H. Joh, Introductions to Cloud Computing, WELab Media, 2021
H. Joh, "Team Versus Individual Projects in Introductory Programming: Effects on Performance, Variability, and Retention," IEEE Access, vol. 13, pp. 212760-212772, 2025
Y. Seol, B. Kang, H. Jeon and H. Joh, "Designing a Border Gateway Protocol Player and Reviewing Machine Learning Technology ," European Journal of Electrical Engineering and Computer Science , Vol 7(2), pp. 28-33, Mar. 2023
H. Joh and J. Lee, "Modeling Vulnerability Discovery Process in Major Cryptocurrencies," Journal of Multimedia Information System, 9(3), pp.191-200, Sep. 2022
H. Joh and J. Lee, "Empirical Risk Assessment in Major Graphic Design Software Systems," Journal of Multimedia Information System, 8(4), pp.259-266, Dec. 2021
H. Joh, "Seasonality and Software vulnerabilities in major database management systems," European Journal of Engineering Research and Science, vol 5(12), pp.76-80, Dec. 2020
H. Joh, "Software Risk Assessment for Windows Operating Systems with respect to CVSS," European Journal of Engineering Research and Science, vol 4(11), pp.41-45, Nov. 2019
H. Joh and J. Lee, "Necessity of General-Purpose Operating Systems for Wearable Computing Environments," European Journal of Engineering Research and Science, vol 4(9), pp.29-36, Sep. 2019
H. Joh, "Conditional risk assessment based on software vulnerability with cvss," International Journal of Latest Trends in Engineering and Technology, 10(3), pp.102-111, May 2018
H. Joh, "Extended linear vulnerability discovery process," Journal of Multimedia Information System, 4(2), pp.57-64, Jun. 2017
H. Joh and Y.K. Malaiya, "Periodicity in Software Vulnerability Discovery, Patching and Exploitation",International Journal of Information Security, Vol.16(6), pp.673-690, Jul. 2016
H. Joh, "Modeling Software Risk Assessment Based on Multi-Vulnerability Lifecycle," International Review on Computers and Software (I.RE.CO.S.), Vol 11(2), ISSN 1828-6003, pp.116-122, Feb. 2016
H. Joh, "Quantitative Risk Assessment In Moodle Learning Management System," International Journal of Software Engineering and Its Applications, Vol. 9, Issue 8, pp. 253-262, Aug. 2015
H. Joh, "Assessing Web Browser Security Vulnerabilities with respect to CVSS," Journal of Korea Multimedia Society, Vol. 18, Issue 2, pp. 199-206, Feb. 2015
H. Joh, "Quantitative Risk Assessment in Major Smart Phone Operating Systems in Asian Countries," Journal of Korea Multimedia Society, Vol. 17, Issue 12, pp. 1494-1502, Dec. 2014
H. Joh and Y. K. Malaiya, "Modeling skewness in vulnerability discovery," Quality and Reliability Engineering International, Vol. 30, Issue 8, pp. 1445–1459, Sep. 2013
H. Joh, "Modeling Security Vulnerabilities in Learning Management Systems," International Journal of Learning Management Systems, Vol 1(2), Jul. 2013
S.-W. Woo, H. Joh, O. H. Alhazmi and Y. K. Malaiya, "Modeling Vulnerability Discovery Process in Apache and IIS HTTP Servers," Computers & Security, Vol 30(1), pp. 50-62, Jan. 2011
S. Cha and H. Joh, "Analysis of the Impact of GPU Architecture on the Reproducibility of Generative AI Models: Focusing on SDXL LoRA Fine-tuning," Proceedings of the 38th Workshop on Image Processing and Image Understanding (IPIU 2026), P1-033, Jeju Korea, Feb. 4-6, 2026
H. Joh, "Quantitative Security Analysis of Network OSes by Fitting VDM and Examining CVSS," The 32nd International Conference on Information Networking, Chiang Mai Thailand, pp.565-570, Jan. 10-12, 2018
G. Oh and H. Joh, "Applying AML Vulnerability Discovery Model into Exploit Database," Proceedings of 2017 KIISE Symposium, Ubiquitous Computing and Web Information Technology, Daegu University, ISSN.1976-5398, pp.85-86, Nov. 17, 2017
S. Lee and H. Joh, "Automatic data extraction system for quantitative software vulnerability research," Proceedings of 2017 KIISE Symposium, Ubiquitous Computing and Web Information Technology, Daegu University, ISSN.1976-5398, pp.87-88, Nov. 17, 2017
H. Joh, "Vulnerability Discovery Process in major DBMS:Fitting VDM and Examining Seasonality," The 13th International Conference on Multimedia Information Technology and Applications, Multimedia Univ. Malaysia, pp.22-25, Jul. 10, 2017
H. Joh, "Organization-wide risk assessment based on multi-vulnerability lifecycle," The 2017 Summer Conference of the institute of electronics and information engineers, HaeUnDae BuSan, pp.1260-1261, Jun. 30, 2017
H. Joh, "Actors on Software vulnerability Ecosystem," The 2017 Spring Conference of The Korea Multimedia society, Hanbat National University, pp.785-786, May. 27, 2017
G. Oh and H. Joh, "Factors affecting domestic industry of information security," The 2017 Spring Conference of The Korea Multimedia society, Hanbat National University, pp.934-935, May. 27, 2017
S. Lee and H. Joh, "A study on the major web browsers' characteristics based on their market shares," Proceedings of 2016 KIISE Symposium, Ubiquitous Computing and Web Information Technology, Kyungnam University, ISSN.1976-5398, pp.121-122, Nov. 18, 2016
Y. Kim and H. Joh, "A study about ICT risk assessment among organizations," Proceedings of 2016 KIISE Symposium, Ubiquitous Computing and Web Information Technology, Kyungnam University, ISSN.1976-5398, pp.193-195, Nov. 18, 2016
S. Jeong and H. Joh, "Research on Game Security Technology," the 2nd International Conference on Emerging Trends in Multidisciplinary Research (ETMR August 02-03, 2016), Bangkok, Thailand, ETMR-16-224
D. Kim and H. Joh, "Vulnerability Insertion Technique for Stack Overflow Detections," the 2nd International Conference on Emerging Trends in Multidisciplinary Research (ETMR August 02-03, 2016), Bangkok, Thailand, ETMR-16-225
S. Jeong and H. Joh, "Security differences between Online and PC games and their countermeasures for vulnerabilities," Fall 2016 publication & presentation, Korea Multimedia Society, Seoul Women's Univ., vol.19(1), pp.1266-1269, May 27-28, 2016
D. Kim and H. Joh, "Stack overflow vulnerability detection techniques using a binary code of vulnerable libraries," Fall 2016 publication & presentation, Korea Multimedia Society, Seoul Women's Univ., vol.19(1), pp.1262-1265, May 27-28, 2016
H.Joh, "Measuring Software Risk Based on Multi-Vulnerability Lifecycle," the 4th International Conference on Smart Media and Applications, pp.279-282, Danag Vietnam, Jan 10-13, 2016
D. Kim and H. Joh, "Stack overflow vulnerability search scheme using binary code," 2015 KIISE Symposium, Ubiquitous Computing and Web Information Technology, Internet of Things and Big Data, Kumoh National Institute of Technology, pp.101-102, Nov. 6, 2015
S. Jeong and H. Joh, "Modeling quantitative risk measurement of online game security system," 2015 KIISE Symposium, Ubiquitous Computing and Web Information Technology, Internet of Things and Big Data, Kumoh National Institute of Technology, pp.35-36, Nov. 6, 2015
H. Joh, "Web browser secureness with respect to CVSS," the 2014 Fall Conference of KIPS, Vol 21, Issue 2, pp. 464-465, 2014
H. Joh and Y. K. Malaiya, "Defining and Assessing Quantitative Security Risk Measures Using Vulnerability Lifecycle and CVSS Metrics," sam’11, The 2011 International Conference on Security and Management, pp. 10-16, 2011
A. A. Younis, H. Joh, and Y. K. Malaiya, "Modeling Learningless Vulnerability Discovery using a Folded Distribution," sam’11, The 2011 International Conference on Security and Management, pp. 617-623, 2011
H. Joh and Y. K. Malaiya, "A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics," rtee, pp.430-434, Proc. 2010 International Workshop on Risk and Trust in Extended Enterprises, 2010
H. Joh and Y. K. Malaiya, "Modeling Skewness in Data with S-shaped Vulnerability Discovery Models," issre, pp.406-407, 2010 21th International Symposium on Software Reliability Engineering, 2010
H. Joh, S. Chaichana and Y. K. Malaiya, "Short-term Periodicity in Security Vulnerability Activity," issre, pp.408-409, 2010 21th International Symposium on Software Reliability Engineering, 2010
H. Joh, Y. K. Malaiya, "Seasonal Variation in the Vulnerability Discovery Process," icst, pp.191-200, 2009 International Conference on Software Testing Verification and Validation, 2009
H. Joh, J. Kim, Y. K. Malaiya, "Vulnerability Discovery Modeling Using Weibull Distribution," issre, pp.299-300, 2008 19th International Symposium on Software Reliability Engineering, 2008
H. Joh, Y. K. Malaiya, "Seasonality in Vulnerability Discovery in Major Software Systems," issre, pp.297-298, 2008 19th International Symposium on Software Reliability Engineering, 2008
H. Joh, "Quantitative analyses of software vulnerabilities," Ph.D. Dissertation, Dept. of Computer Science, Colorado State Univ., Dec. 2011 (advisor: Dr. Malaiya, Yashwant)
H. Joh, "Digital content protection in view of UCON model," M.S. Thesis, Dept. of Computer Science, Colorado State Univ., Dec. 2007 (advisor: Dr. Ray, Indrajit)
H. Joh, "Performance analysis in DiffServ model to provide QoS," B.E. Thesis, Dept. of Info. Communication Eng., HUFS, Dec. 2005 (advisor: Dr. Jeong, Seong-Ho)