TaeJin Lee

Learn More
VoIP market is growing fast and will replace a considerable portion of existing PSTN or 2G/3G which is under big trouble with spam calls. In VoIP, spam calls can be occurred more frequently because of its low cost and easy modification. In this paper, we propose user reputation based spam defense architecture which consists of four spam defense techniques.(More)
The majority of recent cyber incidents have been caused by malware. According to a report by Symantec, an average of one million malicious codes is found daily. Automated static and dynamic analysis technologies are generally applied to cope with this, but most of the new malicious codes are the mutants of existing malware. In this paper, we present(More)
  • 1