 (2014) - [j7]Chang Choi, Junho Choi, Pankoo Kim:
Ontology-based access control model for security policy reasoning in cloud computing. J. Supercomput. 67(3): 711-722 (2014) - [c19]Huijin Jeong, Junho Choi, Chang Choi, Ilsun You, Pankoo Kim:
A Design of Web Log Integration Framework Using NoSQL. ICT-EurAsia 2014: 438-445 - [c16]Eunji Lee, Jeongin Kim, Junho Choi, Chang Choi, Byeong-Kyu Ko, Pankoo Kim:
A semantic weighting method for document classification based on Markov logic networks. RACS 2014: 29-33 - 2013
- [j6]Chang Choi, Junho Choi, Eunji Lee, Ilsun You, Pankoo Kim:
Probabilistic spatio-temporal inference for motion event understanding. Neurocomputing 122: 24-32 (2013) - [j5]Junho Choi, Chang Choi, Kangbin Yim, Jeongnyeo Kim, Pankoo Kim:
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery. Informatica 24(3): 381-394 (2013) - [j4]Junho Choi, Chang Choi, Byeongkyu Ko, Dongjin Choi, Pankoo Kim:
Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment. J. Internet Serv. Inf. Secur. 3(3/4): 28-37 (2013) - 2012
- [j3]Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, Pankoo Kim:
A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments. J. Internet Serv. Inf. Secur. 2(3/4): 54-64 (2012) - [j2]Junho Choi, Chang Choi, Byeong-Kyu Ko, Pankoo Kim:
Detection of cross site scripting attack in wireless networks using n-Gram and SVM. Mob. Inf. Syst. 8(3): 275-286 (2012) - [c15]Byeong-Kyu Ko, Dongjin Choi, Chang Choi, Junho Choi, Pankoo Kim:
Document Classification through Building Specified N-Gram. IMIS 2012: 171-176 - 2011
- [c14]Chang Choi, Junho Choi, Juhyun Shin, Ilsun You, Pankoo Kim:
Extended Spatio-temporal Relations between Moving and Non-moving Objects. ARES 2011: 243-254 - [c13]Junho Choi, Hayoung Kim, Chang Choi, Pankoo Kim:
Efficient Malicious Code Detection Using N-Gram Analysis and SVM. NBiS 2011: 618-621 - [c12]Junho Choi, Chang Choi, Dongjin Choi, Jingwang Koh, Pankoo Kim:
Semantic relation extraction for automatically building domain ontology using a link grammar. RACS 2011: 301-306 - 2009
- [c11]Chang Choi, Miyoung Cho, Junho Choi, Myunggwon Hwang, Jong-An Park, Pankoo Kim:
Travel Ontology for Intelligent Recommendation System. Asia International Conference on Modelling and Simulation 2009: 637-642 - 2007
- [c9]Miyoung Cho, Chang Choi, Junho Choi, Hongryoul Yi, Pankoo Kim:
Trajectory Annotation and Retrieval Based on Semantics. Adaptive Multimedia Retrieval 2007: 251-264 - 2006
- [c5]Miyoung Cho, Dan Song, Chang Choi, Junho Choi, Jong-An Park, Pankoo Kim:
Comparison Between Motion Verbs Using Similarity Measure for the Semantic Representation of Moving Object. CIVR 2006: 281-290 - [c3]Sungsuk Kim, Chang Choi, Junho Choi, Pankoo Kim, Hanil Kim:
A Method for Efficient Malicious Code Detection Based on Conceptual Similarity. ICCSA (4) 2006: 567-576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-21 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint