Ajou University repository

Browsing "Department of Cyber Security" by Title :

All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
전체
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 1 to 20 of 136

A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospectsoa mark
  • Aslam, Muhammad Muzamil;
  • Tufail, Ali;
  • Kim, Ki Hyung;
  • Apong, Rosyzie Anna Awg Haji Mohd;
  • Raza, Muhammad Taqi
  • 2023-09-01
  • Sensors, Vol.23 No.18
  • Multidisciplinary Digital Publishing Institute (MDPI)
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detectionoa mark
  • Dunmore, Aeryn;
  • Jang-Jaccard, Julian;
  • Sabrina, Fariza;
  • Kwak, Jin
  • 2023-01-01
  • IEEE Access, Vol.11, pp.76071-76094
  • Institute of Electrical and Electronics Engineers Inc.
A framework for preventing illegitimate e-prescribing practices
  • 2018-01-01
  • Lecture Notes in Electrical Engineering, Vol.474, pp.648-653
  • Springer Verlag
A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networksoa mark
  • 2018-04-01
  • International Journal of Distributed Sensor Networks, Vol.14 No.4
  • SAGE Publications Ltd
A novel security framework for industrial iot based on isa 100.11a
  • Kim, Hyunjin;
  • Kim, Sungjin;
  • Kwon, Sungmoon;
  • Jo, Wooyeon;
  • Shon, Taeshik
  • 2019-01-01
  • Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Vol.272, pp.61-72
  • Springer Verlag
A real-time fall detection system based on the acceleration sensor of smartphoneoa mark
  • 2018-01-01
  • International Journal of Engineering Business Management, Vol.10
  • SAGE Publications Inc.
A study on analysis of malicious code behavior information for predicting security threats in new environmentsoa mark
  • 2019-03-31
  • KSII Transactions on Internet and Information Systems, Vol.13 No.3, pp.1611-1625
  • Korean Society for Internet Information
A Study on IoT Device Authentication Protocol for High Speed and Lightweight
  • 2019-03-18
  • 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings
  • Institute of Electrical and Electronics Engineers Inc.
A Subject-Centric Credential Management Method based on the Verifiable Credentials
  • 2021-01-13
  • International Conference on Information Networking, Vol.2021-January, pp.508-510
  • IEEE Computer Society
A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain
  • 2018-08-14
  • International Conference on Ubiquitous and Future Networks, ICUFN, Vol.2018-July, pp.817-819
  • IEEE Computer Society
A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC)
  • 2023-01-01
  • International Conference on Information Networking, Vol.2023-January, pp.801-805
  • IEEE Computer Society
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
  • 2020-06-01
  • Multimedia Tools and Applications, Vol.79 No.23-24, pp.16077-16091
  • Springer
AI-enabled device digital forensics for smart cities
  • 2022-02-01
  • Journal of Supercomputing, Vol.78 No.2, pp.3029-3044
  • Springer
An anonymous device to device authentication protocol using ecc and self certified public keys usable in internet of things based autonomous devicesoa mark
  • Alzahrani, Bander A.;
  • Chaudhry, Shehzad Ashraf;
  • Barnawi, Ahmed;
  • Al-Barakati, Abdullah;
  • Shon, Taeshik
  • 2020-03-01
  • Electronics (Switzerland), Vol.9 No.3
  • MDPI AG
An Effective Anomaly Detection Approach based on Hybrid Unsupervised Learning Technologies in NIDSoa mark
  • 2024-02-29
  • KSII Transactions on Internet and Information Systems, Vol.18 No.2, pp.494-510
  • Korean Society for Internet Information
An Efficient Domain-Adaptation Method using GAN for Fraud Detectionoa mark
  • 2020-01-01
  • International Journal of Advanced Computer Science and Applications, Vol.11 No.11, pp.94-103
  • Science and Information Organization
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
  • Chaudhry, Shehzad Ashraf;
  • Naqvi, Husnain;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik;
  • Sher, Muhammad
  • 2018-08-01
  • Journal of Supercomputing, Vol.74 No.8, pp.3504-3520
  • Springer New York LLC
An improved anonymous authentication scheme for distributed mobile cloud computing services
  • Chaudhry, Shehzad Ashraf;
  • Kim, I. Luk;
  • Rho, Seungmin;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik
  • 2019-01-16
  • Cluster Computing, Vol.22, pp.1595-1609
  • Springer New York LLC
An Security Analysis of Ext Filesystem metadata
  • 2019-12-01
  • TIMES-iCON 2019 - 2019 4th Technology Innovation Management and Engineering Science International Conference
  • Institute of Electrical and Electronics Engineers Inc.
Analysis and Acquisition of APFS Data from a Forensic Perspective
  • 2023-01-01
  • Smart Innovation, Systems and Technologies, Vol.314, pp.390-398
  • Springer Science and Business Media Deutschland GmbH
1 2 3 4 5 6 7