All
Title
Author
Keyword
Date
All
Communities
Authors
Journal
Browsing "Department of Cyber Security" by Title :
All
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
전체
가
나
다
라
마
바
사
아
자
차
카
타
파
하
All
가
나
다
라
마
바
사
아
자
차
카
타
파
하
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Sort by:
title
issue date
submit date
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 1 to 20 of 136
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects
oa mark
Aslam, Muhammad Muzamil;
Tufail, Ali;
Kim, Ki Hyung
;
Apong, Rosyzie Anna Awg Haji Mohd;
Raza, Muhammad Taqi
2023-09-01
Sensors, Vol.23 No.18
Multidisciplinary Digital Publishing Institute (MDPI)
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection
oa mark
Dunmore, Aeryn;
Jang-Jaccard, Julian;
Sabrina, Fariza;
Kwak, Jin
2023-01-01
IEEE Access, Vol.11, pp.76071-76094
Institute of Electrical and Electronics Engineers Inc.
A framework for preventing illegitimate e-prescribing practices
Kim, Deuk Hun;
Kwak, Jin
2018-01-01
Lecture Notes in Electrical Engineering, Vol.474, pp.648-653
Springer Verlag
A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks
oa mark
Oh, Sukho;
Hwang, Dong Yeop;
Kim, Kangseok
;
Kim, Ki Hyung
2018-04-01
International Journal of Distributed Sensor Networks, Vol.14 No.4
SAGE Publications Ltd
A novel security framework for industrial iot based on isa 100.11a
Kim, Hyunjin;
Kim, Sungjin;
Kwon, Sungmoon;
Jo, Wooyeon;
Shon, Taeshik
2019-01-01
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Vol.272, pp.61-72
Springer Verlag
A real-time fall detection system based on the acceleration sensor of smartphone
oa mark
Lee, Youngmin;
Yeh, Hongjin
;
Kim, Ki Hyung
;
Choi, Okkyung
2018-01-01
International Journal of Engineering Business Management, Vol.10
SAGE Publications Inc.
A study on analysis of malicious code behavior information for predicting security threats in new environments
oa mark
Choi, Seul Ki;
Lee, Taejin;
Kwak, Jin
2019-03-31
KSII Transactions on Internet and Information Systems, Vol.13 No.3, pp.1611-1625
Korean Society for Internet Information
A Study on IoT Device Authentication Protocol for High Speed and Lightweight
Choi, Seul Ki;
Ko, Ju Seong;
Kwak, Jin
2019-03-18
2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings
Institute of Electrical and Electronics Engineers Inc.
A Subject-Centric Credential Management Method based on the Verifiable Credentials
Lim, Seungjoo;
Rhie, Min Hyung;
Hwang, Dong Yeop;
Kim, Ki Hyung
2021-01-13
International Conference on Information Networking, Vol.2021-January, pp.508-510
IEEE Computer Society
A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain
Park, Woo Suk;
Hwang, Dong Yeop;
Kim, Ki Hyung
2018-08-14
International Conference on Ubiquitous and Future Networks, ICUFN, Vol.2018-July, pp.817-819
IEEE Computer Society
A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC)
Lim, Jiho;
Oh, Hansu;
Sim, Kichun;
Kim, Sunyoung;
Kim, Ki Hyung
2023-01-01
International Conference on Information Networking, Vol.2023-January, pp.801-805
IEEE Computer Society
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
Jeong, Jae Han;
Kwon, Sungmoon;
Hong, Man Pyo;
Kwak, Jin
;
Shon, Taeshik
2020-06-01
Multimedia Tools and Applications, Vol.79 No.23-24, pp.16077-16091
Springer
AI-enabled device digital forensics for smart cities
Kim, Sungbum;
Jo, Wooyeon;
Lee, Jino;
Shon, Taeshik
2022-02-01
Journal of Supercomputing, Vol.78 No.2, pp.3029-3044
Springer
An anonymous device to device authentication protocol using ecc and self certified public keys usable in internet of things based autonomous devices
oa mark
Alzahrani, Bander A.;
Chaudhry, Shehzad Ashraf;
Barnawi, Ahmed;
Al-Barakati, Abdullah;
Shon, Taeshik
2020-03-01
Electronics (Switzerland), Vol.9 No.3
MDPI AG
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDS
oa mark
Kim, Kangseok
2024-02-29
KSII Transactions on Internet and Information Systems, Vol.18 No.2, pp.494-510
Korean Society for Internet Information
An Efficient Domain-Adaptation Method using GAN for Fraud Detection
oa mark
Hwang, Jeonghyun;
Kim, Kangseok
2020-01-01
International Journal of Advanced Computer Science and Applications, Vol.11 No.11, pp.94-103
Science and Information Organization
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
Chaudhry, Shehzad Ashraf;
Naqvi, Husnain;
Farash, Mohammad Sabzinejad;
Shon, Taeshik
;
Sher, Muhammad
2018-08-01
Journal of Supercomputing, Vol.74 No.8, pp.3504-3520
Springer New York LLC
An improved anonymous authentication scheme for distributed mobile cloud computing services
Chaudhry, Shehzad Ashraf;
Kim, I. Luk;
Rho, Seungmin;
Farash, Mohammad Sabzinejad;
Shon, Taeshik
2019-01-16
Cluster Computing, Vol.22, pp.1595-1609
Springer New York LLC
An Security Analysis of Ext Filesystem metadata
Shin, Yeonghun;
Kim, Hyungchan;
Jo, Wooyeon;
Shon, Taeshik
2019-12-01
TIMES-iCON 2019 - 2019 4th Technology Innovation Management and Engineering Science International Conference
Institute of Electrical and Electronics Engineers Inc.
Analysis and Acquisition of APFS Data from a Forensic Perspective
Lee, Jino;
Shon, Tae Shik
2023-01-01
Smart Innovation, Systems and Technologies, Vol.314, pp.390-398
Springer Science and Business Media Deutschland GmbH
1
2
3
4
5
6
7