Ajou University repository

Browsing "Department of Cyber Security" by Title :

All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
전체
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 1 to 20 of 92

A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospectsoa mark
  • Aslam, Muhammad Muzamil;
  • Tufail, Ali;
  • Kim, Ki Hyung;
  • Apong, Rosyzie Anna Awg Haji Mohd;
  • Raza, Muhammad Taqi
  • 2023-09-01
  • Sensors, Vol.23
  • Multidisciplinary Digital Publishing Institute (MDPI)
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detectionoa mark
  • Dunmore, Aeryn;
  • Jang-Jaccard, Julian;
  • Sabrina, Fariza;
  • Kwak, Jin
  • 2023-01-01
  • IEEE Access, Vol.11, pp.76071-76094
  • Institute of Electrical and Electronics Engineers Inc.
A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networksoa mark
  • 2018-04-01
  • International Journal of Distributed Sensor Networks, Vol.14
  • SAGE Publications Ltd
A real-time fall detection system based on the acceleration sensor of smartphoneoa mark
  • 2018-01-01
  • International Journal of Engineering Business Management, Vol.10
  • SAGE Publications Inc.
A study on analysis of malicious code behavior information for predicting security threats in new environmentsoa mark
  • 2019-03-31
  • KSII Transactions on Internet and Information Systems, Vol.13, pp.1611-1625
  • Korean Society for Internet Information
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
  • 2020-06-01
  • Multimedia Tools and Applications, Vol.79, pp.16077-16091
  • Springer
AI-enabled device digital forensics for smart cities
  • 2022-02-01
  • Journal of Supercomputing, Vol.78, pp.3029-3044
  • Springer
An anonymous device to device authentication protocol using ecc and self certified public keys usable in internet of things based autonomous devicesoa mark
  • Alzahrani, Bander A.;
  • Chaudhry, Shehzad Ashraf;
  • Barnawi, Ahmed;
  • Al-Barakati, Abdullah;
  • Shon, Taeshik
  • 2020-03-01
  • Electronics (Switzerland), Vol.9
  • MDPI AG
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDSoa mark
  • 2024-02-29
  • KSII Transactions on Internet and Information Systems, Vol.18, pp.494-510
  • Korean Society for Internet Information
An Efficient Domain-Adaptation Method using GAN for Fraud Detectionoa mark
  • 2020-01-01
  • International Journal of Advanced Computer Science and Applications, Vol.11, pp.94-103
  • Science and Information Organization
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
  • Chaudhry, Shehzad Ashraf;
  • Naqvi, Husnain;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik;
  • Sher, Muhammad
  • 2018-08-01
  • Journal of Supercomputing, Vol.74, pp.3504-3520
  • Springer New York LLC
An improved anonymous authentication scheme for distributed mobile cloud computing services
  • Chaudhry, Shehzad Ashraf;
  • Kim, I. Luk;
  • Rho, Seungmin;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik
  • 2019-01-16
  • Cluster Computing, Vol.22, pp.1595-1609
  • Springer New York LLC
Analysis of real-time blockchain considering service level agreement (SLA)oa mark
  • 2021-01-01
  • Advances in Science, Technology and Engineering Systems, Vol.6, pp.218-223
  • ASTES Publishers
APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE
  • 2020-03-01
  • Applied Soft Computing Journal, Vol.88
  • Elsevier Ltd
Automated detection technique for suspected copyright infringement sitesoa mark
  • 2020-12-31
  • KSII Transactions on Internet and Information Systems, Vol.14, pp.4889-4908
  • Korean Society for Internet Information
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficientoa mark
  • Lee, Taejin;
  • Choi, Bomin;
  • Shin, Youngsang;
  • Kwak, Jin
  • 2018-08-01
  • Journal of Supercomputing, Vol.74, pp.3489-3503
  • Springer New York LLC
Automatic whitelist generation system for ethernet based in-vehicle network
  • Jo, Wooyeon;
  • Kim, Sung Jin;
  • Kim, Hyunjin;
  • Shin, Yeonghun;
  • Shon, Taeshik
  • 2022-11-01
  • Computers in Industry, Vol.142
  • Elsevier B.V.
Black Money Usage Tracker Mechanism Based on Hyperledger Fabric
  • 2020-06-01
  • Journal of Korean Institute of Communications and Information Sciences, Vol.45, pp.1072-1082
  • Korean Institute of Communications and Information Sciences
Blended threat prediction based on knowledge graph embedding in the IoBEoa mark
  • Lee, Minkyung;
  • Kim, Deuk Hun;
  • Jang-Jaccard, Julian;
  • Kwak, Jin
  • 2023-10-01
  • ICT Express, Vol.9, pp.903-908
  • Korean Institute of Communications and Information Sciences
CEnsLoc: Infrastructure-Less Indoor Localization Methodology Using GMM Clustering-Based Classification Ensemblesoa mark
  • 2018-01-01
  • Mobile Information Systems, Vol.2018
  • Hindawi Limited
1 2 3 4 5