Ajou University repository

1. Journal Papers92

or browse

Subscribe to this collection to receive daily e-mail notification of new additions

Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
  • Chaudhry, Shehzad Ashraf;
  • Shon, Taeshik;
  • Al-Turjman, Fadi;
  • Alsharif, Mohammed H.
  • 2020-03-01
  • Computer Communications, Vol.153, pp.527-537
  • Elsevier B.V.
An anonymous device to device authentication protocol using ecc and self certified public keys usable in internet of things based autonomous devicesoa mark
  • Alzahrani, Bander A.;
  • Chaudhry, Shehzad Ashraf;
  • Barnawi, Ahmed;
  • Al-Barakati, Abdullah;
  • Shon, Taeshik
  • 2020-03-01
  • Electronics (Switzerland), Vol.9
  • MDPI AG
APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE
  • 2020-03-01
  • Applied Soft Computing Journal, Vol.88
  • Elsevier Ltd
GenomomFF: Cost-Effective Method to Measure Fetal Fraction by Adaptive Multiple Regression Techniques with Optimally Selected Autosomal Chromosome Regionsoa mark
  • 2020-01-01
  • IEEE Access, Vol.8, pp.106880-106888
  • Institute of Electrical and Electronics Engineers Inc.
An Efficient Domain-Adaptation Method using GAN for Fraud Detectionoa mark
  • 2020-01-01
  • International Journal of Advanced Computer Science and Applications, Vol.11, pp.94-103
  • Science and Information Organization
Reducing operational time complexity of k-NN algorithms using clustering in wrist-activity recognitionoa mark
  • 2020-01-01
  • Intelligent Automation and Soft Computing, Vol.26, pp.679-691
  • Tech Science Press
GAN based augmentation for improving anomaly detection accuracy in host-based intrusion detection systems
  • 2020-01-01
  • International Journal of Engineering Research and Technology, Vol.13, pp.3987-3996
  • International Research Publication House
Comparison of anomaly detection accuracy of host-based intrusion detection systems based on different machine learning algorithmsoa mark
  • 2020-01-01
  • International Journal of Advanced Computer Science and Applications, pp.252-259
  • Science and Information Organization
Private key recovery on bitcoin with duplicated signaturesoa mark
  • 2020-01-01
  • KSII Transactions on Internet and Information Systems, Vol.14, pp.1280-1300
  • Korean Society for Internet Information
IEEE 1815.1-Based power system security with bidirectional RNN-Based network anomalous attack detection for cyber-physical systemoa mark
  • 2020-01-01
  • IEEE Access, Vol.8, pp.77572-77586
  • Institute of Electrical and Electronics Engineers Inc.
Fast k-NN based Malware Analysis in a Massive Malware Environmentoa mark
  • 2019-12-31
  • KSII Transactions on Internet and Information Systems, Vol.13, pp.6145-6158
  • Korean Society for Internet Information
Digital Forensic Practices and Methodologies for AI Speaker Ecosystemsoa mark
  • Jo, Wooyeon;
  • Shin, Yeonghun;
  • Kim, Hyungchan;
  • Yoo, Dongkyun;
  • Kim, Donghyun;
  • Kang, Cheulhoon;
  • Jin, Jongmin;
  • Oh, Jungkyung;
  • Na, B.;
  • Shon, Taeshik
  • 2019-07-01
  • Digital Investigation, Vol.29, pp.S80-S93
  • Elsevier Ltd
On-line shared platform evaluation framework for advanced persistent threatsoa mark
  • 2019-05-31
  • KSII Transactions on Internet and Information Systems, Vol.13, pp.2610-2628
  • Korean Society for Internet Information
A study on analysis of malicious code behavior information for predicting security threats in new environmentsoa mark
  • 2019-03-31
  • KSII Transactions on Internet and Information Systems, Vol.13, pp.1611-1625
  • Korean Society for Internet Information
Visualization for internet of things: power system and financial network cases
  • 2019-02-01
  • Multimedia Tools and Applications, Vol.78, pp.3241-3265
  • Springer New York LLC
An improved anonymous authentication scheme for distributed mobile cloud computing services
  • Chaudhry, Shehzad Ashraf;
  • Kim, I. Luk;
  • Rho, Seungmin;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik
  • 2019-01-16
  • Cluster Computing, Vol.22, pp.1595-1609
  • Springer New York LLC
Toward security enhanced provisioning in industrial IoT systemsoa mark
  • 2018-12-01
  • Sensors (Switzerland), Vol.18
  • MDPI AG
Design and implementation of cybersecurity testbed for industrial IoT systems
  • Lee, Seokcheol;
  • Lee, Seokjun;
  • Yoo, Hyunguk;
  • Kwon, Sungmoon;
  • Shon, Taeshik
  • 2018-09-01
  • Journal of Supercomputing, Vol.74, pp.4506-4520
  • Springer New York LLC
Field classification-based novel fuzzing case generation for ICS protocols
  • 2018-09-01
  • Journal of Supercomputing, Vol.74, pp.4434-4450
  • Springer New York LLC
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
  • Chaudhry, Shehzad Ashraf;
  • Naqvi, Husnain;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik;
  • Sher, Muhammad
  • 2018-08-01
  • Journal of Supercomputing, Vol.74, pp.3504-3520
  • Springer New York LLC
1 2 3 4 5