Sangjin Lee

ORCID: 0000-0002-6809-5179
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital and Cyber Forensics
  • Advanced Malware Detection Techniques
  • Innovation in Digital Healthcare Systems
  • Digital Media Forensic Detection
  • Cryptographic Implementations and Security
  • Technology and Data Analysis
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Advanced Data Storage Technologies
  • Advanced Steganography and Watermarking Techniques
  • Internet of Things and Social Network Interactions
  • Network Security and Intrusion Detection
  • User Authentication and Security Systems
  • Cloud Data Security Solutions
  • E-commerce and Technology Innovations
  • Energy and Environmental Systems
  • Privacy, Security, and Data Protection
  • Digital Rights Management and Security
  • Dispute Resolution and Class Actions
  • Internet Traffic Analysis and Secure E-voting
  • Educational Systems and Policies
  • Consumer Perception and Purchasing Behavior
  • Cryptography and Data Security
  • Spam and Phishing Detection
  • Web Data Mining and Analysis

Wellcome Sanger Institute
2024-2025

Korea University
2015-2024

Chung-Ang University
2023

Hanyang University
2022

Pukyong National University
2022

Dongnam Institute of Radiological & Medical Sciences
2021

Convergence
2018

Pusan National University
2018

Purdue University West Lafayette
2014-2016

Agency for Defense Development
2012-2015

Internet of Things (IoT) devices such as the Amazon Echo – a smart speaker developed by are undoubtedly great sources potential digital evidence due to their ubiquitous use and always-on mode operation, constituting human-life's black box. The in particular plays centric role for cloud-based intelligent virtual assistant (IVA) Alexa Lab126. Alexa-enabled wireless is gateway all voice commands submitted Alexa. Moreover, IVA interacts with plethora compatible IoT third-party applications that...

10.1016/j.diin.2017.06.010 article EN cc-by-nc-nd Digital Investigation 2017-08-01

A Web browser is an essential application program for accessing the Internet. If a suspect uses Internet as source of information, evidence related to crime would be saved in log file browser. Therefore, investigating browser's can help collect information relevant case. After considering existing research and tools, this paper suggests new collection analysis methodology tool aid process.

10.1016/j.diin.2011.05.008 article EN cc-by-nc-nd Digital Investigation 2011-08-01

Abstract Summary Pacific Biosciences (PacBio) circular consensus sequencing (CCS) aka high fidelity (HiFi) technology has revolutionized modern genomics by producing long (10+kb) and highly accurate reads circularized DNA molecules multiple times combining them into a sequence. Currently the accuracy quality value estimation is more than sufficient for genome assembly germline variant calling, but estimated scores are not enough confident somatic calling on single reads. Here we introduce...

10.1101/2024.02.08.579541 preprint EN bioRxiv (Cold Spring Harbor Laboratory) 2024-02-12

Abstract Background Pacific Biosciences (PacBio) circular consensus sequencing (CCS), also known as high fidelity (HiFi) technology, has revolutionized modern genomics by producing long (10 + kb) and highly accurate reads. This is achieved circularized DNA molecules multiple times combining them into a sequence. Currently, the accuracy quality value estimation provided HiFi technology are more than sufficient for applications such genome assembly germline variant calling. However, there...

10.1186/s12859-024-06020-0 article EN cc-by BMC Bioinformatics 2025-01-16

10.3795/ksme-a.2025.49.2.117 article EN Transactions of the Korean Society of Mechanical Engineers A 2025-02-17

At the time of this writing, Android devices are widely used, and many studies considering methods forensic acquisition data from have been conducted. Similarly, a diverse collection smartphone tools has also introduced. However, conducted thus far do not normally guarantee integrity required for digital investigations. Therefore, work uses previously proposed method device utilizing 'Recovery Mode'. This evaluates Recovery Mode variables that potentially compromise at acquisition. Based on...

10.1016/j.diin.2013.06.001 article EN cc-by-nc-nd Digital Investigation 2013-08-01

In the IoT world, intelligent virtual assistant (IVA) is a popular service to interact with users based on voice command. For optimal performance and efficient data management, famous IVAs like Amazon Alexa Google Assistant usually operate cloud computing architecture. this process, large amount of behavioral traces that include user activity history detailed descriptions can be stored in remote servers within an IVA ecosystem. If those (as also known as native data) are leaked by attacks,...

10.48550/arxiv.1803.00466 preprint EN other-oa arXiv (Cornell University) 2018-01-01

10.1016/j.fsidi.2022.301499 article EN Forensic Science International Digital Investigation 2022-12-22

10.1007/s11042-010-0704-y article EN Multimedia Tools and Applications 2011-01-18

10.1016/j.fsidi.2019.200897 article EN Forensic Science International Digital Investigation 2020-01-29
Coming Soon ...