John J Yoon

  • Professor, Cybersecurity
  • Director, MCEC

Professor of Math/Computer Sciences Department

 

Ph.D., George Mason University, Fairfax, VA

M.S., University of Florida, Gainesville, FL

Mobile Technologies (Swift coding for iPhone Apps development; Java coding for Android Apps development) and Security

Wireless Sensor Technologies

Secure coding & Intelligent programming

Network coding for packet (unpacking &) analysis (in Python)

Machine Learning approaches to cyber defense

Steganography (coding in Python)

Distributed (multithreads) coding for data services

 

John Yoon, Book Chapter: “Intelligent Distance Learning Framework for Heterogeneous Online Students,”  Chapter 12 in the Book entitled “Intelligent Systems and Learning Data Analytics in Online Education,” edited by Santi Caballe, Stavros Demetriadis, Eduardo Gomez-Sanchez, Armin Weinberger, Pantelis Papadopoulos, Academic Press, an imprint of Elsevier, 2021, ISBN: 978-0-12-823410-5.

from Elsevier (http://smartlearn.uoc.edu/cfch-for-new-elsevier-book-colmooc-book/ ), to be published in fall 2021. [click http://cymanhattan.org/research/yoon/promoPDF/c01chap10inte1Mobile23dOnline5.pdf to display the article in pdf]

John Yoon, Deep-Learning Approach to Attack Handling of IoT Devices using IoT-Enabled Network Services, on Elsevier JournalInternet of Things,” vol. 11, 2020, also available time-limited at ScienceDirect ( https://www.sciencedirect.com/science/article/pii/S2542660520300743?dgcid=author ) or officially at https://www.sciencedirect.com/journal/internet-of-things/vol/11/suppl/C [click http://cymanhattan.org/research/yoon/promoPDF/j01elsevier_IoT-journal2020.pdf to display the article in pdf]

Yang Kim, Ohbong Kwon, John Yoon, Proportional Voting based Semi-Unsupervised Machine Learning Intrusion Detection System, in Journal of Computer Science and Information Technology, vol. 8, no. 2, Dec, 2020. (http://jcsitnet.com/),

John Yoon, Chaining JSON Blocks for Secure Transmission of Mobile Data Sequences, in Proc. of the 18th International Conference on Security and Management (http://sam.udmercy.edu/sam19/), Las Vegas, August, 2019. [click http://cymanhattan.org/research/yoon/promoPDF/a01a_chainingJSON4spoofing-SAM9723.pdf to display the article in pdf]

John Yoon, Using a Deep-Learning Approach for Smart IoT Network Packet Analysis, in Proc. of the Workshop on Machine Learning for Cyber-Crime Investigation and Cybersecurity (MaL2CSec) (https://mal2csec.ucm.es/), Stockholm, Sweden, June, 2019. [click http://cymanhattan.org/research/yoon/promoPDF/a02a_learningANN4iotSec_johnYoon7.pdf to display the article in pdf]

 

John Yoon, Trustworthiness of dynamic moving sensors for secure mobile edge computing, Journal Computers, vol 7, issue 4, December 2018, or available in https://www.mdpi.com/2073-431X/7/4/63 [click http://cymanhattan.org/research/yoon/promoPDF/j03jCS_IT2020accept-CIT-1271.pdf to display the article in pdf]

John Yoon and Michael DeBiase, Real-Time Analysis of Big Network Packet Streams by Learning the Likelihood of Trusted and Untrusted Sequences, Int’l Congress on Big Data, Seattle, 2018., or also available in https://link.springer.com/chapter/10.1007%2F978-3-319-94301-5_4 [click http://cymanhattan.org/research/yoon/promoPDF/a03a_bigData-manuscript-rt_pckAnal-Yoon.pdf to display the article in pdf]

John Yoon, ANN-based Collaborative Sensor Calibration and GA-approach to Sensor Mutation Management, the 5th Int'l Conf. on Smart Computing and Artificial Intelligence in the 6th Int’l Congress on Advanced Applied Informatics (http://www.iaiai.org/conference/aai2017/program-list/), Japan, 2017. [click http://cymanhattan.org/research/yoon/promoPDF/a04a_sensorQuality17Manuscript.pdf to display the article in pdf]

John Yoon, Leveraging Sensor Data Content to Assure Sensor Device Trustworthiness in Mobile Edge Computing, the 2nd Int’l Conference on Fog and Mobile Edge Computing (FMEC2017) (https://emergingtechnet.org/FMEC2017/), Valencia, Spain, 2017. [click http://cymanhattan.org/research/yoon/promoPDF/a05a_fmec17trustB.pdf to display the article in pdf]

 

Jong P. Yoon and Juan Ortiz, Data Mining Approach to Situation-aware Sensor Actuation in Wireless Sensor Networks, the Fourth Int’l Conf. on Future Generation Communication Technologies, Luton, UK, 2015. [click http://cymanhattan.org/research/yoon/promoPDF/a06a_dirf-fgct15_london15network5g11.pdf to display the article in pdf]

Jong P. Yoon, Three-Tiered Data Mining for Bit Data Patterns of Wireless Sensor Networks in Medical and Healthcare Domains, The 8th Int’l Conf. on Internet and Web Applications and Services, Rome, Italy, 2013. [click http://cymanhattan.org/research/yoon/promoPDF/a07a_iciw_2013_1_40_20249.pdf to display the article in pdf]

Jong P. Yoon and Joyce Yoon, “Interoperating DNA Gene Sequences and Nutrition Provisions for Personalized Wellness,” in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, entitled “Bio-Inspired Models of Network, Information, and Computing Systems, v. 87, 2012. Earlier version appeared in 1st Workshop on Bio-inspired Models and Technologies for Ambient Information Society, Boston, Dec., 2010. (http://www.anarg.jp/bioambis2010/, paper in http://www.anarg.jp/bioambis2010/program.html)

Jong P. Yoon, Christopher M. Frenz, Zhixiong Chen, David Wang, Privacy-Preserving Mobile Accesses for   Virtual Private Social Media, IEEE Proceedings of Congress on Services, 2012.

Christopher M. Frenz and Jong P. Yoon, XSSmon: A Perl Based IDS for the Detectin of Potential XSS Attacks, in IEEE Long Island Systems, Applications and Technology Conference, May 4, 2012.

Jong P. Yoon, Location- and Time-based Trustworthy Correlation of Users, Sites and Resources, in 2nd Int’l Conf. on Pervasive and Embedded Computing and Communication Systems, Rome, Italy, 2012. . [click http://cymanhattan.org/research/yoon/promoPDF/a08a_manuscr4Yoon2PECCS.pdf to display the article in pdf]

Jong P. Yoon, Chapter 6 “Access Control and Trustiness for Resource Management in Cloud Databases” in the Book entitled “Grid and Cloud Database Management,” edited by G. Aloisio and S. Fiore, published in Summer, 2011. (http://www.amazon.com/Cloud-Database-Management-Sandro-Fiore/dp/3642200443/ref=sr_1_1?ie=UTF8&s=books&qid=1307039840&sr=8-1) [click http://cymanhattan.org/research/yoon/promoPDF/c02Manuscript4BookGridCloudDB_by_yoon9b2.pdf to display the article in pdf]

Jong P. Yoon,  Location- and Time-Dependent VPD for Privacy-Preserving Wireless Accesses to Cloud Services, in International Journal on Cloud Computing: Services and Architecture, vol.1, no.3, 2011.

Jong P. Yoon, SePAL: State-Dependent Management for Secure and Private Access of Wireless Devices to Cloud Databases, vol.2, International Journal of Information System Security, 2011.

Zhixiong Chen, John Yoon, Christopher Frenz, Kenneth Compres, IT Governance, Compliance and Auditing Curriculum – A Pedagogical Perspective, Workshop on IT Governance, Risk and Compliance, in conjunction with IEEE World Congress on Services, July 5-10, 2011, Washington D.C.

Jong P. Yoon and Z. Chen, Service Trustiness and Resource Legitimacy in Cloud, In the proceedings of the Fifth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka, Japan, 2010. (http://www.lsi.upc.edu/~net4all/3PGCIC-2010/workshops.html )

Zhixiong Chen and John Yoon, IT Auditing to Assure a Secure Cloud Computing, In the proceedings of The 6th IEEE World Congress on Services, July 5-10, 2010, Miami, Florida.

Jong P. Yoon and Z. Chen, Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing, In the Proceedings of the Second International Conference on Networked Digital Technologies, 2010. (http://books.google.com/books?hl=en&lr=&id=gdZo00XbaFoC&oi=fnd&pg=PR5&dq=Jong+P.+Yoon+Service+Trustiness&ots=8JRt5WM4rb&sig=Itk8lHvHoDZ5UqGJ5ndH9k3imtE#v=onepage&q&f=false)

Jong P. Yoon and Z. Chen, Localization and Detection of Vector Logo Image Plagiarism, In the Proceedings of the 1st Int’l Conference on Digital Forensics and Cyber Crime, 2009, also appeared in the Book entitled “Digital Forensics and Cyber Crime”, Springer, 2010. (http://books.google.com/books?hl=en&lr=&id=fb5F6LGz9_sC&oi=fnd&pg=PP2&dq=Jong+P.+Yoon+Localization+and+Detection+vector+logo&ots=440OHOaT3X&sig=pSoMP-zRsOeHwA9iI6C1wYiaKRE#v=onepage&q=Jong%20P.%20Yoon%20Localization%20and%20Detection%20vector%20logo&f=false)

Jong P. Yoon, Presto Authorization: A Bitmap Indexing Scheme for High-speed Access Control to XML Documents, in IEEE Transactions on Knowledge and Data Engineering, Vol. 18, No. 7, 2006. (http://www.computer.org/portal/web/csdl/doi/10.1109/TKDE.2006.113 ) [click http://cymanhattan.org/research/yoon/promoPDF/j04ieee_tkde0971.pdf to display the article in pdf]

A. Ravichandran, J. Yoon, Trust Management with Delegation in Grouped Peer-to-Peer Communities, 11th ACM Symposium on Access Control Models and Technologies, June 7-9, 2006.

J. Yoon, S. Kim, Schema Extraction for XML Document Retrieval, in Journal of Applied Systems Studies, Vol. 3, No. 2, Cambridge International Science Publishing, Cambridge, UK, 2002.

J. Yoon, Extracting Database Knowledge from Query Trees, Journal of Electrical Engineering and Information Science, Vol.1, No.2, pp.145-156, 1996.

Kerschberg, L., Baum, R., Waisanen, A., Yoon, J., Huang, I., "A Taxonomy of Knowledge-Based Approaches to Fault Management for Telecommunications Networks," Journal of Computers and Electrical Engineering, 1993.

J. Yoon, and L. Kerschberg, A Framework for Knowledge Discovery and Evolution in Databases, IEEE Transactions on Data and Knowledge Engineering, vol 5, pp. 973-978, 1993.  (http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=250080 ) [click https://vicinity2020.eu/vicinity/system/files/publications/a_knowledge_discovery_in_databases_approach_for_industrial_microgrid_planning_2016.pdf to display one of the articles that references my journal article in pdf]