All
Title
Author
Keyword
Date
All
Communities
Authors
Journal
1. Journal Papers
92
in
1. Journal Papers
Department of Cyber Security
College of Computing and Informatics
Ajou University
search for
or browse
Titles
Authors
Keyword
Date
Publisher
Subscribe to this collection to receive daily e-mail notification of new additions
Moisture computing-based internet of vehicles (Iov) architecture for smart cities
oa mark
Tufail, Ali;
Namoun, Abdallah;
Sen, Adnan Ahmed Abi;
Kim, Ki Hyung
;
Alrehaili, Ahmed;
Ali, Arshad
2021-06-01
Sensors, Vol.21 No.11
MDPI AG
In-vehicle networking/autonomous vehicle security for internet of things/vehicles
oa mark
Shon, Taeshik
2021-03-02
Electronics (Switzerland), Vol.10 No.6, pp.1-5
Multidisciplinary Digital Publishing Institute (MDPI)
Analysis of real-time blockchain considering service level agreement (SLA)
oa mark
Kim, Minkyung
;
Kim, Kangseok
;
Kim, Jai Hoon
2021-01-01
Advances in Science, Technology and Engineering Systems, Vol.6 No.1, pp.218-223
ASTES Publishers
Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems
oa mark
Kim, Hyunjin;
Kim, Sungjin;
Jo, Wooyeon;
Kim, Ki Hyun;
Shon, Taeshik
2021-01-01
IEEE Access, Vol.9, pp.75542-75552
Institute of Electrical and Electronics Engineers Inc.
Image Compression Using Chain Coding for Electronic Shelf Labels (ESL) Systems
oa mark
Kim, Youngjun;
Kim, Ki Hyung
;
Cho, We Duke
2021-01-01
IEEE Access, Vol.9, pp.8497-8511
Institute of Electrical and Electronics Engineers Inc.
Detection technique of software-induced rowhammer attacks
oa mark
Lee, Minkyung;
Kwak, Jin
2021-01-01
Computers, Materials and Continua, Vol.67 No.1, pp.349-367
Tech Science Press
Intelligent piracy site detection technique with high accuracy
oa mark
Kim, Eui Jin;
Kwak, Jin
2021-01-01
KSII Transactions on Internet and Information Systems, Vol.15 No.1, pp.285-301
Korean Society for Internet Information
Cost Modeling for Analyzing Network Performance of IoT Protocols in Blockchain-Based IoT
Kim, Minkyung
;
Kim, Kangseok
;
Kim, Jai Hoon
2021-01-01
Human-centric Computing and Information Sciences, Vol.11
Korea Information Processing Society
Automated detection technique for suspected copyright infringement sites
oa mark
Jeong, Hae Seon;
Kwak, Jin
2020-12-31
KSII Transactions on Internet and Information Systems, Vol.14 No.12, pp.4889-4908
Korean Society for Internet Information
Smart seed selection-based effective black box fuzzing for IIoT protocol
Kim, Sung Jin;
Cho, Jaeik;
Lee, Changhoon;
Shon, Taeshik
2020-12-01
Journal of Supercomputing, Vol.76 No.12, pp.10140-10154
Springer
Fault-Tolerant UAV Data Acquisition Schemes
Alemayehu, Temesgen Seyoum;
Kim, Jai Hoon
;
Yoon, Wonsik
2020-09-01
Wireless Personal Communications, Vol.114 No.2, pp.1669-1685
Springer
Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem
oa mark
Shin, Yeonghun;
Kim, Hyungchan;
Kim, Sungbum;
Yoo, Dongkyun;
Jo, Wooyeon;
Shon, Taeshik
2020-07-01
Forensic Science International: Digital Investigation, Vol.33
Elsevier Ltd
Packet preprocessing in CNN-based network intrusion detection system
oa mark
Jo, Wooyeon;
Kim, Sungjin;
Lee, Changhoon;
Shon, Taeshik
2020-07-01
Electronics (Switzerland), Vol.9 No.7, pp.1-15
MDPI AG
Secure sharing scheme of sensitive data in the precision medicine system
oa mark
Kim, Deukhun;
Kim, Heejin;
Kwak, Jin
2020-06-30
Computers, Materials and Continua, Vol.64 No.3, pp.1527-1553
Tech Science Press
Black Money Usage Tracker Mechanism Based on Hyperledger Fabric
Abdukodirov, Farkhod;
Kim, Ki Hyung
2020-06-01
Journal of Korean Institute of Communications and Information Sciences, Vol.45 No.6, pp.1072-1082
Korean Institute of Communications and Information Sciences
Smart card-based secure authentication protocol in multi-server IoT environment
oa mark
Bae, Won il;
Kwak, Jin
2020-06-01
Multimedia Tools and Applications, Vol.79 No.23-24, pp.15793-15811
Springer
ExtSFR: scalable file recovery framework based on an Ext file system
Lee, Seokjun;
Jo, Wooyeon;
Eo, Soowoong;
Shon, Taeshik
2020-06-01
Multimedia Tools and Applications, Vol.79 No.23-24, pp.16093-16111
Springer
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
Jeong, Jae Han;
Kwon, Sungmoon;
Hong, Man Pyo;
Kwak, Jin
;
Shon, Taeshik
2020-06-01
Multimedia Tools and Applications, Vol.79 No.23-24, pp.16077-16091
Springer
Feature Analysis and Detection Techniques for Piracy Sites
oa mark
Choi, Seul Ki;
Kwak, Jin
2020-05-31
KSII Transactions on Internet and Information Systems, Vol.14 No.5, pp.2204-2220
Korean Society for Internet Information
Platform-independent malware analysis applicable to windows and linux environments
oa mark
Hwang, Chanwoong;
Hwang, Junho;
Kwak, Jin
;
Lee, Taejin
2020-05-01
Electronics (Switzerland), Vol.9 No.5
MDPI AG
1
2
3
4
5