Seong-Moo Yoo, Ph.D.


Yoo Seong-Moo_smAssociate Professor
Electrical & Computer Engineering

Office:
Phone:
Fax:
E-mail:

EB 217D
(256) 824-6858
(256) 824-6803
yoos@uah.edu

Personal Homepage


Education




Ph.D.
M.S.
B.A.

     Computer Science, University of Texas at Arlington
     Computer Science, University of Texas at Arlington
     Economics, Seoul National University (Korea)

Biography

Dr. Yoo has published over 100 refereed journal articles and conference proceedings papers in the areas of mobile ad hoc network routing and security, malware detection and analysis, cryptography, and parallel computer architecture. He has graduated seven PhD and nine MS (thesis option). He is a US Fulbright Scholar to Kyrgyzstan in 2015-2016. He was a Summer Research Faculty from the Oak Ridge National Lab in 2005, and was a Fulbright Scholar to Kazakhstan in 2008-2009. He is a senior member of IEEE and a member of ACM and ISSA.

Research Expertise

  • Mobile ad hoc network routing and security

  • Malware detection and analysis

  • Cryptography

  • Information assurance

  • Parallel computer architecture

Honors & Awards

  • Summer Research Faculty from the Oak Ridge National Lab in 2005

  • Fulbright Scholar to Kazakhstan in 2008-2009, and to Kyrgyzstan in 2015-2016

Recent Publications

V. Heydari and S.M. Yoo, “E2EACK: An end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs,” to appear in Springer’s Wireless Networks.

 

J. Gupta, E. Kalaimannan, and S.M. Yoo, “Maximizing investigation effectiveness in digital forensic cases,” A Heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators,” Computers & Operations Research, vol. 69, May 2016, pp. 1-9.

 

V. Heydari and S.M. Yoo, “Lightweight acknowledgement-based method to detect misbehavior in MANETs,” KSII Transactions on Internet and Information Systems, vol. 9, no. 12, Dec. 2015, pp. 5150-5169.

 

V. Heydari and S.M. Yoo, “EACK: End-to-End Acknowledgement-Based Method for Reliable Data Collection in Wireless Sensor Networks,” 2nd International Conference on Information Science and Security (ICISS 2015), Seoul, Korea, Dec. 2015.

V. Heydari and S.M. Yoo, “Moving target defense enhanced by Mobile IPv6,” 7th Annual Southeastern Cyber Security Summit, Huntsville, Alabama, USA, June 2015.

S. Park and S.M. Yoo, “Extended self-reproducible discrete event system specification (DEVS) formalism using hidden inheritance,” Information Sciences, vol. 292, pp. 75, 94, Jan. 2015.

Y. An, S.M. Yoo, C. An, and B.E. Wells, “Rule-based multiple-target tracking in acoustic wireless sensor networks,” Computer Communications, vol. 51, pp. 81, 94, Sep. 2014.

M. Avula, S.G. Lee, and S.M. Yoo, “Security framework for hybrid wireless mesh protocol in wireless mesh networks,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 1982-2004, June 2014.

W.K. Tan, S.G. Lee, J.H. Lam, and S.M. Yoo, ”A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols,” (MPDI) Sensors 13(9), pp. 11553-11585, Sep. 2013.

Y. An, S.M. Yoo, C. An, and B.E. Wells, “Noise Mitigation for Target Tracking in Wireless Acoustic Sensor Networks,” KSII Transactions on Internet and Information Systems, vol. 7, no. 5, pp. 1166-1179, May 2013.

Y. An, S.M. Yoo, C. An, and B.E. Wells, “Doppler effect on target tracking in wireless sensor networks,” Computer Communications, vol. 36, issue 7, pp. 834-848, Apr. 2013.

S. Park and S.M. Yoo, “An efficient reliable one-hop broadcast in mobile ad hoc networks,” Ad Hoc Networks, vol. 11, issue 1, pp. 19-28, Jan. 2013.

J.C. Lee and S.M. Yoo, “Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks,” Computer Communications, vol. 35, issue 17, pp. 2106-2114, Oct. 2012.

F.T. Sheldon, J.M. Weber, S.M. Yoo, and W.D. Pan, “The Insecurity of Wireless Networks,” IEEE Security & Privacy, vol. 10, no. 4, pp. 54-61, July/Aug. 2012.

O. Toutonji, S.M. Yoo, and M. Park, “Stability analysis of VEISV propagation modeling for network worm attack,” Applied Mathematical Modeling, vol. 36, issue 6, June 2012, pp. 2751-2761.

S. Park and S.M. Yoo, “ROB/CN: An Efficient Reliable 1-Hop Broadcast Using CSMA/CN in Mobile Ad Hoc Networks,” IEEE Asia-Pacific Services Computing Conf., Jeju, Korea, pp., Dec. 2011.

J.M. Weber, S.M. Yoo, and W.D. Pan, “Attack Experimentation on IEEE 802.11 WPA Protocols,” Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, Oct. 2011.

C.-H. Park, S.-M. Yoo, and W. D. Pan, “LSM: A Layer Subdivision Method for Deformable Object Matching,” Information Sciences, vol. 180, issue 19, Sep. 2010, pp. 3718-3727.

M. Al-Shurman, S.M. Yoo, B. Kim, and S. Park, “Two Distributive Key Management Schemes in Mobile Ad Hoc Networks,” Intelligent Automation and Soft Computing, vol. 16, no. 4, pp. 591-603, 2010.

M. Al-Shurman, S.-M. Yoo, and S. Park, “Vectorized Broadcast Routing in Mobile Ad Hoc Networks,” Journal of Telecommunications, vol. 3, Issue 1, pp. 7-13, June 2010.

S. Park and S.M. Yoo, “Route Information Update in Mobile Ad Hoc Networks,” International Journal of Computer and Network Security, vol. 2, no. 5, pp. 65-69, May 2010.

S. Park, S.M. Yoo, and F. Qiu, “Route Reutilization Routing in Mobile Ad Hoc Networks,” KSII Transactions on Internet and Information Systems, vol. 4, issue 2, pp. 78-97, April 2010.

J. Fu, H.J. Caulfield, S.M. Yoo, and D. Wu, “Fuzzy Aggregation with Artificial Color Filters”, Information Sciences, vol. 180, issue 1, pp. 167-180, Jan. 2010.

Y. Kanamori, S.M. Yoo, D. A. Gregory, and F.T. Sheldon, "Authentication Protocols Using Quantum Superposition States," International Journal of Network Security, vol. 9, No. 2, pp. 101-108, Sep. 2009.

O. Toutonji and S.M. Yoo, “An Approach against a Computer Worm Attack,” International Journal of Communication Networks and Information Security, vol. 1, no. 2, pp. 48-54, Aug. 2009.

Y. Kanamori and S.M. Yoo, "Quantum Three-Pass Protocol: Key Distribution Using Quantum Superposition States," International Journal of Network Security & Its Applications, vol. 1, no. 2, pp. 64-70, July 2009.

D. Kotturi and S.M. Yoo, “High-Speed Parallel Architecture of the Whirlpool Hash Function,” International Journal of Advanced Science and Technology, vol. 7, pp. 21-26, June 2009.

O. Toutonji and S.M. Yoo, “Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense,” KSII Transactions on Internet and Information Systems, vol. 3, no. 1, pp. 96-107, Feb. 2009.