Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Taeshik Shon
@article{DBLP:journals/di/KimOS23, author = {Donghyun Kim and Subin Oh and Taeshik Shon}, title = {Digital forensic approaches for metaverse ecosystems}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301608}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301608}, doi = {10.1016/J.FSIDI.2023.301608}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KimOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimSJS23, author = {Minju Kim and Yeonghun Shin and Wooyeon Jo and Taeshik Shon}, title = {Digital forensic analysis of intelligent and smart IoT devices}, journal = {J. Supercomput.}, volume = {79}, number = {1}, pages = {973--997}, year = {2023}, url = {https://doi.org/10.1007/s11227-022-04639-5}, doi = {10.1007/S11227-022-04639-5}, timestamp = {Sat, 14 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/KimSJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/JoKKSS22, author = {Wooyeon Jo and SungJin Kim and Hyunjin Kim and Yeonghun Shin and Taeshik Shon}, title = {Automatic whitelist generation system for ethernet based in-vehicle network}, journal = {Comput. Ind.}, volume = {142}, pages = {103735}, year = {2022}, url = {https://doi.org/10.1016/j.compind.2022.103735}, doi = {10.1016/J.COMPIND.2022.103735}, timestamp = {Wed, 14 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/JoKKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KimSKJKS22, author = {Hyungchan Kim and Yeonghun Shin and Sungbum Kim and Wooyeon Jo and Minju Kim and Taeshik Shon}, title = {Digital Forensic Analysis to Improve User Privacy on Android}, journal = {Sensors}, volume = {22}, number = {11}, pages = {3971}, year = {2022}, url = {https://doi.org/10.3390/s22113971}, doi = {10.3390/S22113971}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KimSKJKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ShinKJS22, author = {Yeonghun Shin and Sungbum Kim and Wooyeon Jo and Taeshik Shon}, title = {Digital Forensic Case Studies for In-Vehicle Infotainment Systems Using Android Auto and Apple CarPlay}, journal = {Sensors}, volume = {22}, number = {19}, pages = {7196}, year = {2022}, url = {https://doi.org/10.3390/s22197196}, doi = {10.3390/S22197196}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ShinKJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimJLS22, author = {Sungbum Kim and Wooyeon Jo and Jino Lee and Taeshik Shon}, title = {AI-enabled device digital forensics for smart cities}, journal = {J. Supercomput.}, volume = {78}, number = {2}, pages = {3029--3044}, year = {2022}, url = {https://doi.org/10.1007/s11227-021-03992-1}, doi = {10.1007/S11227-021-03992-1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KimJLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimS22, author = {HyunJin Kim and Taeshik Shon}, title = {Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing}, journal = {J. Supercomput.}, volume = {78}, number = {11}, pages = {13554--13563}, year = {2022}, url = {https://doi.org/10.1007/s11227-022-04408-4}, doi = {10.1007/S11227-022-04408-4}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KimS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimKJKS21, author = {Hyunjin Kim and Sungjin Kim and Wooyeon Jo and Ki{-}Hyun Kim and Taeshik Shon}, title = {Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems}, journal = {{IEEE} Access}, volume = {9}, pages = {75542--75552}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3080081}, doi = {10.1109/ACCESS.2021.3080081}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KimKJKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KwonYS20, author = {SungMoon Kwon and Hyunguk Yoo and Taeshik Shon}, title = {{IEEE} 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System}, journal = {{IEEE} Access}, volume = {8}, pages = {77572--77586}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2989770}, doi = {10.1109/ACCESS.2020.2989770}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KwonYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/KimJS20, author = {SungJin Kim and Wooyeon Jo and Taeshik Shon}, title = {{APAD:} Autoencoder-based Payload Anomaly Detection for industrial IoE}, journal = {Appl. Soft Comput.}, volume = {88}, pages = {106017}, year = {2020}, url = {https://doi.org/10.1016/j.asoc.2019.106017}, doi = {10.1016/J.ASOC.2019.106017}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/KimJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChaudhrySAA20, author = {Shehzad Ashraf Chaudhry and Taeshik Shon and Fadi Al{-}Turjman and Mohammed H. Alsharif}, title = {Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems}, journal = {Comput. Commun.}, volume = {153}, pages = {527--537}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.02.025}, doi = {10.1016/J.COMCOM.2020.02.025}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChaudhrySAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShinKKYJS20, author = {Yeonghun Shin and Hyungchan Kim and Sungbum Kim and Dongkyun Yoo and Wooyeon Jo and Taeshik Shon}, title = {Certificate Injection-Based Encrypted Traffic Forensics in {AI} Speaker Ecosystem}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301010}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301010}, doi = {10.1016/J.FSIDI.2020.301010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShinKKYJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/JeongKHKS20, author = {Jaehan Jeong and SungMoon Kwon and Man{-}Pyo Hong and Jin Kwak and Taeshik Shon}, title = {Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance}, journal = {Multim. Tools Appl.}, volume = {79}, number = {23-24}, pages = {16077--16091}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-7262-8}, doi = {10.1007/S11042-019-7262-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/JeongKHKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeJES20, author = {Seokjun Lee and Wooyeon Jo and Soowoong Eo and Taeshik Shon}, title = {ExtSFR: scalable file recovery framework based on an Ext file system}, journal = {Multim. Tools Appl.}, volume = {79}, number = {23-24}, pages = {16093--16111}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-7199-y}, doi = {10.1007/S11042-019-7199-Y}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeJES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimCLS20, author = {SungJin Kim and Jaeik Cho and Changhoon Lee and Taeshik Shon}, title = {Smart seed selection-based effective black box fuzzing for IIoT protocol}, journal = {J. Supercomput.}, volume = {76}, number = {12}, pages = {10140--10154}, year = {2020}, url = {https://doi.org/10.1007/s11227-020-03245-7}, doi = {10.1007/S11227-020-03245-7}, timestamp = {Mon, 19 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KimCLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ChaudhryKRFS19, author = {Shehzad Ashraf Chaudhry and I Luk Kim and Seungmin Rho and Mohammad Sabzinejad Farash and Taeshik Shon}, title = {An improved anonymous authentication scheme for distributed mobile cloud computing services}, journal = {Clust. Comput.}, volume = {22}, number = {Suppl 1}, pages = {1595--1609}, year = {2019}, url = {https://doi.org/10.1007/s10586-017-1088-9}, doi = {10.1007/S10586-017-1088-9}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ChaudhryKRFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JoSKYKKJONS19, author = {Wooyeon Jo and Yeonghun Shin and Hyungchan Kim and Dongkyun Yoo and Donghyun Kim and Cheulhoon Kang and Jongmin Jin and Jungkyung Oh and Bitna Na and Taeshik Shon}, title = {Digital Forensic Practices and Methodologies for {AI} Speaker Ecosystems}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S80--S93}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.013}, doi = {10.1016/J.DIIN.2019.04.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JoSKYKKJONS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimJKS19, author = {Myungjong Kim and Wooyeon Jo and Jaehoon Kim and Taeshik Shon}, title = {Visualization for internet of things: power system and financial network cases}, journal = {Multim. Tools Appl.}, volume = {78}, number = {3}, pages = {3241--3265}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6730-x}, doi = {10.1007/S11042-018-6730-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimJKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/KwonYS19, author = {SungMoon Kwon and Hyunguk Yoo and Taeshik Shon}, title = {RNN-based Anomaly Detection in {DNP3} Transport Layer}, booktitle = {2019 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing, China, October 21-23, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartGridComm.2019.8909701}, doi = {10.1109/SMARTGRIDCOMM.2019.8909701}, timestamp = {Sun, 08 Dec 2019 17:30:04 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/KwonYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LeeKCS18, author = {Seokcheol Lee and SungJin Kim and Ken Choi and Taeshik Shon}, title = {Game theory-based Security Vulnerability Quantification for Social Internet of Things}, journal = {Future Gener. Comput. Syst.}, volume = {82}, pages = {752--760}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.09.032}, doi = {10.1016/J.FUTURE.2017.09.032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LeeKCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KwonJS18, author = {SungMoon Kwon and Jaehan Jeong and Taeshik Shon}, title = {Toward Security Enhanced Provisioning in Industrial IoT Systems}, journal = {Sensors}, volume = {18}, number = {12}, pages = {4372}, year = {2018}, url = {https://doi.org/10.3390/s18124372}, doi = {10.3390/S18124372}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KwonJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ChaudhryNFSS18, author = {Shehzad Ashraf Chaudhry and Husnain Naqvi and Mohammad Sabzinejad Farash and Taeshik Shon and Muhammad Sher}, title = {An improved and robust biometrics-based three factor authentication scheme for multiserver environments}, journal = {J. Supercomput.}, volume = {74}, number = {8}, pages = {3504--3520}, year = {2018}, url = {https://doi.org/10.1007/s11227-015-1601-y}, doi = {10.1007/S11227-015-1601-Y}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ChaudhryNFSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/JoCS18, author = {Wooyeon Jo and Hyun Soo Chang and Taeshik Shon}, title = {Digital forensic science approach by file recovery research}, journal = {J. Supercomput.}, volume = {74}, number = {8}, pages = {3704--3725}, year = {2018}, url = {https://doi.org/10.1007/s11227-016-1909-2}, doi = {10.1007/S11227-016-1909-2}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/JoCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimS18, author = {SungJin Kim and Taeshik Shon}, title = {Field classification-based novel fuzzing case generation for {ICS} protocols}, journal = {J. Supercomput.}, volume = {74}, number = {9}, pages = {4434--4450}, year = {2018}, url = {https://doi.org/10.1007/s11227-017-1980-3}, doi = {10.1007/S11227-017-1980-3}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KimS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LeeLYKS18, author = {Seokcheol Lee and Seokjun Lee and Hyunguk Yoo and SungMoon Kwon and Taeshik Shon}, title = {Design and implementation of cybersecurity testbed for industrial IoT systems}, journal = {J. Supercomput.}, volume = {74}, number = {9}, pages = {4506--4520}, year = {2018}, url = {https://doi.org/10.1007/s11227-017-2219-z}, doi = {10.1007/S11227-017-2219-Z}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LeeLYKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/KimKKJS18, author = {Hyunjin Kim and SungJin Kim and SungMoon Kwon and Wooyeon Jo and Taeshik Shon}, editor = {Trung Quang Duong and Nguyen{-}Son Vo and Van Ca Phan}, title = {A Novel Security Framework for Industrial IoT Based on {ISA} 100.11a}, booktitle = {Quality, Reliability, Security and Robustness in Heterogeneous Systems - 14th {EAI} International Conference, {QSHINE} 2018, Ho Chi Minh City, Vietnam, December 3-4, 2018, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {272}, pages = {61--72}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14413-5\_5}, doi = {10.1007/978-3-030-14413-5\_5}, timestamp = {Fri, 08 Mar 2019 16:35:10 +0100}, biburl = {https://dblp.org/rec/conf/qshine/KimKKJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ChaudhryAXLS17, author = {Shehzad Ashraf Chaudhry and Aiiad Albeshri and Naixue Xiong and Changhoon Lee and Taeshik Shon}, title = {A privacy preserving authentication scheme for roaming in ubiquitous networks}, journal = {Clust. Comput.}, volume = {20}, number = {2}, pages = {1223--1236}, year = {2017}, url = {https://doi.org/10.1007/s10586-017-0783-x}, doi = {10.1007/S10586-017-0783-X}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ChaudhryAXLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KwonYS17, author = {SungMoon Kwon and Hyunguk Yoo and Taeshik Shon}, title = {Recovery Measure against Disabling Reassembly Attack to {DNP3} Communication}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {8}, pages = {1790--1797}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016ICP0026}, doi = {10.1587/TRANSINF.2016ICP0026}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KwonYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ChaudhryFNIS17, author = {Shehzad Ashraf Chaudhry and Mohammad Sabzinejad Farash and Husnain Naqvi and SK Hafizul Islam and Taeshik Shon}, title = {A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks}, journal = {Wirel. Pers. Commun.}, volume = {93}, number = {2}, pages = {311--335}, year = {2017}, url = {https://doi.org/10.1007/s11277-015-3139-y}, doi = {10.1007/S11277-015-3139-Y}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ChaudhryFNIS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ChoiNS17, author = {Hyo Hyun Choi and Su Hyun Nam and Taeshik Shon}, title = {Two Tier Search Scheme Using Micro {UAV} Swarm}, journal = {Wirel. Pers. Commun.}, volume = {93}, number = {2}, pages = {349--363}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3184-1}, doi = {10.1007/S11277-016-3184-1}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ChoiNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MuneaKS17, author = {Tewodros Legesse Munea and I Luk Kim and Taeshik Shon}, title = {Design and Implementation of Fuzzing Framework Based on IoT Applications}, journal = {Wirel. Pers. Commun.}, volume = {93}, number = {2}, pages = {365--382}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3322-9}, doi = {10.1007/S11277-016-3322-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/MuneaKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/YaqoobS16, author = {Sania Yaqoob and Taeshik Shon}, title = {A Hybrid {EV} Authentication Approach in Smart Grid Based Distributed Network}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {31}, number = {1-4}, pages = {89--99}, year = {2016}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-31-number-1-4-2016/ahswn-31-1-4-p-89-99/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/YaqoobS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/MahmoodCNSA16, author = {Khalid Mahmood and Shehzad Ashraf Chaudhry and Husnain Naqvi and Taeshik Shon and Hafiz Farooq Ahmad}, title = {A lightweight message authentication scheme for Smart Grid communications in power sector}, journal = {Comput. Electr. Eng.}, volume = {52}, pages = {114--124}, year = {2016}, url = {https://doi.org/10.1016/j.compeleceng.2016.02.017}, doi = {10.1016/J.COMPELECENG.2016.02.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/MahmoodCNSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YooS16, author = {Hyunguk Yoo and Taeshik Shon}, title = {Challenges and research directions for heterogeneous cyber-physical system based on {IEC} 61850: Vulnerabilities, security requirements, and security architecture}, journal = {Future Gener. Comput. Syst.}, volume = {61}, pages = {128--136}, year = {2016}, url = {https://doi.org/10.1016/j.future.2015.09.026}, doi = {10.1016/J.FUTURE.2015.09.026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YooS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/ChaudhryKKS16, author = {Shehzad Ashraf Chaudhry and Muhammad Tawab Khan and Muhammad Khurram Khan and Taeshik Shon}, title = {A Multiserver Biometric Authentication Scheme for {TMIS} using Elliptic Curve Cryptography}, journal = {J. Medical Syst.}, volume = {40}, number = {11}, pages = {230:1--230:13}, year = {2016}, url = {https://doi.org/10.1007/s10916-016-0592-4}, doi = {10.1007/S10916-016-0592-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/ChaudhryKKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeKS16, author = {Seokcheol Lee and Jongwan Kim and Taeshik Shon}, title = {User privacy-enhanced security architecture for home area network of Smartgrid}, journal = {Multim. Tools Appl.}, volume = {75}, number = {20}, pages = {12749--12764}, year = {2016}, url = {https://doi.org/10.1007/s11042-016-3252-2}, doi = {10.1007/S11042-016-3252-2}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ParkCS16, author = {Yongmin Park and Hyun Soo Chang and Taeshik Shon}, title = {Data investigation based on {XFS} file system metadata}, journal = {Multim. Tools Appl.}, volume = {75}, number = {22}, pages = {14721--14743}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2713-3}, doi = {10.1007/S11042-015-2713-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ParkCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MuneaLS16, author = {Tewodros Legesse Munea and Hyunwoo Lim and Taeshik Shon}, title = {Network protocol fuzz testing for information systems and applications: a survey and taxonomy}, journal = {Multim. Tools Appl.}, volume = {75}, number = {22}, pages = {14745--14757}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2763-6}, doi = {10.1007/S11042-015-2763-6}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/MuneaLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ChaKKSK16, author = {Minki Cha and Jung{-}Hyok Kwon and SungJin Kim and Taeshik Shon and Eui{-}Jik Kim}, title = {Data Aggregation Gateway Framework for CoAP Group Communications}, journal = {Symmetry}, volume = {8}, number = {12}, pages = {138}, year = {2016}, url = {https://doi.org/10.3390/sym8120138}, doi = {10.3390/SYM8120138}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ChaKKSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/KimKCS16, author = {Eui{-}Jik Kim and Jung{-}Hyok Kwon and Ken Choi and Taeshik Shon}, title = {Unified Medium Access Control Architecture for Resource-Constrained Machine-to-Machine Devices}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {15}, number = {2}, pages = {40:1--40:17}, year = {2016}, url = {https://doi.org/10.1145/2876958}, doi = {10.1145/2876958}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/KimKCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KwonCSJK16, author = {Jung{-}Hyok Kwon and Hyun Soo Chang and Taeshik Shon and Jai{-}Jin Jung and Eui{-}Jik Kim}, title = {Neighbor stability-based {VANET} clustering for urban vehicular environments}, journal = {J. Supercomput.}, volume = {72}, number = {1}, pages = {161--176}, year = {2016}, url = {https://doi.org/10.1007/s11227-015-1517-6}, doi = {10.1007/S11227-015-1517-6}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KwonCSJK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ChoLSK16, author = {Kyumin Cho and Hyunwoo Lim and Taeshik Shon and Seungjoo Kim}, title = {A novel security architecture of electronic vehicle system for smart grid communication}, journal = {J. Supercomput.}, volume = {72}, number = {1}, pages = {214--231}, year = {2016}, url = {https://doi.org/10.1007/s11227-015-1552-3}, doi = {10.1007/S11227-015-1552-3}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ChoLSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ChoiCSC16, author = {Myungwhan Choi and Paul Vincent Contreras and Taeshik Shon and Hyo Hyun Choi}, title = {Exploring an area by groups of UAVs in the presence of a refueling base}, journal = {J. Supercomput.}, volume = {72}, number = {9}, pages = {3409--3427}, year = {2016}, url = {https://doi.org/10.1007/s11227-015-1465-1}, doi = {10.1007/S11227-015-1465-1}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ChoiCSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/LeeYSS16, author = {Seokjun Lee and Hyunguk Yoo and Jung{-}Taek Seo and Taeshik Shon}, editor = {Xingang Liu and Tie Qiu and Bin Guo and Kaixuan Lu and Zhaolong Ning and Mianxiong Dong and Yayong Li}, title = {Packet Diversity-Based Anomaly Detection System with {OCSVM} and Representative Model}, booktitle = {2016 {IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), Chengdu, China, December 15-18, 2016}, pages = {498--503}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.116}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.116}, timestamp = {Mon, 14 Dec 2020 13:52:12 +0100}, biburl = {https://dblp.org/rec/conf/ithings/LeeYSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/YooS16, author = {Hyunguk Yoo and Taeshik Shon}, editor = {Xingang Liu and Tie Qiu and Bin Guo and Kaixuan Lu and Zhaolong Ning and Mianxiong Dong and Yayong Li}, title = {Inferring State Machine Using Hybrid Teacher}, booktitle = {2016 {IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), Chengdu, China, December 15-18, 2016}, pages = {504--509}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.117}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.117}, timestamp = {Sun, 14 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ithings/YooS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/LeeKYS16, author = {Seokjun Lee and Jongwan Kim and Hyunguk Yoo and Taeshik Shon}, editor = {Xingang Liu and Tie Qiu and Bin Guo and Kaixuan Lu and Zhaolong Ning and Mianxiong Dong and Yayong Li}, title = {Case Studies for Analyzing DLMS/COSEM-Based Smart Meter Vulnerabilities in Korea}, booktitle = {2016 {IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), Chengdu, China, December 15-18, 2016}, pages = {667--674}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.145}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.145}, timestamp = {Sun, 14 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ithings/LeeKYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/YooS16, author = {Hyunguk Yoo and Taeshik Shon}, title = {Grammar-based adaptive fuzzing: Evaluation on {SCADA} modbus protocol}, booktitle = {2016 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2016, Sydney, Australia, November 6-9, 2016}, pages = {557--563}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SmartGridComm.2016.7778820}, doi = {10.1109/SMARTGRIDCOMM.2016.7778820}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/YooS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangLSVC15, author = {Shiuh{-}Jeng Wang and Jigang Liu and Taeshik Shon and Binod Vaidya and Yeong{-}Sheng Chen}, title = {Security and privacy information technologies and applications for wireless pervasive computing environments}, journal = {Inf. Sci.}, volume = {321}, pages = {147--149}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.07.037}, doi = {10.1016/J.INS.2015.07.037}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangLSVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/ChaudhryNSSF15, author = {Shehzad Ashraf Chaudhry and Husnain Naqvi and Taeshik Shon and Muhammad Sher and Mohammad Sabzinejad Farash}, title = {Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems}, journal = {J. Medical Syst.}, volume = {39}, number = {6}, pages = {66:1--66:11}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0244-0}, doi = {10.1007/S10916-015-0244-0}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/ChaudhryNSSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YooS15, author = {Hyunguk Yoo and Taeshik Shon}, title = {Novel Approach for Detecting Network Anomalies for Substation Automation based on {IEC} 61850}, journal = {Multim. Tools Appl.}, volume = {74}, number = {1}, pages = {303--318}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-1870-0}, doi = {10.1007/S11042-014-1870-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YooS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HanS15, author = {Kyusuk Han and Taeshik Shon}, title = {Authentication of mobile applications through various local distributors}, journal = {Multim. Tools Appl.}, volume = {74}, number = {5}, pages = {1541--1555}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1520-y}, doi = {10.1007/S11042-013-1520-Y}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/KimHCYKHS15, author = {Kangseok Kim and Wonjeong Ha and Okkyung Choi and Hongjin Yeh and Jai{-}Hoon Kim and Manpyo Hong and Taeshik Shon}, title = {An interactive pervasive whiteboard based on {MVC} architecture for ubiquitous collaboration}, journal = {Multim. Tools Appl.}, volume = {74}, number = {5}, pages = {1557--1576}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1458-0}, doi = {10.1007/S11042-013-1458-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KimHCYKHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ParkPSK15, author = {Hyunhee Park and Seunghyun Park and Taeshik Shon and Eui{-}Jik Kim}, title = {Multi-hop-based opportunistic concurrent directional transmission in 60 GHz WPANs}, journal = {Multim. Tools Appl.}, volume = {74}, number = {5}, pages = {1627--1644}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-1959-5}, doi = {10.1007/S11042-014-1959-5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ParkPSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SeoLS15, author = {Jung{-}Taek Seo and Seokjun Lee and Taeshik Shon}, title = {A study on memory dump analysis based on digital forensic tools}, journal = {Peer-to-Peer Netw. Appl.}, volume = {8}, number = {4}, pages = {694--703}, year = {2015}, url = {https://doi.org/10.1007/s12083-013-0217-3}, doi = {10.1007/S12083-013-0217-3}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SeoLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/EoJLS15, author = {Soowoong Eo and Wooyeon Jo and Seokjun Lee and Taeshik Shon}, title = {A Phase of Deleted File Recovery for Digital Forensics Research in Tizen}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292924}, doi = {10.1109/ICITCS.2015.7292924}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/EoJLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimLKS15, author = {Hyunjin Kim and Seokcheol Lee and SungJin Kim and Taeshik Shon}, title = {Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293013}, doi = {10.1109/ICITCS.2015.7293013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimLKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/KimKSK15, author = {Yoona Kim and Ki{-}Hyung Kim and Taeshik Shon and Jai{-}Hoon Kim}, title = {A hybrid service discovery approach to mitigate overhead concentration on resource directory}, booktitle = {2015 International Conference on Information Networking, {ICOIN} 2015, Siem Reap, Cambodia, January 12-14, 2015}, pages = {407--409}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICOIN.2015.7057928}, doi = {10.1109/ICOIN.2015.7057928}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/KimKSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/ChaSKH15, author = {Hyejin Cha and Taeshik Shon and Kangseok Kim and Manpyo Hong}, title = {Improving packet header compression with adaptive sliding window size}, booktitle = {2015 International Conference on Information Networking, {ICOIN} 2015, Siem Reap, Cambodia, January 12-14, 2015}, pages = {541--543}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICOIN.2015.7057966}, doi = {10.1109/ICOIN.2015.7057966}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/ChaSKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ChoiCCSP14, author = {Hyo Hyun Choi and Hyunsoo Choi and Myungwhan Choi and Taeshik Shon and ByoungSeob Park}, title = {An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/920534}, doi = {10.1155/2014/920534}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ChoiCCSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhangKCS14, author = {Yunlong Zhang and Joohee Kim and Ken Choi and Taeshik Shon}, title = {High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/736312}, doi = {10.1155/2014/736312}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhangKCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/LeeS14, author = {Seokjun Lee and Taeshik Shon}, title = {Physical Memory Collection and Analysis in Smart Grid Embedded System}, journal = {Mob. Networks Appl.}, volume = {19}, number = {3}, pages = {382--391}, year = {2014}, url = {https://doi.org/10.1007/s11036-014-0504-0}, doi = {10.1007/S11036-014-0504-0}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/LeeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ShonCHC14, author = {Taeshik Shon and Jaeik Cho and Kyusuk Han and Hyohyun Choi}, title = {Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction}, journal = {Mob. Networks Appl.}, volume = {19}, number = {3}, pages = {404--413}, year = {2014}, url = {https://doi.org/10.1007/s11036-014-0509-8}, doi = {10.1007/S11036-014-0509-8}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/ShonCHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ShinSYK14, author = {Soobok Shin and Taeshik Shon and Hongjin Yeh and Kangseok Kim}, title = {An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment}, journal = {Peer-to-Peer Netw. Appl.}, volume = {7}, number = {4}, pages = {612--619}, year = {2014}, url = {https://doi.org/10.1007/s12083-013-0220-8}, doi = {10.1007/S12083-013-0220-8}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ShinSYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhanSLK14, author = {Faraz Idris Khan and Taeshik Shon and Taekkyeun Lee and Ki{-}Hyung Kim}, title = {Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks}, journal = {Secur. Commun. Networks}, volume = {7}, number = {8}, pages = {1292--1309}, year = {2014}, url = {https://doi.org/10.1002/sec.1023}, doi = {10.1002/SEC.1023}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhanSLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimSSM14, author = {I Luk Kim and Jung{-}Taek Seo and Taeshik Shon and Jongsub Moon}, title = {A novel approach to detection of mobile rogue access points}, journal = {Secur. Commun. Networks}, volume = {7}, number = {10}, pages = {1510--1516}, year = {2014}, url = {https://doi.org/10.1002/sec.756}, doi = {10.1002/SEC.756}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimSSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LeeS14, author = {Seokjun Lee and Taeshik Shon}, title = {Improved deleted file recovery technique for Ext2/3 filesystem}, journal = {J. Supercomput.}, volume = {70}, number = {1}, pages = {20--30}, year = {2014}, url = {https://doi.org/10.1007/s11227-014-1282-y}, doi = {10.1007/S11227-014-1282-Y}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LeeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/MajoreYS14, author = {Sekie Amanuel Majore and Hyunguk Yoo and Taeshik Shon}, title = {Secure and reliable electronic record management system using digital forensic technologies}, journal = {J. Supercomput.}, volume = {70}, number = {1}, pages = {149--165}, year = {2014}, url = {https://doi.org/10.1007/s11227-014-1137-6}, doi = {10.1007/S11227-014-1137-6}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/MajoreYS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KwonYSL14, author = {SungMoon Kwon and Hyunguk Yoo and Taeshik Shon and GunWoong Lee}, title = {Scenario-Based Attack Route on Industrial Control System}, booktitle = {2014 International Conference on {IT} Convergence and Security, 10.1109/ICITCS.2014, Beijing, China, October 28-30, 2014}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICITCS.2014.7021809}, doi = {10.1109/ICITCS.2014.7021809}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KwonYSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeePLS14, author = {Seokcheol Lee and Yongmin Park and Hyunwoo Lim and Taeshik Shon}, title = {Study on Analysis of Security Vulnerabilities and Countermeasures in {ISO/IEC} 15118 Based Electric Vehicle Charging Technology}, booktitle = {2014 International Conference on {IT} Convergence and Security, 10.1109/ICITCS.2014, Beijing, China, October 28-30, 2014}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICITCS.2014.7021815}, doi = {10.1109/ICITCS.2014.7021815}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/LeePLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkLKS14, author = {Yongmin Park and Seokjun Lee and Jongwan Kim and Taeshik Shon}, title = {Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force}, booktitle = {2014 International Conference on {IT} Convergence and Security, 10.1109/ICITCS.2014, Beijing, China, October 28-30, 2014}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICITCS.2014.7021741}, doi = {10.1109/ICITCS.2014.7021741}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ParkLKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ShonHW13, author = {Taeshik Shon and Ching{-}Hsien Hsu and Isaac Woungang}, title = {Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {1}, pages = {1--2}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2012.12.012}, doi = {10.1016/J.COMPELECENG.2012.12.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/ShonHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KimYSK13, author = {Eui{-}Jik Kim and Sung{-}Kwan Youm and Taeshik Shon and Chul{-}Hee Kang}, title = {Stable pairwise time synchronization in the application layer for capillary machine-to-machine networks}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {7}, pages = {2207--2213}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2012.12.004}, doi = {10.1016/J.COMPELECENG.2012.12.004}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/KimYSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ShonG13, author = {Taeshik Shon and Danielo Goncalves Gomes}, title = {Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {7}, pages = {2330--2331}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2013.07.020}, doi = {10.1016/J.COMPELECENG.2013.07.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/ShonG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/ShonPLS13, author = {Taeshik Shon and Jong Hyuk Park and Costas Lambrinoudakis and Jean{-}Marc Seigneur}, title = {Special Issue on Advanced Information Security for Secure and Trust Computing}, journal = {Comput. Math. Appl.}, volume = {65}, number = {9}, pages = {1233}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2013.03.020}, doi = {10.1016/J.CAMWA.2013.03.020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/ShonPLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ShonCK13, author = {Taeshik Shon and Hyohyun Choi and Eui{-}Jik Kim}, title = {Joint routing and scheduling in multi-channel capillary machine-to-machine networks}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2013}, pages = {126}, year = {2013}, url = {https://doi.org/10.1186/1687-1499-2013-126}, doi = {10.1186/1687-1499-2013-126}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ShonCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/YoumSK13, author = {Sung{-}Kwan Youm and Taeshik Shon and Eui{-}Jik Kim}, title = {Integrated multicast routing algorithms considering traffic engineering for broadband {IPTV} services}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2013}, pages = {127}, year = {2013}, url = {https://doi.org/10.1186/1687-1499-2013-127}, doi = {10.1186/1687-1499-2013-127}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/YoumSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KoLLJS13, author = {Jongbin Ko and Seokjun Lee and Yong{-}hun Lim and Seong{-}ho Ju and Taeshik Shon}, title = {A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {96-D}, number = {9}, pages = {2021--2025}, year = {2013}, url = {https://doi.org/10.1587/transinf.E96.D.2021}, doi = {10.1587/TRANSINF.E96.D.2021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KoLLJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/KuCKSHYK13, author = {Yunlim Ku and Okkyung Choi and Kangseok Kim and Taeshik Shon and Manpyo Hong and Hongjin Yeh and Jai{-}Hoon Kim}, title = {Two-factor authentication system based on extended {OTP} mechanism}, journal = {Int. J. Comput. Math.}, volume = {90}, number = {12}, pages = {2515--2529}, year = {2013}, url = {https://doi.org/10.1080/00207160.2012.748901}, doi = {10.1080/00207160.2012.748901}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/KuCKSHYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ParkSPK13, author = {Hyunhee Park and Taeshik Shon and Seunghyun Park and Eui{-}Jik Kim}, title = {Adaptive anomaly control for alleviating the exclusive channel occupation in wireless networks}, journal = {Int. J. Commun. Syst.}, volume = {26}, number = {6}, pages = {720--731}, year = {2013}, url = {https://doi.org/10.1002/dac.2357}, doi = {10.1002/DAC.2357}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ParkSPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ShonVBSJZ13, author = {Taeshik Shon and Athanasios V. Vasilakos and Bharat K. Bhargava and Ivan Stojmenovic and Hai Jin and Albert Y. Zomaya}, title = {Editorial for Special Issue on "New Technologies and Applications for Wireless Communications {\&} Mobile Cloud Computing"}, journal = {Mob. Networks Appl.}, volume = {18}, number = {1}, pages = {98--102}, year = {2013}, url = {https://doi.org/10.1007/s11036-012-0420-0}, doi = {10.1007/S11036-012-0420-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/ShonVBSJZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/LeeCSSW13, author = {Junwon Lee and Jaeik Cho and Jung{-}Taek Seo and Taeshik Shon and Dongho Won}, title = {A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed}, journal = {Mob. Networks Appl.}, volume = {18}, number = {1}, pages = {122--128}, year = {2013}, url = {https://doi.org/10.1007/s11036-012-0375-1}, doi = {10.1007/S11036-012-0375-1}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/LeeCSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/HanKSK13, author = {Kyusuk Han and Jangseong Kim and Taeshik Shon and Daesik Ko}, title = {A novel secure key paring protocol for {RF4CE} ubiquitous smart home systems}, journal = {Pers. Ubiquitous Comput.}, volume = {17}, number = {5}, pages = {945--949}, year = {2013}, url = {https://doi.org/10.1007/s00779-012-0541-2}, doi = {10.1007/S00779-012-0541-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/HanKSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/ChungLSM13, author = {Manhyun Chung and Younghoon Lee and Taeshik Shon and Jongsub Moon}, title = {A security model for {IPTV} with one-time password and Conditional Access System for smart mobile platform}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {1399--1407}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9652-8}, doi = {10.1007/S11235-011-9652-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/ChungLSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/KooHPS13, author = {Bonhyun Koo and Kyusuk Han and James J. Park and Taeshik Shon}, title = {Design and implementation of a wireless sensor network architecture using smart mobile devices}, journal = {Telecommun. Syst.}, volume = {52}, number = {4}, pages = {2311--2320}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9535-z}, doi = {10.1007/S11235-011-9535-Z}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/KooHPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ChoSCM13, author = {Jaeik Cho and Taeshik Shon and Ken Choi and Jongsub Moon}, title = {Dynamic learning model update of hybrid-classifiers for intrusion detection}, journal = {J. Supercomput.}, volume = {64}, number = {2}, pages = {522--526}, year = {2013}, url = {https://doi.org/10.1007/s11227-011-0698-x}, doi = {10.1007/S11227-011-0698-X}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ChoSCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KooLS13, author = {Bonhyun Koo and Yang Sun Lee and Taeshik Shon}, title = {A novel approach to visualize web anomaly attacks in pervasive computing environment}, journal = {J. Supercomput.}, volume = {65}, number = {1}, pages = {301--316}, year = {2013}, url = {https://doi.org/10.1007/s11227-010-0520-1}, doi = {10.1007/S11227-010-0520-1}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KooLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ShonWSX13, author = {Taeshik Shon and Shiuh{-}Jeng Wang and Lei Shu and Liudong Xing}, title = {Editorial of special section on advanced in high performance, algorithm, and framework for future computing}, journal = {J. Supercomput.}, volume = {65}, number = {2}, pages = {483}, year = {2013}, url = {https://doi.org/10.1007/s11227-013-0963-2}, doi = {10.1007/S11227-013-0963-2}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ShonWSX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimYSK13, author = {Eui{-}Jik Kim and Sung{-}Kwan Youm and Taeshik Shon and Chul{-}Hee Kang}, title = {Asynchronous inter-network interference avoidance for wireless body area networks}, journal = {J. Supercomput.}, volume = {65}, number = {2}, pages = {562--579}, year = {2013}, url = {https://doi.org/10.1007/s11227-012-0840-4}, doi = {10.1007/S11227-012-0840-4}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KimYSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ChoiNSC13, author = {Hyo Hyun Choi and Su Hyun Nam and Taeshik Shon and Myungwhan Choi}, title = {Information delivery scheme of micro UAVs having limited communication range during tracking the moving target}, journal = {J. Supercomput.}, volume = {66}, number = {2}, pages = {950--972}, year = {2013}, url = {https://doi.org/10.1007/s11227-013-0931-x}, doi = {10.1007/S11227-013-0931-X}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ChoiNSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LimKLKKS13, author = {Hyunwoo Lim and Jongbin Ko and Seokjun Lee and Jongwan Kim and Mijoo Kim and Taeshik Shon}, title = {Security Architecture Model for Smart Grid Communication Systems}, booktitle = {2013 International Conference on {IT} Convergence and Security, {ICITCS} 2013, Macau, China, December 16-18, 2013}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICITCS.2013.6717880}, doi = {10.1109/ICITCS.2013.6717880}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/LimKLKKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/HanKCCSS12, author = {Kyusuk Han and Kwangjo Kim and Wook Choi and Hyo Hyun Choi and Jung{-}Taek Seo and Taeshik Shon}, title = {Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {14}, number = {3-4}, pages = {251--269}, year = {2012}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-14-number-3-4-2012/ahswn-14-3-4-p-251-269/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/HanKCCSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimBZS12, author = {Jangseong Kim and Joonsang Baek and Jianying Zhou and Taeshik Shon}, title = {An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {1}, pages = {117--125}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.117}, doi = {10.1587/TRANSINF.E95.D.117}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimBZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/KimSPK12, author = {Eui{-}Jik Kim and Taeshik Shon and Hyunhee Park and Chul{-}Hee Kang}, title = {Latency bounded and energy efficient {MAC} for wireless sensor networks}, journal = {{IET} Commun.}, volume = {6}, number = {14}, pages = {2120--2127}, year = {2012}, url = {https://doi.org/10.1049/iet-com.2011.0700}, doi = {10.1049/IET-COM.2011.0700}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/KimSPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/KimKPS12, author = {Jangseong Kim and Kwangjo Kim and Jong Hyuk Park and Taeshik Shon}, title = {A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment}, journal = {Math. Comput. Model.}, volume = {55}, number = {1-2}, pages = {45--57}, year = {2012}, url = {https://doi.org/10.1016/j.mcm.2011.01.012}, doi = {10.1016/J.MCM.2011.01.012}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/KimKPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/ParkCSD12, author = {Jong Hyuk Park and Han{-}Chieh Chao and Taeshik Shon and Mieso K. Denko}, title = {Guest editorial: Theme issue on smartphone applications and services for pervasive computing}, journal = {Pers. Ubiquitous Comput.}, volume = {16}, number = {6}, pages = {611--612}, year = {2012}, url = {https://doi.org/10.1007/s00779-011-0429-6}, doi = {10.1007/S00779-011-0429-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/ParkCSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/HanMSYP12, author = {Kyusuk Han and Hyeran Mun and Taeshik Shon and Chan Yeob Yeun and Jong Hyuk Park}, title = {Secure and efficient public key management in next generation mobile networks}, journal = {Pers. Ubiquitous Comput.}, volume = {16}, number = {6}, pages = {677--685}, year = {2012}, url = {https://doi.org/10.1007/s00779-011-0434-9}, doi = {10.1007/S00779-011-0434-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/HanMSYP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShonPP12, author = {Taeshik Shon and Jong Hyuk Park and Doo{-}Soon Park}, title = {Improved {RF4CE} key agreement approach involving two-phase key distribution for smart-convergence home device}, journal = {Secur. Commun. Networks}, volume = {5}, number = {9}, pages = {974--986}, year = {2012}, url = {https://doi.org/10.1002/sec.382}, doi = {10.1002/SEC.382}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShonPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShonLZ12, author = {Taeshik Shon and Costas Lambrinoudakis and Xiaobo Zhou}, title = {Special issue on next generation communication and network security}, journal = {Secur. Commun. Networks}, volume = {5}, number = {10}, pages = {1083--1085}, year = {2012}, url = {https://doi.org/10.1002/sec.636}, doi = {10.1002/SEC.636}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ShonLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/ShonC11, author = {Taeshik Shon and Hyohyun Choi}, title = {An Approach for Efficient Hybrid Reliable Transport in {IEEE} 802.15.4-based Wireless Sensor Network}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {11}, number = {3-4}, pages = {199--217}, year = {2011}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-11-number-3-4-2011/ahswn-11-3-4-p-199-217/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/ShonC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ShonHPC11, author = {Taeshik Shon and Kyusuk Han and Jong Hyuk Park and Hangbae Chang}, title = {A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/210746}, doi = {10.1155/2011/210746}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ShonHPC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ShonHPJL11, author = {Taeshik Shon and Kyusuk Han and James J. Park and Young{-}Sik Jeong and Yang Sun Lee}, title = {A Secure and Robust Connectivity Architecture for Smart Devices and Applications}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/176393}, doi = {10.1155/2011/176393}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ShonHPJL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimSK11, author = {Jangseong Kim and Taeshik Shon and Kwangjo Kim}, title = {Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment}, journal = {{IEICE} Trans. Commun.}, volume = {94-B}, number = {3}, pages = {686--689}, year = {2011}, url = {https://doi.org/10.1587/transcom.E94.B.686}, doi = {10.1587/TRANSCOM.E94.B.686}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanKS11, author = {Kyusuk Han and Kwangjo Kim and Taeshik Shon}, title = {Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {6}, pages = {1181--1184}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.1181}, doi = {10.1587/TRANSINF.E94.D.1181}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanSK11, author = {Kyusuk Han and Taeshik Shon and Kwangjo Kim}, title = {Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security}, journal = {{IEICE} Trans. Commun.}, volume = {94-B}, number = {8}, pages = {2235--2238}, year = {2011}, url = {https://doi.org/10.1587/transcom.E94.B.2235}, doi = {10.1587/TRANSCOM.E94.B.2235}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/HanKPS11, author = {Kyusuk Han and Kwangjo Kim and Jong Hyuk Park and Taeshik Shon}, title = {Efficient sensor node authentication in third generation-wireless sensor networks integrated networks}, journal = {{IET} Commun.}, volume = {5}, number = {12}, pages = {1744--1754}, year = {2011}, url = {https://doi.org/10.1049/iet-com.2010.0539}, doi = {10.1049/IET-COM.2010.0539}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/HanKPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/HanYSPK11, author = {Kyusuk Han and Chan Yeob Yeun and Taeshik Shon and Jong Hyuk Park and Kwangjo Kim}, title = {A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication}, journal = {Int. J. Commun. Syst.}, volume = {24}, number = {4}, pages = {461--472}, year = {2011}, url = {https://doi.org/10.1002/dac.1165}, doi = {10.1002/DAC.1165}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/HanYSPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/KooCPS11, author = {Bonhyun Koo and Wook Choi and James J. Park and Taeshik Shon}, title = {A novel low-power RF4CE-based communication framework for multimedia system control}, journal = {Int. J. Commun. Syst.}, volume = {24}, number = {10}, pages = {1340--1353}, year = {2011}, url = {https://doi.org/10.1002/dac.1223}, doi = {10.1002/DAC.1223}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/KooCPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/HanSYPS11, author = {Kyusuk Han and Youngjoon Seo and Sungjune Yoon and James J. Park and Taeshik Shon}, title = {Providing security vertical handoff in {SARAH} for heterogeneous networks}, journal = {J. Netw. Comput. Appl.}, volume = {34}, number = {6}, pages = {1903--1907}, year = {2011}, url = {https://doi.org/10.1016/j.jnca.2011.01.006}, doi = {10.1016/J.JNCA.2011.01.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/HanSYPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KimSPJ11, author = {Eui{-}Jik Kim and Taeshik Shon and James Jong Hyuk Park and Young{-}Sik Jeong}, title = {Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks}, journal = {Sensors}, volume = {11}, number = {7}, pages = {6629--6644}, year = {2011}, url = {https://doi.org/10.3390/s110706629}, doi = {10.3390/S110706629}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/KimSPJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/KimBS11, author = {Jangseong Kim and Joonsang Baek and Taeshik Shon}, title = {An efficient and scalable re-authentication protocol over wireless sensor network}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {57}, number = {2}, pages = {516--522}, year = {2011}, url = {https://doi.org/10.1109/TCE.2011.5955187}, doi = {10.1109/TCE.2011.5955187}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/KimBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ShonHX11, author = {Taeshik Shon and Ching{-}Hsien Hsu and Liudong Xing}, title = {Editorial: Special Issue on "Advanced Technologies and Practices in Recent Wireless Sensor Networks"}, journal = {Wirel. Pers. Commun.}, volume = {60}, number = {3}, pages = {385--388}, year = {2011}, url = {https://doi.org/10.1007/s11277-011-0296-5}, doi = {10.1007/S11277-011-0296-5}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ShonHX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/ChoLSS11, author = {Jaeik Cho and Junwon Lee and Jung{-}Taek Seo and Taeshik Shon}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa}, title = {A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors}, booktitle = {The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011}, pages = {573--577}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/NBiS.2011.95}, doi = {10.1109/NBIS.2011.95}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/ChoLSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sta/ChoCSM11, author = {Jaeik Cho and Kyuwon Choi and Taeshik Shon and Jongsub Moon}, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {A Network Data Abstraction Method for Data Set Verification}, booktitle = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, pages = {54--62}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6\_7}, doi = {10.1007/978-3-642-22339-6\_7}, timestamp = {Mon, 08 Apr 2019 12:52:12 +0200}, biburl = {https://dblp.org/rec/conf/sta/ChoCSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sta/2011, editor = {James J. Park and Javier L{\'{o}}pez and Sang{-}Soo Yeo and Taeshik Shon and David Taniar}, title = {Secure and Trust Computing, Data Management and Applications - 8th {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June 28-30, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {186}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22339-6}, doi = {10.1007/978-3-642-22339-6}, isbn = {978-3-642-22338-9}, timestamp = {Mon, 08 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sta/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ShonKPC10, author = {Taeshik Shon and Bonhyun Koo and Jong Hyuk Park and Hangbae Chang}, title = {Novel Approaches to Enhance Mobile WiMAX Security}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/926275}, doi = {10.1155/2010/926275}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ShonKPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShonKIP10, author = {Taeshik Shon and Eui{-}Jik Kim and Jeongsik In and Yongsuk Park}, title = {Design and Implementation of Hybrid MAC-Based Robust Architecture for Wireless Sensor Network}, journal = {{IEICE} Trans. Commun.}, volume = {93-B}, number = {4}, pages = {1016--1019}, year = {2010}, url = {https://doi.org/10.1587/transcom.E93.B.1016}, doi = {10.1587/TRANSCOM.E93.B.1016}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShonKIP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KooS10, author = {Bonhyun Koo and Taeshik Shon}, title = {Implementation of a WSN-Based Structural Health Monitoring Architecture Using 3D and {AR} Mode}, journal = {{IEICE} Trans. Commun.}, volume = {93-B}, number = {11}, pages = {2963--2966}, year = {2010}, url = {https://doi.org/10.1587/transcom.E93.B.2963}, doi = {10.1587/TRANSCOM.E93.B.2963}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KooS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HanKS10, author = {Kyusuk Han and Kwangjo Kim and Taeshik Shon}, title = {Untraceable Mobile Node Authentication in {WSN}}, journal = {Sensors}, volume = {10}, number = {5}, pages = {4410--4429}, year = {2010}, url = {https://doi.org/10.3390/s100504410}, doi = {10.3390/S100504410}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HanKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/HanSK10, author = {Kyusuk Han and Taeshik Shon and Kwangjo Kim}, title = {Efficient mobile sensor authentication in smart home and {WPAN}}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {56}, number = {2}, pages = {591--596}, year = {2010}, url = {https://doi.org/10.1109/TCE.2010.5505975}, doi = {10.1109/TCE.2010.5505975}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/HanSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HanKKS10, author = {Kyusuk Han and Jangseong Kim and Kwangjo Kim and Taeshik Shon}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Efficient sensor node authentication via 3GPP mobile communication networks}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {687--689}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866398}, doi = {10.1145/1866307.1866398}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HanKKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/ShonP10, author = {Taeshik Shon and Yongsuk Park}, editor = {Leonard Barolli and Fatos Xhafa and Salvatore Vitabile and Hui{-}Huang Hsu}, title = {Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home}, booktitle = {{CISIS} 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010}, pages = {779--783}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CISIS.2010.36}, doi = {10.1109/CISIS.2010.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/ShonP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KooAIPS10, author = {Bonhyun Koo and Taewon Ahn and JungSik In and Yongsuk Park and Taeshik Shon}, editor = {Bernady O. Apduhan and Osvaldo Gervasi and Andr{\'{e}}s Iglesias and David Taniar and Marina L. Gavrilova}, title = {{R-URC:} RF4CE-Based Universal Remote Control Framework Using Smartphone}, booktitle = {Prodeedings of the 2010 International Conference on Computational Science and Its Applications, {ICCSA} 2010, Fukuoka, Japan, March 23-26, 2010}, pages = {311--314}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICCSA.2010.73}, doi = {10.1109/ICCSA.2010.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/KooAIPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HanMS10, author = {Kyusuk Han and Hyeran Mun and Taeshik Shon}, title = {Design of secure key agreement protocol for pairing in {RF4CE}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678042/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HanMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShonP09, author = {Taeshik Shon and Yongsuk Park}, title = {A Hybrid Adaptive Security Framework for {IEEE} 802.15.4-based Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {3}, number = {6}, pages = {597--611}, year = {2009}, url = {https://doi.org/10.3837/tiis.2009.06.002}, doi = {10.3837/TIIS.2009.06.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShonP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icost/KooCS09, author = {Bonhyun Koo and Hyohyun Choi and Taeshik Shon}, editor = {Mounir Mokhtari and Ismail Khalil and J{\'{e}}r{\'{e}}my Bauchet and Daqing Zhang and Chris D. Nugent}, title = {{WIVA:} {WSN} Monitoring Framework Based on 3D Visualization and Augmented Reality in Mobile Devices}, booktitle = {Ambient Assistive Health and Wellness Management in the Heart of the City, 7th International Conference on Smart Homes and Health Telematics, {ICOST} 2009, Tours, France, July 1-3, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5597}, pages = {158--165}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02868-7\_20}, doi = {10.1007/978-3-642-02868-7\_20}, timestamp = {Tue, 21 Mar 2023 21:01:52 +0100}, biburl = {https://dblp.org/rec/conf/icost/KooCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/KimISPJ09, author = {Eui{-}Jik Kim and Jeongsik In and Taeshik Shon and Yongsuk Park and Bong Wan Jun}, editor = {Arjan Durresi and Leonard Barolli and Tomoya Enokido and Minoru Uehara and Elhadi M. Shakshuki and Makoto Takizawa}, title = {Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks}, booktitle = {NBiS 2009, 12th International Conference on Network-Based Information Systems, Indianapolis, Indiana, USA, 19-21 August 2009}, pages = {115--120}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NBiS.2009.45}, doi = {10.1109/NBIS.2009.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/KimISPJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/ShonC08, author = {Taeshik Shon and Hyohyun Choi}, editor = {Frode Eika Sandnes and Yan Zhang and Chunming Rong and Laurence Tianruo Yang and Jianhua Ma}, title = {Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks}, booktitle = {Ubiquitous Intelligence and Computing, 5th International Conference, {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5061}, pages = {363--372}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69293-5\_29}, doi = {10.1007/978-3-540-69293-5\_29}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/ShonC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShonM07, author = {Taeshik Shon and Jongsub Moon}, title = {A hybrid machine learning approach to network anomaly detection}, journal = {Inf. Sci.}, volume = {177}, number = {18}, pages = {3799--3821}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2007.03.025}, doi = {10.1016/J.INS.2007.03.025}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LeeSCCSM07, author = {Minsoo Lee and Taeshik Shon and Kyuhyung Cho and Manhyun Chung and Jung{-}Taek Seo and Jongsub Moon}, editor = {De{-}Shuang Huang and Laurent Heutte and Marco Loog}, title = {An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows}, booktitle = {Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, Third International Conference on Intelligent Computing, {ICIC} 2007, Qingdao, China, August 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4681}, pages = {646--655}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74171-8\_64}, doi = {10.1007/978-3-540-74171-8\_64}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icic/LeeSCCSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/ShonC07, author = {Taeshik Shon and Wook Choi}, editor = {Tomoya Enokido and Leonard Barolli and Makoto Takizawa}, title = {An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions}, booktitle = {Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4658}, pages = {88--97}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74573-0\_10}, doi = {10.1007/978-3-540-74573-0\_10}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/nbis/ShonC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/ChoiSCL07, author = {Wook Choi and Taeshik Shon and Hyohyun Choi and Y. Lee}, title = {Designing a Novel Unlicensed Nomadic Access Relay Station in {IEEE} 802.16-Based Wireless Access Networks}, booktitle = {Proceedings of the 65th {IEEE} Vehicular Technology Conference, {VTC} Spring 2007, 22-25 April 2007, Dublin, Ireland}, pages = {2961--2965}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/VETECS.2007.607}, doi = {10.1109/VETECS.2007.607}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/ChoiSCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ShonKM06, author = {Taeshik Shon and Xeno Kovah and Jongsub Moon}, title = {Applying genetic algorithm for classifying anomalous {TCP/IP} packets}, journal = {Neurocomputing}, volume = {69}, number = {16-18}, pages = {2429--2433}, year = {2006}, url = {https://doi.org/10.1016/j.neucom.2006.01.023}, doi = {10.1016/J.NEUCOM.2006.01.023}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ShonKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/SeoKPLSM06, author = {Jung{-}Taek Seo and Yun{-}ju Kim and Eung Ki Park and Sang{-}Won Lee and Taeshik Shon and Jongsub Moon}, editor = {Lipo Wang and Licheng Jiao and Guangming Shi and Xue Li and Jing Liu}, title = {Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms}, booktitle = {Fuzzy Systems and Knowledge Discovery, Third International Conference, {FSKD} 2006, Xi'an, China, September 24-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4223}, pages = {716--724}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11881599\_87}, doi = {10.1007/11881599\_87}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fskd/SeoKPLSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/SeoLSCM05, author = {Jung{-}Taek Seo and Cheolho Lee and Taeshik Shon and Kyuhyung Cho and Jongsub Moon}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan{-}Shun Dai and Laurence Tianruo Yang}, title = {A New DDoS Detection Model Using Multiple SVMs and {TRA}}, booktitle = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3823}, pages = {976--985}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596042\_100}, doi = {10.1007/11596042\_100}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/SeoLSCM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/SeoLKSM05, author = {Jung{-}Taek Seo and Cheolho Lee and Jungtae Kim and Taeshik Shon and Jongsub Moon}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan{-}Shun Dai and Laurence Tianruo Yang}, title = {{PPF} Model with {CTNT} to Defend Web Server from DDoS Attack}, booktitle = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3823}, pages = {986--995}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596042\_101}, doi = {10.1007/11596042\_101}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/SeoLKSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/SeoLSM05, author = {Jung{-}Taek Seo and Cheolho Lee and Taeshik Shon and Jongsub Moon}, editor = {Hai Zhuge and Geoffrey C. Fox}, title = {{SVM} Approach with {CTNT} to Detect DDoS Attacks in Grid Computing}, booktitle = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3795}, pages = {59--70}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11590354\_7}, doi = {10.1007/11590354\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcc/SeoLSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/ShonSM05, author = {Taeshik Shon and Jung{-}Taek Seo and Jongsub Moon}, editor = {Pinar Yolum and Tunga G{\"{u}}ng{\"{o}}r and Fikret S. G{\"{u}}rgen and Can C. {\"{O}}zturan}, title = {{SVM} Approach with a Genetic Algorithm for Network Intrusion Detection}, booktitle = {Computer and Information Sciences - {ISCIS} 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3733}, pages = {224--233}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11569596\_25}, doi = {10.1007/11569596\_25}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscis/ShonSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/SeoLKSM05, author = {Jung{-}Taek Seo and Cheolho Lee and Jungtae Kim and Taeshik Shon and Jongsub Moon}, editor = {Hai Jin and Daniel A. Reed and Wenbin Jiang}, title = {Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks}, booktitle = {Network and Parallel Computing, {IFIP} International Conference, {NPC} 2005, Beijing, China, November 30 - December 3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3779}, pages = {351--354}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11577188\_50}, doi = {10.1007/11577188\_50}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/npc/SeoLKSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/others/05/SeoLSM05, author = {Jungtaek Seo and Cheolho Lee and Taeshik Shon and Jongsub Moon}, editor = {Tuna Tugcu and Erol Gelenbe and M. Ufuk {\c{C}}aglayan and Fatih Alag{\"{o}}z}, title = {A New Approach to Detect DDoS Attacks using Support Vector Machine}, booktitle = {New Trends in Computer Networks}, series = {Advances in Computer Science and Engineering : Reports and Monographs}, volume = {1}, publisher = {Imperial College Press}, year = {2005}, url = {https://doi.org/10.1142/9781860947308\_0020}, doi = {10.1142/9781860947308\_0020}, timestamp = {Mon, 22 Jun 2020 14:58:58 +0200}, biburl = {https://dblp.org/rec/books/others/05/SeoLSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/ShonSM04, author = {Taeshik Shon and Jung{-}Taek Seo and Jongsub Moon}, editor = {Hai Jin and Yi Pan and Nong Xiao and Jianhua Sun}, title = {Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments}, booktitle = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3251}, pages = {891--894}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30208-7\_131}, doi = {10.1007/978-3-540-30208-7\_131}, timestamp = {Fri, 26 Feb 2021 08:55:11 +0100}, biburl = {https://dblp.org/rec/conf/gcc/ShonSM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intellcomm/ShonMC04, author = {Taeshik Shon and Jongsub Moon and HongMin Choi}, editor = {Finn Arve Aagesen and Chutiporn Anutariya and Vilas Wuwongse}, title = {Effciency Evaluation for Key Distribution Models in Satellite Terminals}, booktitle = {Intelligence in Communication Systems, {IFIP} International Conference, {INTELLCOMM} 2004, Bangkok, Thailand, November 23-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3283}, pages = {92--99}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30179-0\_8}, doi = {10.1007/978-3-540-30179-0\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/intellcomm/ShonMC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/MoonSSKS04, author = {Jongsub Moon and Taeshik Shon and Jung{-}Taek Seo and Jongho Kim and Jungwoo Seo}, editor = {Cevdet Aykanat and Tugrul Dayar and Ibrahim Korpeoglu}, title = {An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing}, booktitle = {Computer and Information Sciences - {ISCIS} 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3280}, pages = {351--362}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30182-0\_36}, doi = {10.1007/978-3-540-30182-0\_36}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iscis/MoonSSKS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/SeoCPSM04, author = {Jung{-}Taek Seo and Dae{-}Sik Choi and Eung Ki Park and Taeshik Shon and Jongsub Moon}, editor = {Kim{-}Meow Liew and Hong Shen and Simon See and Wentong Cai and Pingzhi Fan and Susumu Horiguchi}, title = {Patch Management System for Multi-platform Environment}, booktitle = {Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, {PDCAT} 2004, Singapore, December 8-10, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3320}, pages = {654--661}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30501-9\_126}, doi = {10.1007/978-3-540-30501-9\_126}, timestamp = {Fri, 12 Jun 2020 16:01:21 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/SeoCPSM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/SohnMLIS03, author = {Taeshik Shon and Jongsub Moon and Cheolwon Lee and Eul{-}Gyu Im and Jung{-}Taek Seo}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {Safe Patch Distribution Architecture in Intranet Environments}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2}, pages = {455--460}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Fri, 10 Aug 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/SohnMLIS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SohnSM03, author = {Taeshik Shon and Jung{-}Taek Seo and Jongsub Moon}, editor = {Sihan Qing and Dieter Gollmann and Jianying Zhou}, title = {A Study on the Covert Channel Detection of {TCP/IP} Header Using Support Vector Machine}, booktitle = {Information and Communications Security, 5th International Conference, {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2836}, pages = {313--324}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39927-8\_29}, doi = {10.1007/978-3-540-39927-8\_29}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/SohnSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/SohnMLLL03, author = {Taeshik Shon and Jongsub Moon and Sangjin Lee and Dong Hoon Lee and Jongin Lim}, editor = {Adnan Yazici and Cevat Sener}, title = {Covert Channel Detection in the {ICMP} Payload Using Support Vector Machine}, booktitle = {Computer and Information Sciences - {ISCIS} 2003, 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2869}, pages = {828--835}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39737-3\_103}, doi = {10.1007/978-3-540-39737-3\_103}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscis/SohnMLLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SohnNM03, author = {Taeshik Shon and Taewoo Noh and Jongsub Moon}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Support Vector Machine Based {ICMP} Covert Channel Attack Detection}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {461--464}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_46}, doi = {10.1007/978-3-540-45215-7\_46}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SohnNM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.