Anomaly detection for industrial control systems using sequence-to-sequence neural networks J Kim, JH Yun, HC Kim Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020 | 81 | 2020 |
Polynomial-based key management for secure intra-group and inter-group communication Y Piao, JU Kim, U Tariq, M Hong Computers & Mathematics with Applications 65 (9), 1300-1309, 2013 | 80 | 2013 |
Method for web service user authentication MP Hong, JU Kim, SI Kang US Patent 9,208,304, 2015 | 21 | 2015 |
Method for generating dynamic group key MP Hong, JU Kim, SI Kang US Patent 8,553,887, 2013 | 14 | 2013 |
Button‐based method for the prevention of near field communication relay attacks S Kang, J Kim, M Hong International Journal of Communication Systems 28 (10), 1628-1639, 2015 | 11 | 2015 |
Autonomous defense against Flooding-based Denial of Service of a SIP system J Kim, B Roh, M Hong, S Kang, S Lee 2010 IEEE Long Island Systems, Applications and Technology Conference, 1-7, 2010 | 8 | 2010 |
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices S Kang, J Kim, M Hong Personal and ubiquitous computing 17, 933-943, 2013 | 3 | 2013 |
Relay attack prevention with a single button for near field communication S Kang, J Kim, M Hong Proceedings of the FTRA AIM, 86-87, 2013 | 2 | 2013 |
A graphic password scheme using Eulerian path GY Moon, JU Kim, MP Hong Proceedings of the Korean Information Science Society Conference, 82-85, 2011 | 2 | 2011 |
EDGAR: Extended Dynamic Group-Key AgReement J Kim, S Kang, M Hong, S Lee 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2010 | 1 | 2010 |
A Smart Phone Evil Twin Detection Method Using IP Address YS Jeong, JU Kim, SI Kang, MP Hong Proceedings of the Korean Information Science Society Conference, 269-271, 2012 | | 2012 |
Key Exchange Agreement Based Asymmetric Dynamics Group YB Yun, MP Hong, JU Kim, SI Kang Proceedings of the Korean Information Science Society Conference, 316-319, 2011 | | 2011 |
Distributed Worm Detection and Prevention Model with Light-Weight Agent Y Piao, JU Kim, SU Lee, CM Kim, U Tariq, MP Hong Proceedings of the Korean Information Science Society Conference, 114-115, 2007 | | 2007 |
Hybrid Mix that gives user two reordering method at a time PS Kang, JU Kim, MP Hong, KS Lhee Proceedings of the Korean Information Science Society Conference, 146-150, 2007 | | 2007 |
The method of using various encryption algorithms and key sizes for applying a mix-net to the ubiquitous environment IH Kim, JU Kim, MP Hong Proceedings of the Korean Information Science Society Conference, 100-101, 2007 | | 2007 |