[J3]Younghee Park*, Douglas Reeves, Mark Stamp. "Deriving Common Malware Behavior through Graph Clustering"
Elsevier International Journal of Computer and Security. Journal. Vol. 39. Issue 0167-4048.
Elsevier International Journal of Computer and Security, pp. 419–430, November 2013.
[J2] Sayali Deshpande, Younghee Park, Mark Stamp. "Eigenvalue analysis for metamorphic detection" Springer Journal of
Computer Virology and Hacking Techniques. Journal. Vol. 10. Issue 1. Springer Journal
of Computer Virology and Hacking Techniques, (February 2014). pp.53-65.
[J1] Young June Pyun, Younghee Park*, Douglas S. Reeves, Xinyuang Wang, Peng Ning. "Interval-based flow watermarking
for tracing interactive traffic" ELSEVIER International Journal of Computer Networks.
Journal. Vol. 56. Issue 5. ELSEVIER International Journal of Computer Networks, (March
2012). pp.1646–1665. (*This author is a corresponding author.)
[C16] Sang-Yoon Chang, Younghee Park*, Akshaya Muralidharan, “Fast Address Hopping at the Switches: Securing Access for
Packet Forwarding in SDN,” IEEE Network Operations and Management Symposium (NOMS),
Turkey, April, 2016
[C15] Younghee Park*, Sang-Yoon Chang, Lavanya M. Krishnamurthy, “Watermarking for Detection Freeloader
Misbehavior in Software-Defined Networks,” IEEE International Conference on Computing,
Networking and Communications, Hawaii, USA, February 2016.
[C14] Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon
Ahn, Jun Bi, Younghee Park, “VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual
Firewalls,” IEEE Conference on Network Function Virtualization & Software Defined
Networks (NFV-SDN), San Francisco, USA November 2015.
[C13] Sanket Desai, Younghee Park*, Jerry Gao, Sang-Yoon Chang, Chungsik Song, “Improving Encryption Performance using
MapReduce,” The IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity),
New York, USA August 2015. (*This author is a corresponding author.)
[C12] Chungsik Song, Younghee Park*, Jerry Gao and Sri Kinnera Nanduri, “Favored Encryption Techniques and Evaluation
for Big Data in a Cloud”, in Proceedings of IEEE International Conference on Big
Data Computing Service and Applications, San Francisco, USA, April 2015. (*This author
is a corresponding author.).
[C11] Shuyu Li, Jerry Gao, and Younghee Park, “A Sticky Policy Framework for Big Data Security”, in Proceedings of IEEE International
Conference on Big Data Computing Service and Applications, San Francisco, USA, April
[W2] William Zegers, Sang-Yoon Chang, Younghee Park*, Jerry Gao, “A Lightweight Encryption and Secure Protocol for Smartphone Cloud ”,
7th International Workshop of Internet-based Virtual Computing Environments, co-located
with IEEE Service-Oriented Systems Engineering, 2015. (*This author is a corresponding
[C10] Younghee Park, Akshay Wattal, Manish Mandlik, Xiao Su, “SOMA: Self-resilient Switches against Denial-of-Service
Attacks,” In the International Conference on Electronics, Communications and Networks
(CECNet), December, 2014.
[W2] Euijin Choo, Younghee Park*, Huzefa, “Identifying Malicious Metering Data in Advanced Metering Infrastructure”,
in the international Workshop on Cyber Security and Cloud Computing, conjuncted with
, London, UK April, 2014. (*This author is a corresponding author.)
[C9] Younghee Park, David M. Nicol, et. al. “Prevention of Malware Propagation in AMI ", in the IEEE
International Conference on Smart Grid Communications (SmartGridComm), Vancouver,
Canada, October 2013.
[C8] Younghee Park, David M. Nicol, “Design of Policy Engine to Prevent Malware Propagation in AMI",
in the conference of Team for Research in Ubiquitous Secure Technology(TRUST), Washington
DC, USA, October 2013.
[C7] Younghee Park, Salvatore J. Stolfo, “Software Decoys for Insider Threat ", in the 7th ACM Symposium
on Information, Computer and Communications Security(ASIACCS), Seoul, South Korea,
[C6] Younghee Park, Douglas Reeves, “Deriving common malware behavior through graph clustering ", Proceedings
of the 6th ACM Symposium on Information, Computer and Communications Security(ASIACCS),
Hong Kong, China, March 2011.
[C5] Younghee Park, Qinghua Zhang, Douglas Reeves, Vikram Mulukutla, “AntiBot: Clustering Common Semantic
Patterns for Bot Detection ", Proceedings of 34th Annual IEEE Computer Software and
Applications Conference (COMPSAC), Seoul, South Korea, July 2010. (Acceptance ratio:
20%(25/193 for Full Papers))
[W1] Younghee Park, Douglas S. Reeves, "Fast Malware Classification by Automated Behavioral Graph Matching
", Proceedings of 6th ACM Annual Cyber Security and Information Intelligence Research
Workshop (CSIIRW), Oak Ridge National Lab., TN, USA, April, 2010.
[C4] Younghee Park, Douglas R. Reeves, “Identication of Bot Commands By Run-time Execution Monitoring
", Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009),
Hawaii, USA, December 2009. (Acceptance Ratio: 19.6%(44/224)).
[C3] Young Hee Park and D. S. Reeves, “Adaptive Watermarking Against Deliberate Random Delay for Attack
Attribution Through Stepping Stones ", Proceedings of 9th International Conference
on Information and Communications Security (ICICS 2007) December 2007.
[C2] Y. J. Pyun, Young Hee Park, X. Y. Wang, D. S. Reeves, and P. Ning, “Tracing Traffic Through Intermediate Hosts
that Repacketize Flows ", Proceedings of 26th Annual IEEE Conference on Computer Communications
(INFOCOM 2007), May 2007. (Acceptance Ratio: 18%)