This is an image that says University of Nevada, Las Vegas

Research

 

EngW3

 

Research Interests 

  • Cyber Security
  • Computer Networks
  • Big Data Analytics on Environmental Monitoring Data and Security Log Data
  • Security / Privacy and Air Traffic Management for UAS (Unmanned Aircraft Systems) – visit UAS Working Group for details

 

Publications

– Journal Papers

  1. Sungchul Lee, Ju-Yeon Jo, and Yoohwan Kim, “Authentication System for Stateless RESTful Web Service”, Journal of Computational Methods in Science and Engineering (JCMSE), to be published 2016
  2. Sungchul Lee, Eunmi Hwang, Juyeon Jo, and Yoohwan Kim, “Big Data Analysis with Hadoop on Personalized Incentive Model with Statistical Hotel Customer”, ACIS International Journal of Software Innovation (IJSI), Vol. 4, No. 3, July 2016
  3. Sungchul Lee, Ju-Yeon Jo, and Yoohwan Kim, “Restful Web Service and Web-Based Data Visualization for Environmental Monitoring”, International Journal of Software Innovation (IJSI), Vol. 3, No. 1, pp. 75-94, January 2015
  4. Juyeon Jo, “”Issues in Efficiency for Distributed and Networking Systems”, International Journal of Networked and Distributed Computing, Vol. 2, Issue 3, Aug. 2014
  5. Sungchul Lee, Juyeon Jo, and Yoohwan Kim, “Environmental Senor Monitoring with Secure RESTful Web Service”, International Journal of Services Computing, Vol. 2, No. 3, pp. 30 – 42, July 2014
  6. Haegill Choi, Jungsun Kim and JuYeon Jo, “An Advanced E-learning System Using Web Services” Computer Science and Convergence, Lecture Notes in Electrical Engineering, Springer, Volume 114, pp 607-612, 2012.
  7. Yan Jin, Ling Wang, Ju-Yeon Jo, Yoohwan Kim, Mei Yang and Yingtao Jiang, “EECCR: An Energy-Efficient m-Coverage and n-Connectivity Routing Algorithm under Border Effects in Heterogeneous Sensor Networks”, IEEE Transactions on Vehicular Technology, Vol. 58, Issue 3, March 2009, pp. 1429 – 1442.
  8. Yan Jin, Ju-Yeon Jo and Yoohwan Kim, “Energy Efficient Multi-Hop Communication Scheme in Clustered Sensor Networks”, International Journal of Innovative Computing, Information and Control, Vol. 4, No. 7, July 2008, pp. 1741 – 1749.
  9. Yan Jin, Ju-Yeon Jo, Ling Wang, Yoohwan Kim and Xiaozong Yang, “ECCRA: an Energy Efficient Coverage and Connectivity Preserving Routing Algorithm under Border Effects in Wireless Sensor Networks”, Elsevier Computer Communication, Vol. 31, Issue 10, June 2008, pp. 2398 – 2407.
  10. Yoohwan Kim, Ju-Yeon Jo, and Kyounghee Suh, “Baseline Profile Stability for Network Anomaly Detection”, International Journal of Network Security, Vol. 6, No.1, pp. 60 – 66, Jan. 2008
  11. Hal Berghel, James Carpinter, and Ju-Yeon Jo, “Phish Phactors: Offensive and Defensive Strategies”, Advances in Computers, publisher: Elsevier Science and Technology, Vol. 70, June 2007, pp. 223 – 268. (Book Chapter)
  12. Yoohwan Kim, Ju-Yeon Jo, Frank Merat, Mei Yang, and Yingtao Jiang, “Mitigating Distributed Denial-of-Service Attack with deterministic Bit Marking”, International Journal of Information Technology, Vol. 11, No. 2, 2005, pp 62-82
  13. E. Lu, M. Yang, S. Zheng, S.N. Neelkrishnan, and Ju-Yeon Jo, “A parallel scheduler based on acyclic stable matching,” International Journal of Computers and Their Applications, Vol. 14, No.2, pp. 109 – 115, June 2007.  http://www.isca-hq.org/j-list.htm
  14. Kyonam Choo, Yoseop Woo, Hongki Min and Ju-Yeon Jo “Icon Language-Based Auxiliary Communication System Interface for Language Disorders”,  Advances in Multimedia Information Systems, Book Series of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Vol. 3665/2005, Oct. 2005, pp 93 – 101.
  15. Roger Quinn, Greg Causey, Frank Merat, David Sargent, Nick Barendt, Wyatt Newman, Virgilio Velasco, Andy Podgurski, Ju-Yeon Jo, Leson Sterling, and Yoohwan Kim, “An agile manufacturing workcell design”, IIE Transactions, Vol. 29, no. 10, Oct. 1997, pp 901-909

 

– Conference Papers

  1. Candace Suh-Lee, Juyeon Jo, and Yoohwan Kim, “Text Mining for Security Threat Detection Discovering Hidden Information in Unstructured Log Messages”, IEEE Conference on Communications and Network Security (CNS), Oct. 2016
  2. Sungchul Lee, Ju-Yeon Jo, and Yoohwan Kim, “Performance Improvement of MapReduce Process Using Limited Node Block Placement Policy”, The 3rd IEEE International Conference on Data Science and Advanced Analytics (DSAA), Oct.  2016.
  3. Yoohwan Kim, Juyeon Jo and Sungchul Lee, “A Secure Location Verification Method for ADS-B”, IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), Sep. 2016
  4. Sungchul Lee, Ju-Yeon Jo, and Yoohwan Kim, “Data Analysis at Single-Mode and Multi-Mode for Data Center”, ISCA 25th International Conference on Data Engineering and Software Engineering (SEDE), Sep. 2016
  5. Priyanka Thota and Juyeon Jo, “Implementation of Secure IoT Communication”, 31st International Conference on Computers and Their Applications (CATA) , April 2016
  6. Sungchul Lee, Juyeon Jo, and Yoohwan Kim, “Secure and Stateless RESTful Web Service Using ID-Based Encryption”, 28th International Conference on Computer Applications in Industry and Engineering, October 2015
  7. Candace Suh-Lee and Ju-Yeon Jo, “Quantifying Security Risk of Network Vulnerability by Risk Conditions”, IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS), June 2015
  8. Sungchul Lee, Ju-Yeon Jo, and Yoohwan Kim, “Method for secure RESTful web service”, IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS), June 2015
  9. Yoohwan Kim, Juyeon Jo, and Monetta Shaw, “A Lightweight Communication Architecture for Small UAS Traffic Management (SUTM)”, ICNS, April 2015
  10. Juyeon Jo, Yoohwan Kim and Sungchul Lee, “Mindmetrics: Identifying users without their login IDs”, IEEE International Conference on Systems, Man and Cybernetics (SMC), Oct. 2014
  11. Sungchul Lee, Juyeon Jo, and Yoohwan Kim, “Performance testing of web-based data visualization”, IEEE International Conference on Systems, Man and Cybernetics (SMC), Oct. 2014
  12. Sungchul Lee, Juyeon Jo, Yoohwan Kim, and Haroon Stephen, “A framework for environmental monitoring with Arduino-based sensors using Restful web service”, IEEE International Conference on Services Computing (SCC), pp. 275-282, June 2014
  13. Yoohwan Kim, Juyeon Jo, and Sanjeeb Shrestha, “A server-based real-time privacy protection scheme against video surveillance by Unmanned Aerial Systems”, International Conference on Unmanned Aircraft Systems (ICUAS), May 2014
  14. Amritha Premnath, Juyeon Jo, and Yoohwan Kim, “Application of NTRU Cryptographic Algorithm for SCADA Security”, 11th International Conference on Information Technology: New Generations (ITNG), April 2014
  15. Juyeon Jo, Bonghwa Hong and Haejong Joo, “ Model Establishment and Experimental Measurement of Internet Traffic Monitoring”, The 2012 FTRA International Conference on Advanced IT, Engineering and Management, July 2012.
  16. Juyeon Jo, Kyuhwan Lee, Sunghyun Cho, Jaehyun Kim, and Yoohwan Kim, “The Energy Saving Strategy using the Network Coding in the Wireless Mesh Network” the ACM International Conference on Ubiquitous Information Management and Communication, Feb. 2012
  17. Kevin Benton, Ju-Yeon Jo and Yoohwan Kim, “SignatureCheck: A Protocol to Detect Man-In-The-Middle Attack in SSL “, 7th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, Oct. 2011.
  18. Yan Jin, Ju-Yeon Jo, Mei Yang, Yoohwan Kim, Yingtao Jiang and John Gowens, “HTSMA: a hybrid temporal-spatial multi-channel assignment scheme in heterogeneous wireless mesh networks”, IEEE GlobeCom’09, Honolulu, HI, Dec. 2009.
  19. Yan Jin, Ju-Yeon Jo, Yoohwan Kim, Yingtao Jiang and Mei Yang, “EECCP: An Energy-Efficient Coverage and Connectivity Preserving Algorithm under Border Effects in Wireless Sensor Networks”, IEEE 2008 Wireless Telecommunications Symposium, Pomona CA, April 2008, pp 310-315.
  20. Shupeng Wang, Mei Yang, Jianping Wang, Yingtao Jiang, Ju-Yeon Jo, “Mobile Node Deployment in Hybrid Sensor Networks”, IEEE Second International Conference on Communications and Networking in China, 2007, Aug. 2007, pp 871 – 875.
  21. Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Mei Yang, Yingtao Jiang, Jun Zheng, “SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography”, IEEE International Conference on Communications (ICC), June 2007, pp 1570 – 1575.
  22. Wei Ren, Yoohwan Kim, Ju-Yeon Jo, Mei Yang and Yingtao Jiang, “IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks”, IEEE International Conference on Information Technology: New Generation (ITNG), April 2007, pp 102 – 110.
  23. Yoohwan Kim, Ahmed Abdelal, Ju-Yeon Jo, Yingtao Jiang, and Mei Yang, “An Efficient Defense against Distributed Denial-of-Service Attacks using Congestion Path Marking”, IEEE ICC 2006, Istanbul, Turkey, June 2006 Vol. 5, pp 2159 – 2164.
  24. Yoohwan Kim, Ju-Yeon Jo, and Kyunghee Suh, “Baseline Profile Stability for Network Anomaly Detection” IEEE Int’l Conf. on Information Technology: New Generation (ITNG), Las Vegas, NV, April 2006, pp 720 – 725.
  25. Ju-Yeon Jo, Yoohwan Kim, and Jeffrey Sampson, “A Spam Mail blocking scheme with puzzles and tokens”, Network/Computer Security Workshop, Bethlehem, PA, August 2005
  26. Kyonam Choo, Ju-Yeon Jo, Hongki Min and Yoseop Woo, “Icon Language-Based Auxiliary Communication System Interface for Language Disorders”, International Workshop on Multimedia Information Systems, Sorrento, Italy, Sep. 2005.  (Sep 20 Afternoon session), http://aria.asu.edu/mis2005/program.htm
  27. Ju-Yeon Jo and Yoohwan Kim, “Hash-based Internet Traffic Load Balancing”, IEEE International Conference on Information Reuse and integration,  (IRI), Las Vegas, NV, November 2004, pp 204 – 209.
  28. Yoohwan Kim, Ju-Yeon Jo, and Frank Merat, “Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking”, IEEE Globecom, San Francisco, CA, December 2003, pp 1363 – 1367.
  29. Yoohwan Kim, Ju-Yeon Jo, H. Jonathan Chao, and Frank Merat, “High-Speed Router Filter for Blocking TCP Flooding under Distributed Denial of Service Attack”, IEEE IPCCC, Phoenix, AZ, April 2003, pp 183 – 190.
  30. Ju-Yeon Jo, Yoohwan Kim, and H. Jonathan Chao, “TCP Performance Comparison under Various Load Balancing Methods using OPNET”, OPNETWORK, Washington D.C., August 2002.
  31. Ju-Yeon Jo, Yoohwan Kim, H. Jonathan Chao, and Frank Merat, “Internet Traffic Load Balancing using Dynamic Hashing with Flow Volume”, SPIE ITCom 2002, Boston, MA, Aug. 2002.
  32. Wyatt Newman, Frank Merat, Michael Branicky, Virgilio Velasco, Nick Barendt, Andy Podgurski, Yoohwan Kim, Ju-Yeon Jo, Roger Quinn, Greg Causey, “Technologies for Robust Agile Manufacturing”, IASTED 6th International Conference on Robotics and Manufacturing, Banff, Canada, 1998.
  33. Ju-Yeon Jo, Yoohwan Kim, Scott Ameduri, and Andy Podgurski, “A New Role of Graphical Simulation: Software Testing”, 1997 SCS Simulation Multiconference, 30th Annual Simulation Symposium, Atlanta, Georgia, April 1997, pp 216 – 225.
  34. Ju-Yeon Jo, Yoohwan Kim, Andy Podgurski, and Wyatt Newman, “Virtual Testing of Agile Manufacturing Software Using 3D Graphical Simulation”, 1997 IEEE International Conference on Robotics and Automation, Albuquerque, New Mexico, April 1997, pp1223 – 1228.
  35. Yoohwan Kim, Ju-Yeon Jo, Virgilio Velasco, Nicholas Barendt, Andy Posgurski, Gultekin Ozsoyogly, and Frank Merat, “A Flexible Software Architecture for Agile Manufacturing”, IEEE International Conference on Robotics and Automation, Albuquerque, New Mexico, April 1997, pp 3043 – 3047.
  36. Frank Merat, Nick Barendt, Roger Quinn, Greg Causey, Wyatt Newman, Virgilio Velasco, Andy Podgurski, Yoohwan Kim, Gultekin Ozsoyoglu, and Ju-Yeon Jo, “Advances in Agile Manufacturing”, 1997 IEEE International Conference on Robotics and Automation, Albuquerque, New Mexico, April 1997, pp 1216 – 1222.
  37. Roger Quinn, Greg Causey, Frank Merat, David Sargent, Nick Barendt, Wyatt Newman, Virgilio Velasco, Andy Podgurski, Ju-Yeon Jo, Leson Sterling, and Yoohwan Kim, “Design of an Agile Manufacturing Workcell for Light Mechanical Applications”, IEEE International Conference on Robotics and Automation, Minneapolis, Minnesota, April 1996, pp 858 -863.
  38. Roger Quinn, Greg Causey, Matthew Birch, Wyatt Newman, Frank Merat, Michael Branicky, Virgilio Velasco, Nicholas Barendt, Andy Podgurski, Yoohwan Kim, and Ju-Yeon Jo, “Technologies for Robust Agile Manufacturing”, 1998 IEEE International Video Conference on Robotics and Automation, Minneapolis, Belgium, April, 1998. (Nominated for best video) 40 seconds preview: http://wings.buffalo.edu/eng/mae/ieee/icra98/V9821.mpeg
  39. Roger Quinn, Greg Causey, Frank Merat, Nick Barendt, Wyatt Newman, Virgilio Velasco, Andy Podgurski, Yoohwan Kim, Gultekin Ozsoyoglu, and Ju-Yeon Jo, “Advances in Agile Manufacturing”, 1997 IEEE International Video Conference on Robotics and Automation, Albuquerque, New Mexico, April, 1997. 40 seconds preview: http://wings.buffalo.edu/academic/department/eng/mae/ieee/29.mpeg
  40. Roger Quinn, Greg Causey, Frank Merat, David Sargent, Nick Barendt, Wyatt Newman, Virgilio Velasco, Andy Podgurski, Ju-Yeon Jo, Leson Sterling, and Yoohwan Kim, “Agile Manufacturing Workcell for Light Mechanical Assembly”, 1996 IEEE International Video Conference on Robotics and Automation, Minneapolis, Minnesota April, 1996.

css.php