All
Title
Author
Keyword
Date
All
Communities
Authors
Journal
Browsing "Department of Cyber Security" by Title :
All
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
전체
가
나
다
라
마
바
사
아
자
차
카
타
파
하
All
가
나
다
라
마
바
사
아
자
차
카
타
파
하
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 1 to 20 of 92
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects
oa mark
Aslam, Muhammad Muzamil;
Tufail, Ali;
Kim, Ki Hyung
;
Apong, Rosyzie Anna Awg Haji Mohd;
Raza, Muhammad Taqi
2023-09-01
Sensors, Vol.23
Multidisciplinary Digital Publishing Institute (MDPI)
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection
oa mark
Dunmore, Aeryn;
Jang-Jaccard, Julian;
Sabrina, Fariza;
Kwak, Jin
2023-01-01
IEEE Access, Vol.11, pp.76071-76094
Institute of Electrical and Electronics Engineers Inc.
A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks
oa mark
Oh, Sukho;
Hwang, Dong Yeop;
Kim, Kangseok
;
Kim, Ki Hyung
2018-04-01
International Journal of Distributed Sensor Networks, Vol.14
SAGE Publications Ltd
A real-time fall detection system based on the acceleration sensor of smartphone
oa mark
Lee, Youngmin;
Yeh, Hongjin
;
Kim, Ki Hyung
;
Choi, Okkyung
2018-01-01
International Journal of Engineering Business Management, Vol.10
SAGE Publications Inc.
A study on analysis of malicious code behavior information for predicting security threats in new environments
oa mark
Choi, Seul Ki;
Lee, Taejin;
Kwak, Jin
2019-03-31
KSII Transactions on Internet and Information Systems, Vol.13, pp.1611-1625
Korean Society for Internet Information
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
Jeong, Jae Han;
Kwon, Sungmoon;
Hong, Man Pyo;
Kwak, Jin
;
Shon, Taeshik
2020-06-01
Multimedia Tools and Applications, Vol.79, pp.16077-16091
Springer
AI-enabled device digital forensics for smart cities
Kim, Sungbum;
Jo, Wooyeon;
Lee, Jino;
Shon, Taeshik
2022-02-01
Journal of Supercomputing, Vol.78, pp.3029-3044
Springer
An anonymous device to device authentication protocol using ecc and self certified public keys usable in internet of things based autonomous devices
oa mark
Alzahrani, Bander A.;
Chaudhry, Shehzad Ashraf;
Barnawi, Ahmed;
Al-Barakati, Abdullah;
Shon, Taeshik
2020-03-01
Electronics (Switzerland), Vol.9
MDPI AG
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDS
oa mark
Kim, Kangseok
2024-02-29
KSII Transactions on Internet and Information Systems, Vol.18, pp.494-510
Korean Society for Internet Information
An Efficient Domain-Adaptation Method using GAN for Fraud Detection
oa mark
Hwang, Jeonghyun;
Kim, Kangseok
2020-01-01
International Journal of Advanced Computer Science and Applications, Vol.11, pp.94-103
Science and Information Organization
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
Chaudhry, Shehzad Ashraf;
Naqvi, Husnain;
Farash, Mohammad Sabzinejad;
Shon, Taeshik
;
Sher, Muhammad
2018-08-01
Journal of Supercomputing, Vol.74, pp.3504-3520
Springer New York LLC
An improved anonymous authentication scheme for distributed mobile cloud computing services
Chaudhry, Shehzad Ashraf;
Kim, I. Luk;
Rho, Seungmin;
Farash, Mohammad Sabzinejad;
Shon, Taeshik
2019-01-16
Cluster Computing, Vol.22, pp.1595-1609
Springer New York LLC
Analysis of real-time blockchain considering service level agreement (SLA)
oa mark
Kim, Minkyung
;
Kim, Kangseok
;
Kim, Jai Hoon
2021-01-01
Advances in Science, Technology and Engineering Systems, Vol.6, pp.218-223
ASTES Publishers
APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE
Kim, Sung Jin;
Jo, Woo Yeon;
Shon, Taeshik
2020-03-01
Applied Soft Computing Journal, Vol.88
Elsevier Ltd
Automated detection technique for suspected copyright infringement sites
oa mark
Jeong, Hae Seon;
Kwak, Jin
2020-12-31
KSII Transactions on Internet and Information Systems, Vol.14, pp.4889-4908
Korean Society for Internet Information
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient
oa mark
Lee, Taejin;
Choi, Bomin;
Shin, Youngsang;
Kwak, Jin
2018-08-01
Journal of Supercomputing, Vol.74, pp.3489-3503
Springer New York LLC
Automatic whitelist generation system for ethernet based in-vehicle network
Jo, Wooyeon;
Kim, Sung Jin;
Kim, Hyunjin;
Shin, Yeonghun;
Shon, Taeshik
2022-11-01
Computers in Industry, Vol.142
Elsevier B.V.
Black Money Usage Tracker Mechanism Based on Hyperledger Fabric
Abdukodirov, Farkhod;
Kim, Ki Hyung
2020-06-01
Journal of Korean Institute of Communications and Information Sciences, Vol.45, pp.1072-1082
Korean Institute of Communications and Information Sciences
Blended threat prediction based on knowledge graph embedding in the IoBE
oa mark
Lee, Minkyung;
Kim, Deuk Hun;
Jang-Jaccard, Julian;
Kwak, Jin
2023-10-01
ICT Express, Vol.9, pp.903-908
Korean Institute of Communications and Information Sciences
CEnsLoc: Infrastructure-Less Indoor Localization Methodology Using GMM Clustering-Based Classification Ensembles
oa mark
Akram, Beenish Ayesha;
Akbar, Ali Hammad;
Kim, Ki Hyung
2018-01-01
Mobile Information Systems, Vol.2018
Hindawi Limited
1
2
3
4
5