INVITACIÓN | Bolsa de Trabajo EPN SECURE SOFT CORP
La EPN, conocedora de la calidad de educación profesional impartida en nuestras aulas y consciente del potencial profesional de nuestra comunidad de estudiantes y graduados, busca desde la Dirección de Relaciones Institucionales, impulsar el desarrollo y crecimiento profesional de su comunidad polit...
¡VUELVEN LAS JISIC!
Prepárate para sumergirte en el mundo de la tecnología con el evento organizado por la Facultad de Ingeniería de Sistemas de la EPN.
Estudiantes de la EPN representaron a Latinoamérica en competencia internacional
Kharol Chicaiza, Ivanna Cevallos, Mateo Sarzosa y Fabricio Simbaña, estudiantes de la Facultad de Ingeniería de Sistemas de la Escuela Politécnica Nacional (FIS-EPN) representaron a Latinoamérica en la competencia internacional Cyber 9/12 Strategy Challenge, que se realizó en Washington DC, Estados ...
CALL FOR PAPERS Latin-American Journal of Computing (LAJC)
La Revista Latin American Journal of Computing (LAJC) es una publicación de Acceso Abierto Diamante revisada por pares doble ciego, auspiciada por la Facultad de Ingeniería de Sistemas de la Escuela Politécnica Nacional de Ecuador, una de las mejores universidades de investigación en Ciencias de la ...
loading...
loading...
loading...
Yoo Park Sang Guun
Departamento de Informática y Ciencias de la Computación
Esta dirección de correo electrónico está siendo protegida contra los robots de spam. Necesita tener JavaScript habilitado para poder verlo.
Oficina: 202
Ext: 4708
iD orcid.org/0000-0003-1376-3843
Estudios
  1. Ingeniero en Sistemas e Informática en la Escuela Politécnica del Ejército
  2. M.S. In Computer Science and Engineering en Sogang University
  3. Doctor en Ciencias e Ingeniería de la Computación en Sogang University
Líneas de investigación
  1. DICC-A2-L1 Computación Aplicada a las Comunicaciones y Seguridades
  2. DICC-A2-L2 Seguridad y Privacidad
Publicaciones
  1. Almeida, L., Fernández, B., Zambrano, D., Almachi, A., Pillajo, H., & Yoo, S. (2023). A Complete One-Time Passwords (OTP) Solution Using Microservices: A Theoretical and Practical Approach. 68-86. Obtenido de https://link.springer.com/chapter/10.1007/978-3-031-40852-6_4
  2. Erazo, M., Cocha Tobanda, E., & Yoo, S. (2023). Development of a System for Controlling IoT Devices Using Gaze Tracking. ICoISS: International Conference on Intelligent Sustainable Systems, 157-171. Obtenido de https://link.springer.com/chapter/10.1007/978-981-99-1726-6_12
  3. Moreno, M., Sang, G., & Aguilar, W. (2023). VARVO: a Novel Method for the Fast Detection of Vehicle Crash Events from Video Only Data. Revista Politécnica, 25-34. doi:https://doi.org/10.33333/rp.vol52n1.03
  4. Cocha Toabanda, E., Erazo, M., & Yoo, S. (2022). Gaze Tracking: A Survey of Devices, Libraries and Applications. MDIS: International Conference on Modelling and Development of Intelligent Systems, 18-41. Obtenido de https://link.springer.com/chapter/10.1007/978-3-031-27034-5_2
  5. Andrade, R. O., Yoo, S. G., Tello-Oquendo, L., & Ortiz-Garces, I. (2020). A Comprehensive Study of the IoT Cybersecurity in Smart Cities. IEEE Access. https://doi.org/10.1109/ACCESS.2020.3046442
  6. Raura, G., Fonseca C, E. R., & Yoo, S. G. (2020). Smart Battery Charge: A Fiware Open Source Platform and Microcontroller Based IOT Application. Communications in Computer and Information Science, 1195 CCIS, 270–281. https://doi.org/10.1007/978-3-030-42531-9_22
  7. Bravo Ramos, M. J., & Yoo, S. G. (2020). Developing an Information Security Management System for Libraries Based on an Improved Risk Analysis Methodology Compatible with ISO/IEC 27001. Advances in Intelligent Systems and Computing, 1067, 371–379. https://doi.org/10.1007/978-3-030-32033-1_34
  8. Mazón Quinde, I. K., Guun Yoo, S., Arroyo, R., & Raura, G. (2020). Architecture for Demand Prediction for Production Optimization: A Case Study. Advances in Intelligent Systems and Computing, 1066, 1–11. https://doi.org/10.1007/978-3-030-32022-5_1
  9. Andrade, R. O., Yoo, S. G., & Barriga A, J. J. (2019). Methodology for designing aal-iot solutions for older adults. Multi Conference on Computer Science and Information Systems, MCCSIS 2019 - Proceedings of the International Conference on e-Health 2019, 230–234. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85073171992&partnerID=40&md5=1c1943c6a8e6530208c6b47494351cba
  10. Andrade, R. O., Yoo, S. G., & Cazares, M. F. (2019). A comprehensive study of IOT for Alzheimer’s disease. Multi Conference on Computer Science and Information Systems, MCCSIS 2019 - Proceedings of the International Conference on e-Health 2019, 175–182. https://doi.org/10.33965/eh2019_201910l021
  11. Barriga A, J. J., Yoo, S. G., & Polo, J. C. (2019). Enhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11605 LNCS, 143–155. https://doi.org/10.1007/978-3-030-29729-9_8
  12. Andrade, R. O., & Yoo, S. G. (2019). Cognitive security: A comprehensive study of cognitive science in cybersecurity. Journal of Information Security and Applications, 48. https://doi.org/10.1016/j.jisa.2019.06.008
  13. Andrade, R. O., & Yoo, S. G. (2019). A comprehensive study of the use of LoRa in the development of smart cities. Applied Sciences (Switzerland), 9(22). https://doi.org/10.3390/app9224753
  14. Tituana, J.-C., Lopez, C.-P., & Guun Yoo, S. (2019). Method for the automated generation of a forest non forest map with LANDSAT 8 imagery by using artificial neural networks and the iTituana, J.-C., Lopez, C.-P., & Guun Yoo, S. (2019). Method for the automated generation of a forest non forest map with LAN. Communications in Computer and Information Science, 895, 542–552. https://doi.org/10.1007/978-3-030-05532-5_41
  15. Barriga A, J. J., & Yoo, S. G. (2018). Security over smart home automation systems: A survey. Smart Innovation, Systems and Technologies, 94, 87–96. https://doi.org/10.1007/978-3-319-78605-6_7
  16. Patiño, S., & Yoo, S. G. (2018). Study of the maturity of information security in public organizations of Ecuador. Communications in Computer and Information Science, 883, 99–109. https://doi.org/10.1007/978-3-030-00940-3_8
  17. Martínez Santander, C., Yoo, S. G., & Moreno, H. O. (2018). Analysis of traditional web security solutions and proposal of a web attacks cognitive patterns classifier architecture. Communications in Computer and Information Science, 883, 186–198. https://doi.org/10.1007/978-3-030-00940-3_14
  18. Macias, J. M., & Yoo, S. G. (2018). Development of a timestamping web application for the electronic factoring process in Ecuador. Journal of Theoretical and Applied Information Technology, 96(1), 258–269. https://www.scopus.com/inward/record.uri?eid=2-s2.085041090071&partnerID=40&md5=7369585fc6168253b46ecc924918ce2d
  19. Patino, S., Solis, E. F., Yoo, S. G., & Arroyo, R. (2018). ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005. 2018 5th International Conference on EDemocracy and EGovernment, ICEDEG 2018, 75–82. https://doi.org/10.1109/ICEDEG.2018.8372361
  20. Tello, I., Ruiz, C., & Yoo, S. G. (2018). Analysis of COBIT 5 Process “DSS02 - Manage Service Requests and Incidents” for the Service Desk Using Process Mining. 2018 5th International Conference on EDemocracy and EGovernment, ICEDEG 2018, 304–310. https://doi.org/10.1109/ICEDEG.2018.8372335
  21. Villota, E. J., & Yoo, S. G. (2018). An Experiment of Influences of Facebook Posts in Other Users. 2018 5th International Conference on EDemocracy and EGovernment, ICEDEG 2018, 83–88. https://doi.org/10.1109/ICEDEG.2018.8372319
  22. Villota, E. J., & Yoo, S. G. (2018). Detection of altered states of consciousness on facebook users. Journal of Theoretical and Applied Information Technology, 96(13), 4295–4305. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050123944&partnerID=40&md5=cdbb3ed23ec9ba88a7345bb5a1683776
  23. Yoo, S. G., & Myriam, H.-Á. (2018). Predicting residential electricity consumption using neural networks: A case study. Journal of Physics: Conference Series, 1072(1). https://doi.org/10.1088/1742-6596/1072/1/012005
  24. Guamán, S., Tapia, F., Yoo, S. G., Calvopiña, A., & Orta, P. (2018). Device control system for a smart home using voice commands: A practical case. ACM International Conference Proceeding Series, 86–89. https://doi.org/10.1145/3285957.3285977
  25. Ramos, R. C. B., Villagran, N. V, Yoo, S. G., & Quina, G. N. (2018). Software Quality Assessment Applied for the Governmental Organizations using ISO/IEC 25000. 2018 5th International Conference on EDemocracy and EGovernment, ICEDEG 2018, 311–316. https://doi.org/10.1109/ICEDEG.2018.8372327
  26. Torres P., E. P., & Yoo, S. G. (2017). Detecting and neutralizing encrypting Ransomware attacks by using machine-learning techniques: A literature review. International Journal of Applied Engineering Research, 12(18), 7902–7911. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85036591619&partnerID=40&md5=5e0005e3f5ec055dc41c67321249f759
  27. Suárez, F. G., Caiza, G. Ñ., & Yoo, S. G. (2017). Stock management system using RFID and geolocation technologies. International Journal of Applied Engineering Research, 12(24), 14314–14321. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85041019482&partnerID=40&md5=65929fc9179d156c85c3af02f027215c
  28. Barriga, J. J. A., & Yoo, S. G. (2017). Malware detection and evasion with machine learning techniques: A survey. International Journal of Applied Engineering Research, 12(18), 7207–7214. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85036655096&partnerID=40&md5=7fbdb8ef8f9363a2326f79fe560a7375
  29. Vega, R. G., Arroyo, R., & Yoo, S. G. (2017). Experience in applying the analysis and risk management methodology called MAGERIT to identify threats and vulnerabilities in an Agro-Industrial Company. International Journal of Applied Engineering Research, 12(17), 6741–6750. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85036569219&partnerID=40&md5=269b076bc7ddab6c324484c67310e8b5
  30. Ruiz, C., Tello, I., & Yoo, S. G. (2017). Improvement of the triage process using process automatization and machine learning. International Journal of Applied Engineering Research, 12(15), 4989–4999. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028312059&partnerID=40&md5=3c4ac9d0747d34d236a4e138db3e6733
  31. Campaña, X., Arroyo, R., & Yoo, S. G. (2017). Experience in applying data mining techniques to musical content database to identify personality traits. International Journal of Applied Engineering Research, 12(12), 3298–3304. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85023759817&partnerID=40&md5=479ba7de52c8fdd2a29daad445846ff7
  32. Yoo, S. G., & Barriga, J. J. (2017). Privacy-aware authentication for wi-fi based indoor positioning systems. Communications in Computer and Information Science, 719, 201–213. https://doi.org/10.1007/978-981-10-5421-1_17
  33. Yoo, S. G., Vaca, H. P., & Kim, J. (2017). Enhanced misuse cases for prioritization of security requirements. ACM International Conference Proceeding Series, 1–10. https://doi.org/10.1145/3149572.3149580
  34. Yoo, S. G. (2017). 5G-VRSec: Secure video reporting service in 5G enabled vehicular networks. Wireless Communications and Mobile Computing, 2017. https://doi.org/10.1155/2017/7256307

(+593) 2 2976 300 ext 4701
info@epn.edu.ec
Av. Ladrón de Guevara 253, Quito 170517

Back to top