Publications

Park, Younghee

Publications 

  • [J3] Younghee Park*, Douglas Reeves, Mark Stamp. "Deriving Common Malware Behavior through Graph Clustering" Elsevier International Journal of Computer and Security. Journal. Vol. 39. Issue 0167-4048. Elsevier International Journal of Computer and Security,  pp. 419–430, November 2013.
  • [J2] Sayali Deshpande, Younghee Park, Mark Stamp. "Eigenvalue analysis for metamorphic detection" Springer Journal of Computer Virology and Hacking Techniques. Journal. Vol. 10. Issue 1. Springer Journal of Computer Virology and Hacking Techniques, (February 2014). pp.53-65.
  • [J1] Young June Pyun, Younghee Park*, Douglas S. Reeves, Xinyuang Wang, Peng Ning. "Interval-based flow watermarking for tracing interactive traffic" ELSEVIER International Journal of Computer Networks. Journal. Vol. 56. Issue 5. ELSEVIER International Journal of Computer Networks, (March 2012). pp.1646–1665. (*This author is a corresponding author.)
  • [C16] Sang-Yoon Chang, Younghee Park*, Akshaya Muralidharan, “Fast Address Hopping at the Switches: Securing Access for Packet Forwarding in SDN,” IEEE Network Operations and Management Symposium (NOMS), Turkey, April, 2016
  • [C15] Younghee Park*, Sang-Yoon Chang, Lavanya M. Krishnamurthy, “Watermarking for Detection Freeloader Misbehavior in Software-Defined Networks,” IEEE International Conference on Computing, Networking and Communications, Hawaii, USA, February 2016.
  • [C14] Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon Ahn, Jun Bi, Younghee Park, “VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls,” IEEE Conference on Network Function Virtualization & Software Defined Networks (NFV-SDN), San Francisco, USA November 2015.
  • [C13] Sanket Desai, Younghee Park*, Jerry Gao, Sang-Yoon Chang, Chungsik Song, “Improving Encryption Performance using MapReduce,” The IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity),  New York, USA August 2015. (*This author is a corresponding author.)
  • [C12] Chungsik Song, Younghee Park*, Jerry Gao and Sri Kinnera Nanduri, “Favored Encryption Techniques and Evaluation for Big Data in a Cloud”, in Proceedings of  IEEE International Conference on Big Data Computing Service and Applications, San Francisco, USA, April 2015. (*This author is a corresponding author.).
  • [C11] Shuyu Li, Jerry Gao, and Younghee Park, “A Sticky Policy Framework for Big Data Security”, in Proceedings of  IEEE International Conference on Big Data Computing Service and Applications, San Francisco, USA, April 2015.
  • [W2] William Zegers, Sang-Yoon Chang, Younghee Park*, Jerry Gao, “A Lightweight Encryption and Secure Protocol for Smartphone Cloud ”, 7th International Workshop of Internet-based Virtual Computing Environments, co-located with IEEE Service-Oriented Systems Engineering, 2015. (*This author is a corresponding author.)
  • [C10] Younghee Park, Akshay Wattal, Manish Mandlik, Xiao Su, “SOMA: Self-resilient Switches against Denial-of-Service Attacks,” In the International Conference on Electronics, Communications and Networks (CECNet), December, 2014.
  • [W2] Euijin Choo, Younghee Park*, Huzefa, “Identifying Malicious Metering Data in Advanced Metering Infrastructure”, in the international Workshop on Cyber Security and Cloud Computing, conjuncted with , London, UK April, 2014. (*This author is a corresponding author.)
  • [C9] Younghee Park, David M. Nicol, et. al. “Prevention of Malware Propagation in AMI ", in the IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, Canada, October 2013.
  • [C8] Younghee Park, David M. Nicol, “Design of Policy Engine to Prevent Malware Propagation in AMI", in the conference of Team for Research in Ubiquitous Secure Technology(TRUST), Washington DC, USA, October 2013.
  • [C7] Younghee Park, Salvatore J. Stolfo, “Software Decoys for Insider Threat ", in the 7th ACM Symposium on Information, Computer and Communications Security(ASIACCS), Seoul, South Korea, May 2012.
  • [C6] Younghee Park, Douglas Reeves, “Deriving common malware behavior through graph clustering ", Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security(ASIACCS), Hong Kong, China, March 2011.
  • [C5] Younghee Park, Qinghua Zhang, Douglas Reeves, Vikram Mulukutla, “AntiBot: Clustering Common Semantic Patterns for Bot Detection ", Proceedings of 34th Annual IEEE Computer Software and Applications Conference (COMPSAC), Seoul, South Korea, July 2010. (Acceptance ratio: 20%(25/193 for Full Papers))
  • [W1] Younghee Park, Douglas S. Reeves, "Fast Malware Classification by Automated Behavioral Graph Matching ", Proceedings of 6th ACM Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW), Oak Ridge National Lab., TN, USA, April, 2010.
  • [C4] Younghee Park, Douglas R. Reeves, “Identication of Bot Commands By Run-time Execution Monitoring ", Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009), Hawaii, USA, December 2009. (Acceptance Ratio: 19.6%(44/224)).
  • [C3] Young Hee Park and D. S. Reeves, “Adaptive Watermarking Against Deliberate Random Delay for Attack Attribution Through Stepping Stones ", Proceedings of 9th International Conference on Information and Communications Security (ICICS 2007) December 2007.
  • [C2] Y. J. Pyun, Young Hee Park, X. Y. Wang, D. S. Reeves, and P. Ning, “Tracing Traffic Through Intermediate Hosts that Repacketize Flows ", Proceedings of 26th Annual IEEE Conference on Computer Communications (INFOCOM 2007), May 2007. (Acceptance Ratio: 18%)