TaeJin Lee

  • Citations Per Year
Learn More
VoIP market is growing fast and will replace a considerable portion of existing PSTN or 2G/3G which is under big trouble with spam calls. In VoIP, spam calls can be occurred more frequently because of its low cost and easy modification. In this paper, we propose user reputation based spam defense architecture which consists of four spam defense techniques.(More)
The majority of recent cyber incidents have been caused by malware. According to a report by Symantec, an average of one million malicious codes is found daily. Automated static and dynamic analysis technologies are generally applied to cope with this, but most of the new malicious codes are the mutants of existing malware. In this paper, we present(More)
The purpose of the recent cyber-incidents and violations are social chaos and political purposes beyond a simple behavior such as personal show of and try to achieve the financial objectives. But analyses of the single cyber incident, because they cannot organically establish a connection with each cyber incident, have limits to find relations with other(More)
In this paper we propose a model for measuring the quality of service (QoS) in a Web-hosting facility. We assume that there is an agreement between the provider and different clients regarding the price of different levels of service, known as service level agreement (SLA). The clients can range from small companies to large corporations. We assume that the(More)
  • 1