APAD: Autoencoder-based payload anomaly detection for industrial IoE SJ Kim, WY Jo, T Shon Applied Soft Computing 88, 106017, 2020 | 95 | 2020 |
Packet preprocessing in CNN-based network intrusion detection system W Jo, S Kim, C Lee, T Shon Electronics 9 (7), 1151, 2020 | 65 | 2020 |
Game theory-based security vulnerability quantification for social internet of things S Lee, S Kim, K Choi, T Shon Future Generation Computer Systems 82, 752-760, 2018 | 46 | 2018 |
Field classification-based novel fuzzing case generation for ICS protocols SJ Kim, T Shon The Journal of Supercomputing 74, 4434-4450, 2018 | 23 | 2018 |
A novel vulnerability analysis approach to generate fuzzing test case in industrial control systems SJ Kim, WY Jo, T Shon 2016 IEEE Information Technology, Networking, Electronic and Automation …, 2016 | 21 | 2016 |
Smart seed selection-based effective black box fuzzing for IIoT protocol SJ Kim, J Cho, C Lee, T Shon The Journal of Supercomputing 76, 10140-10154, 2020 | 16 | 2020 |
Automatic whitelist generation system for ethernet based in-vehicle network W Jo, SJ Kim, H Kim, Y Shin, T Shon Computers in Industry 142, 103735, 2022 | 15 | 2022 |
Cybersecurity framework for IIoT-based power system connected to microgrid JW Jang, S Kwon, SJ Kim, J Seo, J Oh, K Lee KSII Transactions on Internet and Information Systems (TIIS) 14 (5), 2221-2235, 2020 | 11 | 2020 |
Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems H Kim, S Kim, W Jo, KH Kim, T Shon IEEE Access 9, 75542-75552, 2021 | 10 | 2021 |
Data aggregation gateway framework for CoAP group communications M Cha, JH Kwon, SJ Kim, T Shon, EJ Kim Symmetry 8 (12), 138, 2016 | 7 | 2016 |
A novel security framework for industrial iot based on isa 100.11 a H Kim, S Kim, S Kwon, W Jo, T Shon Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th …, 2019 | 5 | 2019 |
Cybersecurity architecture for reliable smart factory HJ Kim, SJ Kim, Y Kim, S Kim, TS Shon Journal of the Korea Institute of Information Security & Cryptology 29 (3 …, 2019 | 5 | 2019 |
Survey on security techniques for AMI metering system SJ Kim, HS Chng, T Shon 2014 International SoC Design Conference (ISOCC), 192-193, 2014 | 4 | 2014 |
Randomness Based Fuzzing Test Case Evaluation for Vulnerability Analysis of Industrial Control System SJ Kim, T Shon Journal of The Korea Institute of Information Security & Cryptology 28 (1 …, 2018 | 3 | 2018 |
Digital forensic consideration for financial IT security K Park, S Kwon, S Kim, T Shon 2016 Future Technologies Conference (FTC), 1025-1029, 2016 | 2 | 2016 |
Two-Phase Industrial Control System Anomaly Detection Using Communication Patterns and Deep Learning S Kim, W Jo, H Kim, S Choi, DI Jung, H Choi, T Shon Electronics 13 (8), 1520, 2024 | 1 | 2024 |
Digital forensic artifact collection technique using application decompilation D Yoo, Y Shin, SJ Kim, HJ Kim, SM Kwon, T Shon 2019 International Conference on Platform Technology and Service (PlatCon), 1-3, 2019 | 1 | 2019 |
빅데이터 분석 기술 (Hadoop/Hive) 기반 네트워크 정상행위 규정 방법 김성진, 김강석 정보보호학회논문지 27 (5), 1117-1127, 2017 | 1 | 2017 |
Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard HJ Kim, S Lee, SJ Kim, T Shon 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-4, 2015 | | 2015 |