Alexa, can I trust you? H Chung, M Iorga, J Voas, S Lee Computer 50 (9), 100-104, 2017 | 379 | 2017 |
Digital forensic investigation of cloud storage services H Chung, J Park, S Lee, C Kang Digital investigation 9 (2), 81-95, 2012 | 290 | 2012 |
Digital forensic approaches for Amazon Alexa ecosystem H Chung, J Park, S Lee Digital investigation 22, S15-S25, 2017 | 255 | 2017 |
Intelligent virtual assistant knows your life H Chung, S Lee arXiv preprint arXiv:1803.00466, 2018 | 54 | 2018 |
Forensic analysis techniques for fragmented flash memory pages in smartphones J Park, H Chung, S Lee Digital Investigation 9 (2), 109-118, 2012 | 48 | 2012 |
The method of database server detection and investigation in the enterprise environment N Son, K Lee, SJ Jeon, H Chung, S Lee, C Lee Secure and Trust Computing, Data Management and Applications: 8th FIRA …, 2011 | 28 | 2011 |
Forensic Analysis for AI Speaker with Display Echo Show 2nd Generation as a Case Study MA Youn, Y Lim, K Seo, H Chung, S Lee Digital Investigation, 2021 | 25 | 2021 |
Research on the classification model of similarity malware using fuzzy hash C Park, H Chung, K Seo, S Lee Journal of The Korea Institute of Information Security & Cryptology 22 (6 …, 2012 | 17 | 2012 |
Relevance analysis using revision identifier in MS word J Joun, H Chung, J Park, S Lee Journal of Forensic Sciences 66 (1), 323-335, 2021 | 10 | 2021 |
Advanced protocol to prevent man-in-the-middle attack in scada system S Oh, H Chung, S Lee, K Lee, SH Kim, IY Lee, S Kiyomoto, Y Miyake, ... International Journal of Security and Its Applications 8 (2), 1-8, 2014 | 9 | 2014 |
Forensic investigation procedure for real-time synchronization service J Lee, H Jung, S Lee Journal of The Korea Institute of Information Security & Cryptology 22 (6 …, 2012 | 8 | 2012 |
Methodology for digital forensic investigation of iCloud J Lee, H Chung, C Lee, S Lee Information Technology Convergence, Secure and Trust Computing, and Data …, 2012 | 8 | 2012 |
Multilayered diagnostics for smart cities J Park, H Chung, JF DeFranco Computer 55 (2), 14-22, 2022 | 7 | 2022 |
Methodology and implementation for tracking the file sharers using BitTorrent S Park, H Chung, C Lee, S Lee, K Lee Multimedia Tools and Applications 74, 271-286, 2015 | 7 | 2015 |
Forensic analysis of residual information in adobe pdf files H Chung, J Park, S Lee Future Information Technology: 6th International Conference, FutureTech 2011 …, 2011 | 7 | 2011 |
A study on edit order of text cells on the MS Excel files Y Lee, H Chung, S Lee Journal of The Korea Institute of Information Security & Cryptology 24 (2 …, 2014 | 6 | 2014 |
Forensic analysis of the Windows telemetry for diagnostics J Han, J Park, H Chung, S Lee arXiv preprint arXiv:2002.12506, 2020 | 5 | 2020 |
Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics Y Lim, MA Youn, H Chung, J Park, G Horsman, S Lee Journal of Information Security and Applications 65, 103102, 2022 | 4 | 2022 |
퍼지해시를 이용한 유사 악성코드 분류모델에 관한 연구 박창욱, 정현지, 서광석, 이상진 정보보호학회논문지 22 (6), 1325-1336, 2012 | 3 | 2012 |
Toward Trustworthy Urban IT Systems: The Bright and Dark Sides of Smart City Development J Park, H Chung IT Professional 23 (6), 52 - 57, 2021 | 2 | 2021 |