Name
Papers
Collaborators
SANGJIN LEE
171
255
Citations 
PageRank 
Referers 
1189
120.99
1956
Referees 
References 
1056
939
Search Limit
1001000
Title
Citations
PageRank
Year
Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations00.342022
CATCH: Cloud Data Acquisition through Comprehensive and Hybrid Approaches00.342022
A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices00.342022
Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics00.342022
Optical Filter-Embedded Fiber-Optic Radiation Sensor For Ultra-High Dose Rate Electron Beam Dosimetry00.342021
NTFS Data Tracker: Tracking file data history based on $LogFile00.342021
Test-Time Adaptation for Out-Of-Distributed Image Inpainting.00.342021
Forensic exploration on windows File History00.342021
File fingerprinting of the ZIP format for identifying and tracking provenance00.342021
Extended Object Tracking via Positive and Negative Information Fusion.10.352019
Study on the tracking revision history of MS Word files for forensic investigation.00.342017
Digital Forensic Approaches for Amazon Alexa Ecosystem.131.382017
Data-Driven Modeling and Analysis Framework for Cockpit Human-Machine Interaction Issues.00.342016
An enhanced security framework for reliable Android operating system.00.342016
A Methodology For Quantitative Assessment Of The Features And Capabilities Of Software Frameworks For Model Composition10.402016
Recovery method of deleted records and tables from ESE database00.342016
Investigation Methodology of a Virtual Desktop Infrastructure for IoT.10.372015
Intent Inference-Based Flight-Deck Human-Automation Mode-Confusion Detection00.342015
An on-site digital investigation methodology for data leak case.00.342014
Damaged backup data recovery method for Windows mobile10.352013
The effective method of database server forensics on the enterprise environment10.372012
Bursty event detection from text streams for disaster management110.792012
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent00.342012
Digital forensic investigation of cloud storage services.372.292012
Analysis Framework to Detect Artifacts of Portable Web Browser10.722012
On-the-spot digital investigation by means of LDFS: Live Data Forensic System20.362012
A recovery method of deleted record for SQLite database181.682012
Detection of Zombie PCs Based on Email Spam Analysis.20.732012
Methodology for Digital Forensic Investigation of iCloud10.362012
Advanced evidence collection and analysis of web browser activity313.372011
DES with any reduced masked rounds is not secure against side-channel attacks30.462010
A proposal for automating investigations in live forensics10.392010
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device20.422010
Secure USB bypassing tool20.412010
Acceleration Of Differential Power Analysis Through The Parallel Use Of Gpu And Cpu30.452010
Research about extracting and analyzing accounting data of company to detect financial fraud10.382009
A Stepwise Methodology for Tracing Computer Usage10.362009
Data concealment and detection in Microsoft Office 2007 files140.882009
Successive MAP Detection with Soft Interference Cancellation for Iterative Receivers in Hierarchical M-ary QAM Systems20.412009
An efficient signed digit montgomery multiplication for RSA50.522009
Soft-Output Ml Detector For Spatial Modulation Ofdm Systems232.262009
Design and Implementation of a Tool for System Restore Point Analysis00.342008
Methodologies for Detecting Covert Database20.442008
Performance Enhancement Of Differential Power Analysis Attacks With Signal Companding Methods00.342008
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension.00.342008
Security analysis of the full-round DDO-64 block cipher60.682008
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis40.422008
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths.20.402008
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions.20.382008
Recovery of Damaged Compressed Files for Digital Forensic Purposes20.372008
  • 1
  • 2