Jongsub Moon

1.4k total citations
60 papers, 841 citations indexed

About

Jongsub Moon is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Jongsub Moon has authored 60 papers receiving a total of 841 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Computer Networks and Communications, 20 papers in Artificial Intelligence and 18 papers in Information Systems. Recurrent topics in Jongsub Moon's work include Network Security and Intrusion Detection (13 papers), Advanced Malware Detection Techniques (12 papers) and Anomaly Detection Techniques and Applications (8 papers). Jongsub Moon is often cited by papers focused on Network Security and Intrusion Detection (13 papers), Advanced Malware Detection Techniques (12 papers) and Anomaly Detection Techniques and Applications (8 papers). Jongsub Moon collaborates with scholars based in South Korea, United States and Japan. Jongsub Moon's co-authors include Taeshik Shon, Yongdae Kim, Sang-Soo Yeo, Chil Hwan Oh, Dongjun Kim, Il Hwan Kim, Ken Choi, Sang Yong Park, Min‐Ki Kim and Seong‐Whan Lee and has published in prestigious journals such as IEEE Access, Sensors and Pattern Recognition.

In The Last Decade

Jongsub Moon

49 papers receiving 768 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jongsub Moon South Korea 11 502 474 296 247 52 60 841
Ming‐Yang Su Taiwan 15 850 1.7× 524 1.1× 330 1.1× 183 0.7× 58 1.1× 52 1.1k
Muhammad Ahsan Raza Pakistan 13 195 0.4× 272 0.6× 98 0.3× 102 0.4× 34 0.7× 45 573
Mukesh A. Zaveri India 14 213 0.4× 440 0.9× 138 0.5× 163 0.7× 56 1.1× 148 1.1k
Haiping Zhou China 11 301 0.6× 224 0.5× 101 0.3× 128 0.5× 47 0.9× 21 608
Shen Ge China 15 170 0.3× 673 1.4× 192 0.6× 70 0.3× 12 0.2× 26 974
Hüseyin Şeker United Kingdom 14 73 0.1× 339 0.7× 47 0.2× 46 0.2× 44 0.8× 106 880
Mohan Li China 11 234 0.5× 299 0.6× 141 0.5× 257 1.0× 45 0.9× 86 783
Halil Murat Ünver Türkiye 13 211 0.4× 379 0.8× 207 0.7× 101 0.4× 6 0.1× 35 934
Qiang Zeng United States 14 197 0.4× 224 0.5× 265 0.9× 245 1.0× 21 0.4× 55 542

Countries citing papers authored by Jongsub Moon

Since Specialization
Citations

This map shows the geographic impact of Jongsub Moon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jongsub Moon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jongsub Moon more than expected).

Fields of papers citing papers by Jongsub Moon

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jongsub Moon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jongsub Moon. The network helps show where Jongsub Moon may publish in the future.

Co-authorship network of co-authors of Jongsub Moon

This figure shows the co-authorship network connecting the top 25 collaborators of Jongsub Moon. A scholar is included among the top collaborators of Jongsub Moon based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jongsub Moon. Jongsub Moon is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Moon, Jongsub, et al.. (2023). A Malware Detection and Extraction Method for the Related Information Using the ViT Attention Mechanism on Android Operating System. Applied Sciences. 13(11). 6839–6839. 12 indexed citations
2.
Moon, Jongsub, et al.. (2021). Sleep Deprivation Attack Detection Based on Clustering in Wireless Sensor Network. Information Security and Cryptology. 31(1). 83–97. 1 indexed citations
3.
Moon, Jongsub, et al.. (2020). A Method of Detection of Deepfake Using Bidirectional Convolutional LSTM. Information Security and Cryptology. 30(6). 1053–1065. 1 indexed citations
4.
Cho, Heechan & Jongsub Moon. (2019). A layered-wise data augmenting algorithm for small sampling data. Journal of Internet Computing and services. 20(6). 65–72. 2 indexed citations
5.
Seo, Junho & Jongsub Moon. (2017). Analysis and Countermeasure for BadUSB Vulnerability. 12(6). 359–368. 1 indexed citations
6.
Lee, Chan‐Woo, et al.. (2013). Proposal of Security Requirements based on Layers and Roles for the Standardization of Cloud Computing Security Technology. 10(4). 473–488. 2 indexed citations
7.
Shon, Taeshik, et al.. (2012). Malicious Code Detection using the Effective Preprocessing Method Based on Native API. Information Security and Cryptology. 22(4). 785–796. 1 indexed citations
8.
Shon, Taeshik, et al.. (2012). A Method for Detecting Unauthorized Access Point over 3G Network. Information Security and Cryptology. 22(2). 259–266. 2 indexed citations
9.
Shon, Taeshik, et al.. (2012). Efficient and Secure User Authentication and SDP Encryption Method in SIP. Information Security and Cryptology. 22(3). 463–472. 1 indexed citations
10.
Moon, Jongsub, et al.. (2011). A Study on Minimizing Infection of Web-based Malware through Distributed & Dynamic Detection Method of Malicious Websites. Information Security and Cryptology. 21(3). 89–100. 2 indexed citations
11.
Lim, Soo-min, et al.. (2011). A photographic forensic case study: Myths, principles and techniques. Mathematical and Computer Modelling. 55(1-2). 3–11. 6 indexed citations
12.
Yeo, Sang-Soo, et al.. (2011). A novel method for SQL injection attack detection based on removing SQL query attribute values. Mathematical and Computer Modelling. 55(1-2). 58–68. 89 indexed citations
13.
Kim, Tae‐Hun, et al.. (2010). A Novel Method for Effective Protection of IPTV Contents with One-Time Password and Conditional Access System. Information Security and Cryptology. 20(4). 31–40. 2 indexed citations
14.
Lee, Ho-Sub, et al.. (2008). An Approach to Detect Spam E-mail with Abnormal Character Composition. Information Security and Cryptology. 18(6). 129–137. 1 indexed citations
15.
Seo, Jung Taek, et al.. (2007). A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling. Information Security and Cryptology. 17(5). 73–86. 1 indexed citations
16.
Kang, Taewoo, et al.. (2007). Malware Detection Via Hybrid Analysis for API Calls. Information Security and Cryptology. 17(6). 89–98. 2 indexed citations
17.
Shon, Taeshik, et al.. (2003). Safe Patch Distribution Architecture in Intranet Environments.. Security and Management. 455–460. 3 indexed citations
18.
Park, Sang Yong, Dongjun Kim, Il Hwan Kim, et al.. (2003). Objective assessment of involved surface area in patients with psoriasis. Skin Research and Technology. 9(4). 339–342. 24 indexed citations
19.
Cho, Hyuk, et al.. (2001). Synthesis of GBSB-based Neural Associative Memories Using Evolution Program. Journal of Korean institute of intelligent systems. 11(7). 680–688.
20.
Moon, Jongsub. (1984). The Effect of Frictional Forces on Fatigue Crack Growth in Lugs. Defense Technical Information Center (DTIC). 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026