All
Title
Author
Keyword
Date
All
Communities
Authors
Journal
1. Journal Papers
92
in
1. Journal Papers
Department of Cyber Security
College of Computing and Informatics
Ajou University
search for
or browse
Titles
Authors
Keyword
Date
Publisher
Subscribe to this collection to receive daily e-mail notification of new additions
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
Chaudhry, Shehzad Ashraf;
Shon, Taeshik
;
Al-Turjman, Fadi;
Alsharif, Mohammed H.
2020-03-01
Computer Communications, Vol.153, pp.527-537
Elsevier B.V.
An anonymous device to device authentication protocol using ecc and self certified public keys usable in internet of things based autonomous devices
oa mark
Alzahrani, Bander A.;
Chaudhry, Shehzad Ashraf;
Barnawi, Ahmed;
Al-Barakati, Abdullah;
Shon, Taeshik
2020-03-01
Electronics (Switzerland), Vol.9
MDPI AG
APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE
Kim, Sung Jin;
Jo, Woo Yeon;
Shon, Taeshik
2020-03-01
Applied Soft Computing Journal, Vol.88
Elsevier Ltd
GenomomFF: Cost-Effective Method to Measure Fetal Fraction by Adaptive Multiple Regression Techniques with Optimally Selected Autosomal Chromosome Regions
oa mark
Kim, Sunshin;
Kim, Kangseok
;
Jeon, Young Joo
2020-01-01
IEEE Access, Vol.8, pp.106880-106888
Institute of Electrical and Electronics Engineers Inc.
An Efficient Domain-Adaptation Method using GAN for Fraud Detection
oa mark
Hwang, Jeonghyun;
Kim, Kangseok
2020-01-01
International Journal of Advanced Computer Science and Applications, Vol.11, pp.94-103
Science and Information Organization
Reducing operational time complexity of k-NN algorithms using clustering in wrist-activity recognition
oa mark
Choe, Sun Taag;
Cho, We Duke;
Kim, Jai Hoon
;
Kim, Ki Hyung
2020-01-01
Intelligent Automation and Soft Computing, Vol.26, pp.679-691
Tech Science Press
GAN based augmentation for improving anomaly detection accuracy in host-based intrusion detection systems
Kim, Kangseok
2020-01-01
International Journal of Engineering Research and Technology, Vol.13, pp.3987-3996
International Research Publication House
Comparison of anomaly detection accuracy of host-based intrusion detection systems based on different machine learning algorithms
oa mark
Shin, Yukyung;
Kim, Kangseok
2020-01-01
International Journal of Advanced Computer Science and Applications, pp.252-259
Science and Information Organization
Private key recovery on bitcoin with duplicated signatures
oa mark
Ko, Ju Seong;
Kwak, Jin
2020-01-01
KSII Transactions on Internet and Information Systems, Vol.14, pp.1280-1300
Korean Society for Internet Information
IEEE 1815.1-Based power system security with bidirectional RNN-Based network anomalous attack detection for cyber-physical system
oa mark
Kwon, Sungmoon;
Yoo, Hyunguk;
Shon, Taeshik
2020-01-01
IEEE Access, Vol.8, pp.77572-77586
Institute of Electrical and Electronics Engineers Inc.
Fast k-NN based Malware Analysis in a Massive Malware Environment
oa mark
Hwang, Jun ho;
Kwak, Jin
;
Lee, Tae jin
2019-12-31
KSII Transactions on Internet and Information Systems, Vol.13, pp.6145-6158
Korean Society for Internet Information
Digital Forensic Practices and Methodologies for AI Speaker Ecosystems
oa mark
Jo, Wooyeon;
Shin, Yeonghun;
Kim, Hyungchan;
Yoo, Dongkyun;
Kim, Donghyun;
Kang, Cheulhoon;
Jin, Jongmin;
Oh, Jungkyung;
Na, B.;
Shon, Taeshik
2019-07-01
Digital Investigation, Vol.29, pp.S80-S93
Elsevier Ltd
On-line shared platform evaluation framework for advanced persistent threats
oa mark
Sohn, Dongsik;
Lee, Taejin;
Kwak, Jin
2019-05-31
KSII Transactions on Internet and Information Systems, Vol.13, pp.2610-2628
Korean Society for Internet Information
A study on analysis of malicious code behavior information for predicting security threats in new environments
oa mark
Choi, Seul Ki;
Lee, Taejin;
Kwak, Jin
2019-03-31
KSII Transactions on Internet and Information Systems, Vol.13, pp.1611-1625
Korean Society for Internet Information
Visualization for internet of things: power system and financial network cases
Kim, Myungjong;
Jo, Wooyeon;
Kim, Jaehoon
;
Shon, Taeshik
2019-02-01
Multimedia Tools and Applications, Vol.78, pp.3241-3265
Springer New York LLC
An improved anonymous authentication scheme for distributed mobile cloud computing services
Chaudhry, Shehzad Ashraf;
Kim, I. Luk;
Rho, Seungmin;
Farash, Mohammad Sabzinejad;
Shon, Taeshik
2019-01-16
Cluster Computing, Vol.22, pp.1595-1609
Springer New York LLC
Toward security enhanced provisioning in industrial IoT systems
oa mark
Kwon, Sungmoon;
Jeong, Jaehan;
Shon, Taeshik
2018-12-01
Sensors (Switzerland), Vol.18
MDPI AG
Design and implementation of cybersecurity testbed for industrial IoT systems
Lee, Seokcheol;
Lee, Seokjun;
Yoo, Hyunguk;
Kwon, Sungmoon;
Shon, Taeshik
2018-09-01
Journal of Supercomputing, Vol.74, pp.4506-4520
Springer New York LLC
Field classification-based novel fuzzing case generation for ICS protocols
Kim, Sung Jin;
Shon, Taeshik
2018-09-01
Journal of Supercomputing, Vol.74, pp.4434-4450
Springer New York LLC
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
Chaudhry, Shehzad Ashraf;
Naqvi, Husnain;
Farash, Mohammad Sabzinejad;
Shon, Taeshik
;
Sher, Muhammad
2018-08-01
Journal of Supercomputing, Vol.74, pp.3504-3520
Springer New York LLC
1
2
3
4
5