BibTeX records: Taeshik Shon

download as .bib file

@article{DBLP:journals/di/KimOS23,
  author       = {Donghyun Kim and
                  Subin Oh and
                  Taeshik Shon},
  title        = {Digital forensic approaches for metaverse ecosystems},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301608},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301608},
  doi          = {10.1016/J.FSIDI.2023.301608},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KimOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimSJS23,
  author       = {Minju Kim and
                  Yeonghun Shin and
                  Wooyeon Jo and
                  Taeshik Shon},
  title        = {Digital forensic analysis of intelligent and smart IoT devices},
  journal      = {J. Supercomput.},
  volume       = {79},
  number       = {1},
  pages        = {973--997},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11227-022-04639-5},
  doi          = {10.1007/S11227-022-04639-5},
  timestamp    = {Sat, 14 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/KimSJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/JoKKSS22,
  author       = {Wooyeon Jo and
                  SungJin Kim and
                  Hyunjin Kim and
                  Yeonghun Shin and
                  Taeshik Shon},
  title        = {Automatic whitelist generation system for ethernet based in-vehicle
                  network},
  journal      = {Comput. Ind.},
  volume       = {142},
  pages        = {103735},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compind.2022.103735},
  doi          = {10.1016/J.COMPIND.2022.103735},
  timestamp    = {Wed, 14 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/JoKKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KimSKJKS22,
  author       = {Hyungchan Kim and
                  Yeonghun Shin and
                  Sungbum Kim and
                  Wooyeon Jo and
                  Minju Kim and
                  Taeshik Shon},
  title        = {Digital Forensic Analysis to Improve User Privacy on Android},
  journal      = {Sensors},
  volume       = {22},
  number       = {11},
  pages        = {3971},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22113971},
  doi          = {10.3390/S22113971},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KimSKJKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ShinKJS22,
  author       = {Yeonghun Shin and
                  Sungbum Kim and
                  Wooyeon Jo and
                  Taeshik Shon},
  title        = {Digital Forensic Case Studies for In-Vehicle Infotainment Systems
                  Using Android Auto and Apple CarPlay},
  journal      = {Sensors},
  volume       = {22},
  number       = {19},
  pages        = {7196},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22197196},
  doi          = {10.3390/S22197196},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ShinKJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimJLS22,
  author       = {Sungbum Kim and
                  Wooyeon Jo and
                  Jino Lee and
                  Taeshik Shon},
  title        = {AI-enabled device digital forensics for smart cities},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {2},
  pages        = {3029--3044},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11227-021-03992-1},
  doi          = {10.1007/S11227-021-03992-1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KimJLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimS22,
  author       = {HyunJin Kim and
                  Taeshik Shon},
  title        = {Industrial network-based behavioral anomaly detection in AI-enabled
                  smart manufacturing},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {11},
  pages        = {13554--13563},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11227-022-04408-4},
  doi          = {10.1007/S11227-022-04408-4},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KimS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimKJKS21,
  author       = {Hyunjin Kim and
                  Sungjin Kim and
                  Wooyeon Jo and
                  Ki{-}Hyun Kim and
                  Taeshik Shon},
  title        = {Unknown Payload Anomaly Detection Based on Format and Field Semantics
                  Inference in Cyber-Physical Infrastructure Systems},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {75542--75552},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3080081},
  doi          = {10.1109/ACCESS.2021.3080081},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KimKJKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KwonYS20,
  author       = {SungMoon Kwon and
                  Hyunguk Yoo and
                  Taeshik Shon},
  title        = {{IEEE} 1815.1-Based Power System Security With Bidirectional RNN-Based
                  Network Anomalous Attack Detection for Cyber-Physical System},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {77572--77586},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2989770},
  doi          = {10.1109/ACCESS.2020.2989770},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KwonYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/KimJS20,
  author       = {SungJin Kim and
                  Wooyeon Jo and
                  Taeshik Shon},
  title        = {{APAD:} Autoencoder-based Payload Anomaly Detection for industrial
                  IoE},
  journal      = {Appl. Soft Comput.},
  volume       = {88},
  pages        = {106017},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.asoc.2019.106017},
  doi          = {10.1016/J.ASOC.2019.106017},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/KimJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChaudhrySAA20,
  author       = {Shehzad Ashraf Chaudhry and
                  Taeshik Shon and
                  Fadi Al{-}Turjman and
                  Mohammed H. Alsharif},
  title        = {Correcting design flaws: An improved and cloud assisted key agreement
                  scheme in cyber physical systems},
  journal      = {Comput. Commun.},
  volume       = {153},
  pages        = {527--537},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.02.025},
  doi          = {10.1016/J.COMCOM.2020.02.025},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChaudhrySAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShinKKYJS20,
  author       = {Yeonghun Shin and
                  Hyungchan Kim and
                  Sungbum Kim and
                  Dongkyun Yoo and
                  Wooyeon Jo and
                  Taeshik Shon},
  title        = {Certificate Injection-Based Encrypted Traffic Forensics in {AI} Speaker
                  Ecosystem},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301010},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301010},
  doi          = {10.1016/J.FSIDI.2020.301010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShinKKYJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/JeongKHKS20,
  author       = {Jaehan Jeong and
                  SungMoon Kwon and
                  Man{-}Pyo Hong and
                  Jin Kwak and
                  Taeshik Shon},
  title        = {Adversarial attack-based security vulnerability verification using
                  deep learning library for multimedia video surveillance},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {23-24},
  pages        = {16077--16091},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-7262-8},
  doi          = {10.1007/S11042-019-7262-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/JeongKHKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeJES20,
  author       = {Seokjun Lee and
                  Wooyeon Jo and
                  Soowoong Eo and
                  Taeshik Shon},
  title        = {ExtSFR: scalable file recovery framework based on an Ext file system},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {23-24},
  pages        = {16093--16111},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-7199-y},
  doi          = {10.1007/S11042-019-7199-Y},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeJES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimCLS20,
  author       = {SungJin Kim and
                  Jaeik Cho and
                  Changhoon Lee and
                  Taeshik Shon},
  title        = {Smart seed selection-based effective black box fuzzing for IIoT protocol},
  journal      = {J. Supercomput.},
  volume       = {76},
  number       = {12},
  pages        = {10140--10154},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11227-020-03245-7},
  doi          = {10.1007/S11227-020-03245-7},
  timestamp    = {Mon, 19 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KimCLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ChaudhryKRFS19,
  author       = {Shehzad Ashraf Chaudhry and
                  I Luk Kim and
                  Seungmin Rho and
                  Mohammad Sabzinejad Farash and
                  Taeshik Shon},
  title        = {An improved anonymous authentication scheme for distributed mobile
                  cloud computing services},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Suppl 1},
  pages        = {1595--1609},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-017-1088-9},
  doi          = {10.1007/S10586-017-1088-9},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ChaudhryKRFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JoSKYKKJONS19,
  author       = {Wooyeon Jo and
                  Yeonghun Shin and
                  Hyungchan Kim and
                  Dongkyun Yoo and
                  Donghyun Kim and
                  Cheulhoon Kang and
                  Jongmin Jin and
                  Jungkyung Oh and
                  Bitna Na and
                  Taeshik Shon},
  title        = {Digital Forensic Practices and Methodologies for {AI} Speaker Ecosystems},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S80--S93},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.013},
  doi          = {10.1016/J.DIIN.2019.04.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JoSKYKKJONS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimJKS19,
  author       = {Myungjong Kim and
                  Wooyeon Jo and
                  Jaehoon Kim and
                  Taeshik Shon},
  title        = {Visualization for internet of things: power system and financial network
                  cases},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {3},
  pages        = {3241--3265},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6730-x},
  doi          = {10.1007/S11042-018-6730-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimJKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/KwonYS19,
  author       = {SungMoon Kwon and
                  Hyunguk Yoo and
                  Taeshik Shon},
  title        = {RNN-based Anomaly Detection in {DNP3} Transport Layer},
  booktitle    = {2019 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing,
                  China, October 21-23, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartGridComm.2019.8909701},
  doi          = {10.1109/SMARTGRIDCOMM.2019.8909701},
  timestamp    = {Sun, 08 Dec 2019 17:30:04 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/KwonYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LeeKCS18,
  author       = {Seokcheol Lee and
                  SungJin Kim and
                  Ken Choi and
                  Taeshik Shon},
  title        = {Game theory-based Security Vulnerability Quantification for Social
                  Internet of Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {82},
  pages        = {752--760},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.09.032},
  doi          = {10.1016/J.FUTURE.2017.09.032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LeeKCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KwonJS18,
  author       = {SungMoon Kwon and
                  Jaehan Jeong and
                  Taeshik Shon},
  title        = {Toward Security Enhanced Provisioning in Industrial IoT Systems},
  journal      = {Sensors},
  volume       = {18},
  number       = {12},
  pages        = {4372},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18124372},
  doi          = {10.3390/S18124372},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KwonJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChaudhryNFSS18,
  author       = {Shehzad Ashraf Chaudhry and
                  Husnain Naqvi and
                  Mohammad Sabzinejad Farash and
                  Taeshik Shon and
                  Muhammad Sher},
  title        = {An improved and robust biometrics-based three factor authentication
                  scheme for multiserver environments},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {8},
  pages        = {3504--3520},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-015-1601-y},
  doi          = {10.1007/S11227-015-1601-Y},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ChaudhryNFSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/JoCS18,
  author       = {Wooyeon Jo and
                  Hyun Soo Chang and
                  Taeshik Shon},
  title        = {Digital forensic science approach by file recovery research},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {8},
  pages        = {3704--3725},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-016-1909-2},
  doi          = {10.1007/S11227-016-1909-2},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/JoCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimS18,
  author       = {SungJin Kim and
                  Taeshik Shon},
  title        = {Field classification-based novel fuzzing case generation for {ICS}
                  protocols},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {9},
  pages        = {4434--4450},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-017-1980-3},
  doi          = {10.1007/S11227-017-1980-3},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KimS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LeeLYKS18,
  author       = {Seokcheol Lee and
                  Seokjun Lee and
                  Hyunguk Yoo and
                  SungMoon Kwon and
                  Taeshik Shon},
  title        = {Design and implementation of cybersecurity testbed for industrial
                  IoT systems},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {9},
  pages        = {4506--4520},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-017-2219-z},
  doi          = {10.1007/S11227-017-2219-Z},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LeeLYKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qshine/KimKKJS18,
  author       = {Hyunjin Kim and
                  SungJin Kim and
                  SungMoon Kwon and
                  Wooyeon Jo and
                  Taeshik Shon},
  editor       = {Trung Quang Duong and
                  Nguyen{-}Son Vo and
                  Van Ca Phan},
  title        = {A Novel Security Framework for Industrial IoT Based on {ISA} 100.11a},
  booktitle    = {Quality, Reliability, Security and Robustness in Heterogeneous Systems
                  - 14th {EAI} International Conference, {QSHINE} 2018, Ho Chi Minh
                  City, Vietnam, December 3-4, 2018, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {272},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14413-5\_5},
  doi          = {10.1007/978-3-030-14413-5\_5},
  timestamp    = {Fri, 08 Mar 2019 16:35:10 +0100},
  biburl       = {https://dblp.org/rec/conf/qshine/KimKKJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ChaudhryAXLS17,
  author       = {Shehzad Ashraf Chaudhry and
                  Aiiad Albeshri and
                  Naixue Xiong and
                  Changhoon Lee and
                  Taeshik Shon},
  title        = {A privacy preserving authentication scheme for roaming in ubiquitous
                  networks},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1223--1236},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-017-0783-x},
  doi          = {10.1007/S10586-017-0783-X},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ChaudhryAXLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KwonYS17,
  author       = {SungMoon Kwon and
                  Hyunguk Yoo and
                  Taeshik Shon},
  title        = {Recovery Measure against Disabling Reassembly Attack to {DNP3} Communication},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {8},
  pages        = {1790--1797},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016ICP0026},
  doi          = {10.1587/TRANSINF.2016ICP0026},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KwonYS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ChaudhryFNIS17,
  author       = {Shehzad Ashraf Chaudhry and
                  Mohammad Sabzinejad Farash and
                  Husnain Naqvi and
                  SK Hafizul Islam and
                  Taeshik Shon},
  title        = {A Robust and Efficient Privacy Aware Handover Authentication Scheme
                  for Wireless Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {93},
  number       = {2},
  pages        = {311--335},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-015-3139-y},
  doi          = {10.1007/S11277-015-3139-Y},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ChaudhryFNIS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ChoiNS17,
  author       = {Hyo Hyun Choi and
                  Su Hyun Nam and
                  Taeshik Shon},
  title        = {Two Tier Search Scheme Using Micro {UAV} Swarm},
  journal      = {Wirel. Pers. Commun.},
  volume       = {93},
  number       = {2},
  pages        = {349--363},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3184-1},
  doi          = {10.1007/S11277-016-3184-1},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ChoiNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/MuneaKS17,
  author       = {Tewodros Legesse Munea and
                  I Luk Kim and
                  Taeshik Shon},
  title        = {Design and Implementation of Fuzzing Framework Based on IoT Applications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {93},
  number       = {2},
  pages        = {365--382},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-016-3322-9},
  doi          = {10.1007/S11277-016-3322-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/MuneaKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/YaqoobS16,
  author       = {Sania Yaqoob and
                  Taeshik Shon},
  title        = {A Hybrid {EV} Authentication Approach in Smart Grid Based Distributed
                  Network},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {31},
  number       = {1-4},
  pages        = {89--99},
  year         = {2016},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-31-number-1-4-2016/ahswn-31-1-4-p-89-99/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/YaqoobS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/MahmoodCNSA16,
  author       = {Khalid Mahmood and
                  Shehzad Ashraf Chaudhry and
                  Husnain Naqvi and
                  Taeshik Shon and
                  Hafiz Farooq Ahmad},
  title        = {A lightweight message authentication scheme for Smart Grid communications
                  in power sector},
  journal      = {Comput. Electr. Eng.},
  volume       = {52},
  pages        = {114--124},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.compeleceng.2016.02.017},
  doi          = {10.1016/J.COMPELECENG.2016.02.017},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/MahmoodCNSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YooS16,
  author       = {Hyunguk Yoo and
                  Taeshik Shon},
  title        = {Challenges and research directions for heterogeneous cyber-physical
                  system based on {IEC} 61850: Vulnerabilities, security requirements,
                  and security architecture},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {61},
  pages        = {128--136},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2015.09.026},
  doi          = {10.1016/J.FUTURE.2015.09.026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/YooS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/ChaudhryKKS16,
  author       = {Shehzad Ashraf Chaudhry and
                  Muhammad Tawab Khan and
                  Muhammad Khurram Khan and
                  Taeshik Shon},
  title        = {A Multiserver Biometric Authentication Scheme for {TMIS} using Elliptic
                  Curve Cryptography},
  journal      = {J. Medical Syst.},
  volume       = {40},
  number       = {11},
  pages        = {230:1--230:13},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10916-016-0592-4},
  doi          = {10.1007/S10916-016-0592-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/ChaudhryKKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeKS16,
  author       = {Seokcheol Lee and
                  Jongwan Kim and
                  Taeshik Shon},
  title        = {User privacy-enhanced security architecture for home area network
                  of Smartgrid},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {20},
  pages        = {12749--12764},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-016-3252-2},
  doi          = {10.1007/S11042-016-3252-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ParkCS16,
  author       = {Yongmin Park and
                  Hyun Soo Chang and
                  Taeshik Shon},
  title        = {Data investigation based on {XFS} file system metadata},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {22},
  pages        = {14721--14743},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2713-3},
  doi          = {10.1007/S11042-015-2713-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ParkCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MuneaLS16,
  author       = {Tewodros Legesse Munea and
                  Hyunwoo Lim and
                  Taeshik Shon},
  title        = {Network protocol fuzz testing for information systems and applications:
                  a survey and taxonomy},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {22},
  pages        = {14745--14757},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2763-6},
  doi          = {10.1007/S11042-015-2763-6},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/MuneaLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ChaKKSK16,
  author       = {Minki Cha and
                  Jung{-}Hyok Kwon and
                  SungJin Kim and
                  Taeshik Shon and
                  Eui{-}Jik Kim},
  title        = {Data Aggregation Gateway Framework for CoAP Group Communications},
  journal      = {Symmetry},
  volume       = {8},
  number       = {12},
  pages        = {138},
  year         = {2016},
  url          = {https://doi.org/10.3390/sym8120138},
  doi          = {10.3390/SYM8120138},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ChaKKSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/KimKCS16,
  author       = {Eui{-}Jik Kim and
                  Jung{-}Hyok Kwon and
                  Ken Choi and
                  Taeshik Shon},
  title        = {Unified Medium Access Control Architecture for Resource-Constrained
                  Machine-to-Machine Devices},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {15},
  number       = {2},
  pages        = {40:1--40:17},
  year         = {2016},
  url          = {https://doi.org/10.1145/2876958},
  doi          = {10.1145/2876958},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/KimKCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KwonCSJK16,
  author       = {Jung{-}Hyok Kwon and
                  Hyun Soo Chang and
                  Taeshik Shon and
                  Jai{-}Jin Jung and
                  Eui{-}Jik Kim},
  title        = {Neighbor stability-based {VANET} clustering for urban vehicular environments},
  journal      = {J. Supercomput.},
  volume       = {72},
  number       = {1},
  pages        = {161--176},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11227-015-1517-6},
  doi          = {10.1007/S11227-015-1517-6},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KwonCSJK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChoLSK16,
  author       = {Kyumin Cho and
                  Hyunwoo Lim and
                  Taeshik Shon and
                  Seungjoo Kim},
  title        = {A novel security architecture of electronic vehicle system for smart
                  grid communication},
  journal      = {J. Supercomput.},
  volume       = {72},
  number       = {1},
  pages        = {214--231},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11227-015-1552-3},
  doi          = {10.1007/S11227-015-1552-3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ChoLSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChoiCSC16,
  author       = {Myungwhan Choi and
                  Paul Vincent Contreras and
                  Taeshik Shon and
                  Hyo Hyun Choi},
  title        = {Exploring an area by groups of UAVs in the presence of a refueling
                  base},
  journal      = {J. Supercomput.},
  volume       = {72},
  number       = {9},
  pages        = {3409--3427},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11227-015-1465-1},
  doi          = {10.1007/S11227-015-1465-1},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ChoiCSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/LeeYSS16,
  author       = {Seokjun Lee and
                  Hyunguk Yoo and
                  Jung{-}Taek Seo and
                  Taeshik Shon},
  editor       = {Xingang Liu and
                  Tie Qiu and
                  Bin Guo and
                  Kaixuan Lu and
                  Zhaolong Ning and
                  Mianxiong Dong and
                  Yayong Li},
  title        = {Packet Diversity-Based Anomaly Detection System with {OCSVM} and Representative
                  Model},
  booktitle    = {2016 {IEEE} International Conference on Internet of Things (iThings)
                  and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
                  Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
                  (SmartData), Chengdu, China, December 15-18, 2016},
  pages        = {498--503},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.116},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.116},
  timestamp    = {Mon, 14 Dec 2020 13:52:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/LeeYSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/YooS16,
  author       = {Hyunguk Yoo and
                  Taeshik Shon},
  editor       = {Xingang Liu and
                  Tie Qiu and
                  Bin Guo and
                  Kaixuan Lu and
                  Zhaolong Ning and
                  Mianxiong Dong and
                  Yayong Li},
  title        = {Inferring State Machine Using Hybrid Teacher},
  booktitle    = {2016 {IEEE} International Conference on Internet of Things (iThings)
                  and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
                  Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
                  (SmartData), Chengdu, China, December 15-18, 2016},
  pages        = {504--509},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.117},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.117},
  timestamp    = {Sun, 14 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/YooS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/LeeKYS16,
  author       = {Seokjun Lee and
                  Jongwan Kim and
                  Hyunguk Yoo and
                  Taeshik Shon},
  editor       = {Xingang Liu and
                  Tie Qiu and
                  Bin Guo and
                  Kaixuan Lu and
                  Zhaolong Ning and
                  Mianxiong Dong and
                  Yayong Li},
  title        = {Case Studies for Analyzing DLMS/COSEM-Based Smart Meter Vulnerabilities
                  in Korea},
  booktitle    = {2016 {IEEE} International Conference on Internet of Things (iThings)
                  and {IEEE} Green Computing and Communications (GreenCom) and {IEEE}
                  Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data
                  (SmartData), Chengdu, China, December 15-18, 2016},
  pages        = {667--674},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.145},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA.2016.145},
  timestamp    = {Sun, 14 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/LeeKYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/YooS16,
  author       = {Hyunguk Yoo and
                  Taeshik Shon},
  title        = {Grammar-based adaptive fuzzing: Evaluation on {SCADA} modbus protocol},
  booktitle    = {2016 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2016, Sydney, Australia, November 6-9, 2016},
  pages        = {557--563},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SmartGridComm.2016.7778820},
  doi          = {10.1109/SMARTGRIDCOMM.2016.7778820},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/YooS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangLSVC15,
  author       = {Shiuh{-}Jeng Wang and
                  Jigang Liu and
                  Taeshik Shon and
                  Binod Vaidya and
                  Yeong{-}Sheng Chen},
  title        = {Security and privacy information technologies and applications for
                  wireless pervasive computing environments},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {147--149},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2015.07.037},
  doi          = {10.1016/J.INS.2015.07.037},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangLSVC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/ChaudhryNSSF15,
  author       = {Shehzad Ashraf Chaudhry and
                  Husnain Naqvi and
                  Taeshik Shon and
                  Muhammad Sher and
                  Mohammad Sabzinejad Farash},
  title        = {Cryptanalysis and Improvement of an Improved Two Factor Authentication
                  Protocol for Telecare Medical Information Systems},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {6},
  pages        = {66:1--66:11},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0244-0},
  doi          = {10.1007/S10916-015-0244-0},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/ChaudhryNSSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YooS15,
  author       = {Hyunguk Yoo and
                  Taeshik Shon},
  title        = {Novel Approach for Detecting Network Anomalies for Substation Automation
                  based on {IEC} 61850},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {1},
  pages        = {303--318},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-1870-0},
  doi          = {10.1007/S11042-014-1870-0},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/YooS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HanS15,
  author       = {Kyusuk Han and
                  Taeshik Shon},
  title        = {Authentication of mobile applications through various local distributors},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {5},
  pages        = {1541--1555},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-013-1520-y},
  doi          = {10.1007/S11042-013-1520-Y},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/KimHCYKHS15,
  author       = {Kangseok Kim and
                  Wonjeong Ha and
                  Okkyung Choi and
                  Hongjin Yeh and
                  Jai{-}Hoon Kim and
                  Manpyo Hong and
                  Taeshik Shon},
  title        = {An interactive pervasive whiteboard based on {MVC} architecture for
                  ubiquitous collaboration},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {5},
  pages        = {1557--1576},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-013-1458-0},
  doi          = {10.1007/S11042-013-1458-0},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KimHCYKHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ParkPSK15,
  author       = {Hyunhee Park and
                  Seunghyun Park and
                  Taeshik Shon and
                  Eui{-}Jik Kim},
  title        = {Multi-hop-based opportunistic concurrent directional transmission
                  in 60 GHz WPANs},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {5},
  pages        = {1627--1644},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-1959-5},
  doi          = {10.1007/S11042-014-1959-5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ParkPSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SeoLS15,
  author       = {Jung{-}Taek Seo and
                  Seokjun Lee and
                  Taeshik Shon},
  title        = {A study on memory dump analysis based on digital forensic tools},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {8},
  number       = {4},
  pages        = {694--703},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12083-013-0217-3},
  doi          = {10.1007/S12083-013-0217-3},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SeoLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/EoJLS15,
  author       = {Soowoong Eo and
                  Wooyeon Jo and
                  Seokjun Lee and
                  Taeshik Shon},
  title        = {A Phase of Deleted File Recovery for Digital Forensics Research in
                  Tizen},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292924},
  doi          = {10.1109/ICITCS.2015.7292924},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/EoJLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimLKS15,
  author       = {Hyunjin Kim and
                  Seokcheol Lee and
                  SungJin Kim and
                  Taeshik Shon},
  title        = {Reliability Enhanced Communication Guidance for Electric Utilities
                  Based on Regulatory Standard},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293013},
  doi          = {10.1109/ICITCS.2015.7293013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimLKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/KimKSK15,
  author       = {Yoona Kim and
                  Ki{-}Hyung Kim and
                  Taeshik Shon and
                  Jai{-}Hoon Kim},
  title        = {A hybrid service discovery approach to mitigate overhead concentration
                  on resource directory},
  booktitle    = {2015 International Conference on Information Networking, {ICOIN} 2015,
                  Siem Reap, Cambodia, January 12-14, 2015},
  pages        = {407--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICOIN.2015.7057928},
  doi          = {10.1109/ICOIN.2015.7057928},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/KimKSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/ChaSKH15,
  author       = {Hyejin Cha and
                  Taeshik Shon and
                  Kangseok Kim and
                  Manpyo Hong},
  title        = {Improving packet header compression with adaptive sliding window size},
  booktitle    = {2015 International Conference on Information Networking, {ICOIN} 2015,
                  Siem Reap, Cambodia, January 12-14, 2015},
  pages        = {541--543},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICOIN.2015.7057966},
  doi          = {10.1109/ICOIN.2015.7057966},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/ChaSKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ChoiCCSP14,
  author       = {Hyo Hyun Choi and
                  Hyunsoo Choi and
                  Myungwhan Choi and
                  Taeshik Shon and
                  ByoungSeob Park},
  title        = {An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned
                  Aerial Vehicles},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/920534},
  doi          = {10.1155/2014/920534},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ChoiCCSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhangKCS14,
  author       = {Yunlong Zhang and
                  Joohee Kim and
                  Ken Choi and
                  Taeshik Shon},
  title        = {High Performance and Low Power Hardware Implementation for Cryptographic
                  Hash Functions},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/736312},
  doi          = {10.1155/2014/736312},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhangKCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/LeeS14,
  author       = {Seokjun Lee and
                  Taeshik Shon},
  title        = {Physical Memory Collection and Analysis in Smart Grid Embedded System},
  journal      = {Mob. Networks Appl.},
  volume       = {19},
  number       = {3},
  pages        = {382--391},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11036-014-0504-0},
  doi          = {10.1007/S11036-014-0504-0},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/LeeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ShonCHC14,
  author       = {Taeshik Shon and
                  Jaeik Cho and
                  Kyusuk Han and
                  Hyohyun Choi},
  title        = {Toward Advanced Mobile Cloud Computing for the Internet of Things:
                  Current Issues and Future Direction},
  journal      = {Mob. Networks Appl.},
  volume       = {19},
  number       = {3},
  pages        = {404--413},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11036-014-0509-8},
  doi          = {10.1007/S11036-014-0509-8},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ShonCHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ShinSYK14,
  author       = {Soobok Shin and
                  Taeshik Shon and
                  Hongjin Yeh and
                  Kangseok Kim},
  title        = {An effective authentication mechanism for ubiquitous collaboration
                  in heterogeneous computing environment},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {7},
  number       = {4},
  pages        = {612--619},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12083-013-0220-8},
  doi          = {10.1007/S12083-013-0220-8},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ShinSYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhanSLK14,
  author       = {Faraz Idris Khan and
                  Taeshik Shon and
                  Taekkyeun Lee and
                  Ki{-}Hyung Kim},
  title        = {Merkle tree-based wormhole attack avoidance mechanism in low power
                  and lossy network based networks},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1292--1309},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.1023},
  doi          = {10.1002/SEC.1023},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhanSLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimSSM14,
  author       = {I Luk Kim and
                  Jung{-}Taek Seo and
                  Taeshik Shon and
                  Jongsub Moon},
  title        = {A novel approach to detection of mobile rogue access points},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {10},
  pages        = {1510--1516},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.756},
  doi          = {10.1002/SEC.756},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimSSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LeeS14,
  author       = {Seokjun Lee and
                  Taeshik Shon},
  title        = {Improved deleted file recovery technique for Ext2/3 filesystem},
  journal      = {J. Supercomput.},
  volume       = {70},
  number       = {1},
  pages        = {20--30},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11227-014-1282-y},
  doi          = {10.1007/S11227-014-1282-Y},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LeeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/MajoreYS14,
  author       = {Sekie Amanuel Majore and
                  Hyunguk Yoo and
                  Taeshik Shon},
  title        = {Secure and reliable electronic record management system using digital
                  forensic technologies},
  journal      = {J. Supercomput.},
  volume       = {70},
  number       = {1},
  pages        = {149--165},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11227-014-1137-6},
  doi          = {10.1007/S11227-014-1137-6},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/MajoreYS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KwonYSL14,
  author       = {SungMoon Kwon and
                  Hyunguk Yoo and
                  Taeshik Shon and
                  GunWoong Lee},
  title        = {Scenario-Based Attack Route on Industrial Control System},
  booktitle    = {2014 International Conference on {IT} Convergence and Security, 10.1109/ICITCS.2014,
                  Beijing, China, October 28-30, 2014},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITCS.2014.7021809},
  doi          = {10.1109/ICITCS.2014.7021809},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KwonYSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeePLS14,
  author       = {Seokcheol Lee and
                  Yongmin Park and
                  Hyunwoo Lim and
                  Taeshik Shon},
  title        = {Study on Analysis of Security Vulnerabilities and Countermeasures
                  in {ISO/IEC} 15118 Based Electric Vehicle Charging Technology},
  booktitle    = {2014 International Conference on {IT} Convergence and Security, 10.1109/ICITCS.2014,
                  Beijing, China, October 28-30, 2014},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITCS.2014.7021815},
  doi          = {10.1109/ICITCS.2014.7021815},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeePLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkLKS14,
  author       = {Yongmin Park and
                  Seokjun Lee and
                  Jongwan Kim and
                  Taeshik Shon},
  title        = {Applying Digital Forensics in Various Application Fields: Required
                  Elements for Having Legal Force},
  booktitle    = {2014 International Conference on {IT} Convergence and Security, 10.1109/ICITCS.2014,
                  Beijing, China, October 28-30, 2014},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITCS.2014.7021741},
  doi          = {10.1109/ICITCS.2014.7021741},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkLKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ShonHW13,
  author       = {Taeshik Shon and
                  Ching{-}Hsien Hsu and
                  Isaac Woungang},
  title        = {Introduction to Special issue on Recent Advanced Technologies and
                  Theories for Grid and Cloud Computing},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {1},
  pages        = {1--2},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2012.12.012},
  doi          = {10.1016/J.COMPELECENG.2012.12.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/ShonHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KimYSK13,
  author       = {Eui{-}Jik Kim and
                  Sung{-}Kwan Youm and
                  Taeshik Shon and
                  Chul{-}Hee Kang},
  title        = {Stable pairwise time synchronization in the application layer for
                  capillary machine-to-machine networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {7},
  pages        = {2207--2213},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2012.12.004},
  doi          = {10.1016/J.COMPELECENG.2012.12.004},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/KimYSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ShonG13,
  author       = {Taeshik Shon and
                  Danielo Goncalves Gomes},
  title        = {Introduction to Special issue on Recent Advanced Technologies and
                  Theories for Grid and Cloud Computing},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {7},
  pages        = {2330--2331},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2013.07.020},
  doi          = {10.1016/J.COMPELECENG.2013.07.020},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/ShonG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/ShonPLS13,
  author       = {Taeshik Shon and
                  Jong Hyuk Park and
                  Costas Lambrinoudakis and
                  Jean{-}Marc Seigneur},
  title        = {Special Issue on Advanced Information Security for Secure and Trust
                  Computing},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {9},
  pages        = {1233},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2013.03.020},
  doi          = {10.1016/J.CAMWA.2013.03.020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/ShonPLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ShonCK13,
  author       = {Taeshik Shon and
                  Hyohyun Choi and
                  Eui{-}Jik Kim},
  title        = {Joint routing and scheduling in multi-channel capillary machine-to-machine
                  networks},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2013},
  pages        = {126},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-1499-2013-126},
  doi          = {10.1186/1687-1499-2013-126},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ShonCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/YoumSK13,
  author       = {Sung{-}Kwan Youm and
                  Taeshik Shon and
                  Eui{-}Jik Kim},
  title        = {Integrated multicast routing algorithms considering traffic engineering
                  for broadband {IPTV} services},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2013},
  pages        = {127},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-1499-2013-127},
  doi          = {10.1186/1687-1499-2013-127},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/YoumSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KoLLJS13,
  author       = {Jongbin Ko and
                  Seokjun Lee and
                  Yong{-}hun Lim and
                  Seong{-}ho Ju and
                  Taeshik Shon},
  title        = {A Novel Network Modeling and Evaluation Approach for Security Vulnerability
                  Quantification in Substation Automation Systems},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {96-D},
  number       = {9},
  pages        = {2021--2025},
  year         = {2013},
  url          = {https://doi.org/10.1587/transinf.E96.D.2021},
  doi          = {10.1587/TRANSINF.E96.D.2021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KoLLJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/KuCKSHYK13,
  author       = {Yunlim Ku and
                  Okkyung Choi and
                  Kangseok Kim and
                  Taeshik Shon and
                  Manpyo Hong and
                  Hongjin Yeh and
                  Jai{-}Hoon Kim},
  title        = {Two-factor authentication system based on extended {OTP} mechanism},
  journal      = {Int. J. Comput. Math.},
  volume       = {90},
  number       = {12},
  pages        = {2515--2529},
  year         = {2013},
  url          = {https://doi.org/10.1080/00207160.2012.748901},
  doi          = {10.1080/00207160.2012.748901},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/KuCKSHYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ParkSPK13,
  author       = {Hyunhee Park and
                  Taeshik Shon and
                  Seunghyun Park and
                  Eui{-}Jik Kim},
  title        = {Adaptive anomaly control for alleviating the exclusive channel occupation
                  in wireless networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {26},
  number       = {6},
  pages        = {720--731},
  year         = {2013},
  url          = {https://doi.org/10.1002/dac.2357},
  doi          = {10.1002/DAC.2357},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ParkSPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ShonVBSJZ13,
  author       = {Taeshik Shon and
                  Athanasios V. Vasilakos and
                  Bharat K. Bhargava and
                  Ivan Stojmenovic and
                  Hai Jin and
                  Albert Y. Zomaya},
  title        = {Editorial for Special Issue on "New Technologies and Applications
                  for Wireless Communications {\&} Mobile Cloud Computing"},
  journal      = {Mob. Networks Appl.},
  volume       = {18},
  number       = {1},
  pages        = {98--102},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11036-012-0420-0},
  doi          = {10.1007/S11036-012-0420-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ShonVBSJZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/LeeCSSW13,
  author       = {Junwon Lee and
                  Jaeik Cho and
                  Jung{-}Taek Seo and
                  Taeshik Shon and
                  Dongho Won},
  title        = {A Novel Approach to Analyzing for Detecting Malicious Network Activity
                  Using a Cloud Computing Testbed},
  journal      = {Mob. Networks Appl.},
  volume       = {18},
  number       = {1},
  pages        = {122--128},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11036-012-0375-1},
  doi          = {10.1007/S11036-012-0375-1},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/LeeCSSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/HanKSK13,
  author       = {Kyusuk Han and
                  Jangseong Kim and
                  Taeshik Shon and
                  Daesik Ko},
  title        = {A novel secure key paring protocol for {RF4CE} ubiquitous smart home
                  systems},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {17},
  number       = {5},
  pages        = {945--949},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00779-012-0541-2},
  doi          = {10.1007/S00779-012-0541-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/HanKSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/ChungLSM13,
  author       = {Manhyun Chung and
                  Younghoon Lee and
                  Taeshik Shon and
                  Jongsub Moon},
  title        = {A security model for {IPTV} with one-time password and Conditional
                  Access System for smart mobile platform},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {1399--1407},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9652-8},
  doi          = {10.1007/S11235-011-9652-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/ChungLSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/KooHPS13,
  author       = {Bonhyun Koo and
                  Kyusuk Han and
                  James J. Park and
                  Taeshik Shon},
  title        = {Design and implementation of a wireless sensor network architecture
                  using smart mobile devices},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {4},
  pages        = {2311--2320},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9535-z},
  doi          = {10.1007/S11235-011-9535-Z},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/KooHPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChoSCM13,
  author       = {Jaeik Cho and
                  Taeshik Shon and
                  Ken Choi and
                  Jongsub Moon},
  title        = {Dynamic learning model update of hybrid-classifiers for intrusion
                  detection},
  journal      = {J. Supercomput.},
  volume       = {64},
  number       = {2},
  pages        = {522--526},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11227-011-0698-x},
  doi          = {10.1007/S11227-011-0698-X},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ChoSCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KooLS13,
  author       = {Bonhyun Koo and
                  Yang Sun Lee and
                  Taeshik Shon},
  title        = {A novel approach to visualize web anomaly attacks in pervasive computing
                  environment},
  journal      = {J. Supercomput.},
  volume       = {65},
  number       = {1},
  pages        = {301--316},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11227-010-0520-1},
  doi          = {10.1007/S11227-010-0520-1},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KooLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ShonWSX13,
  author       = {Taeshik Shon and
                  Shiuh{-}Jeng Wang and
                  Lei Shu and
                  Liudong Xing},
  title        = {Editorial of special section on advanced in high performance, algorithm,
                  and framework for future computing},
  journal      = {J. Supercomput.},
  volume       = {65},
  number       = {2},
  pages        = {483},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11227-013-0963-2},
  doi          = {10.1007/S11227-013-0963-2},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ShonWSX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimYSK13,
  author       = {Eui{-}Jik Kim and
                  Sung{-}Kwan Youm and
                  Taeshik Shon and
                  Chul{-}Hee Kang},
  title        = {Asynchronous inter-network interference avoidance for wireless body
                  area networks},
  journal      = {J. Supercomput.},
  volume       = {65},
  number       = {2},
  pages        = {562--579},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11227-012-0840-4},
  doi          = {10.1007/S11227-012-0840-4},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KimYSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChoiNSC13,
  author       = {Hyo Hyun Choi and
                  Su Hyun Nam and
                  Taeshik Shon and
                  Myungwhan Choi},
  title        = {Information delivery scheme of micro UAVs having limited communication
                  range during tracking the moving target},
  journal      = {J. Supercomput.},
  volume       = {66},
  number       = {2},
  pages        = {950--972},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11227-013-0931-x},
  doi          = {10.1007/S11227-013-0931-X},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ChoiNSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LimKLKKS13,
  author       = {Hyunwoo Lim and
                  Jongbin Ko and
                  Seokjun Lee and
                  Jongwan Kim and
                  Mijoo Kim and
                  Taeshik Shon},
  title        = {Security Architecture Model for Smart Grid Communication Systems},
  booktitle    = {2013 International Conference on {IT} Convergence and Security, {ICITCS}
                  2013, Macau, China, December 16-18, 2013},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITCS.2013.6717880},
  doi          = {10.1109/ICITCS.2013.6717880},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/LimKLKKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/HanKCCSS12,
  author       = {Kyusuk Han and
                  Kwangjo Kim and
                  Wook Choi and
                  Hyo Hyun Choi and
                  Jung{-}Taek Seo and
                  Taeshik Shon},
  title        = {Efficient Authenticated Key Agreement Protocols for Dynamic Wireless
                  Sensor Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {14},
  number       = {3-4},
  pages        = {251--269},
  year         = {2012},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-14-number-3-4-2012/ahswn-14-3-4-p-251-269/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/HanKCCSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimBZS12,
  author       = {Jangseong Kim and
                  Joonsang Baek and
                  Jianying Zhou and
                  Taeshik Shon},
  title        = {An Efficient and Secure Service Discovery Protocol for Ubiquitous
                  Computing Environments},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {1},
  pages        = {117--125},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.117},
  doi          = {10.1587/TRANSINF.E95.D.117},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimBZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/KimSPK12,
  author       = {Eui{-}Jik Kim and
                  Taeshik Shon and
                  Hyunhee Park and
                  Chul{-}Hee Kang},
  title        = {Latency bounded and energy efficient {MAC} for wireless sensor networks},
  journal      = {{IET} Commun.},
  volume       = {6},
  number       = {14},
  pages        = {2120--2127},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-com.2011.0700},
  doi          = {10.1049/IET-COM.2011.0700},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/KimSPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/KimKPS12,
  author       = {Jangseong Kim and
                  Kwangjo Kim and
                  Jong Hyuk Park and
                  Taeshik Shon},
  title        = {A scalable and privacy-preserving child-care and safety service in
                  a ubiquitous computing environment},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {45--57},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.01.012},
  doi          = {10.1016/J.MCM.2011.01.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/KimKPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/ParkCSD12,
  author       = {Jong Hyuk Park and
                  Han{-}Chieh Chao and
                  Taeshik Shon and
                  Mieso K. Denko},
  title        = {Guest editorial: Theme issue on smartphone applications and services
                  for pervasive computing},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {16},
  number       = {6},
  pages        = {611--612},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00779-011-0429-6},
  doi          = {10.1007/S00779-011-0429-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/ParkCSD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/HanMSYP12,
  author       = {Kyusuk Han and
                  Hyeran Mun and
                  Taeshik Shon and
                  Chan Yeob Yeun and
                  Jong Hyuk Park},
  title        = {Secure and efficient public key management in next generation mobile
                  networks},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {16},
  number       = {6},
  pages        = {677--685},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00779-011-0434-9},
  doi          = {10.1007/S00779-011-0434-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/HanMSYP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShonPP12,
  author       = {Taeshik Shon and
                  Jong Hyuk Park and
                  Doo{-}Soon Park},
  title        = {Improved {RF4CE} key agreement approach involving two-phase key distribution
                  for smart-convergence home device},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {9},
  pages        = {974--986},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.382},
  doi          = {10.1002/SEC.382},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShonPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShonLZ12,
  author       = {Taeshik Shon and
                  Costas Lambrinoudakis and
                  Xiaobo Zhou},
  title        = {Special issue on next generation communication and network security},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {10},
  pages        = {1083--1085},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.636},
  doi          = {10.1002/SEC.636},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ShonLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/ShonC11,
  author       = {Taeshik Shon and
                  Hyohyun Choi},
  title        = {An Approach for Efficient Hybrid Reliable Transport in {IEEE} 802.15.4-based
                  Wireless Sensor Network},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {11},
  number       = {3-4},
  pages        = {199--217},
  year         = {2011},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-11-number-3-4-2011/ahswn-11-3-4-p-199-217/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/ShonC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ShonHPC11,
  author       = {Taeshik Shon and
                  Kyusuk Han and
                  Jong Hyuk Park and
                  Hangbae Chang},
  title        = {A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal
                  Relations between Internet Protocol Packets},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/210746},
  doi          = {10.1155/2011/210746},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ShonHPC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ShonHPJL11,
  author       = {Taeshik Shon and
                  Kyusuk Han and
                  James J. Park and
                  Young{-}Sik Jeong and
                  Yang Sun Lee},
  title        = {A Secure and Robust Connectivity Architecture for Smart Devices and
                  Applications},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/176393},
  doi          = {10.1155/2011/176393},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ShonHPJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimSK11,
  author       = {Jangseong Kim and
                  Taeshik Shon and
                  Kwangjo Kim},
  title        = {Location-Aware and Privacy-Preserving Approach for Child Safety in
                  Ubiquitous Computing Environment},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {94-B},
  number       = {3},
  pages        = {686--689},
  year         = {2011},
  url          = {https://doi.org/10.1587/transcom.E94.B.686},
  doi          = {10.1587/TRANSCOM.E94.B.686},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanKS11,
  author       = {Kyusuk Han and
                  Kwangjo Kim and
                  Taeshik Shon},
  title        = {Enhancing Credibility of Location Based Service Using Multiple Sensing
                  Technologies},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {94-D},
  number       = {6},
  pages        = {1181--1184},
  year         = {2011},
  url          = {https://doi.org/10.1587/transinf.E94.D.1181},
  doi          = {10.1587/TRANSINF.E94.D.1181},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanSK11,
  author       = {Kyusuk Han and
                  Taeshik Shon and
                  Kwangjo Kim},
  title        = {Design and Implementation of One-Way Key Agreement Model for Enhancing
                  VoIP Internet Phone Security},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {94-B},
  number       = {8},
  pages        = {2235--2238},
  year         = {2011},
  url          = {https://doi.org/10.1587/transcom.E94.B.2235},
  doi          = {10.1587/TRANSCOM.E94.B.2235},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/HanKPS11,
  author       = {Kyusuk Han and
                  Kwangjo Kim and
                  Jong Hyuk Park and
                  Taeshik Shon},
  title        = {Efficient sensor node authentication in third generation-wireless
                  sensor networks integrated networks},
  journal      = {{IET} Commun.},
  volume       = {5},
  number       = {12},
  pages        = {1744--1754},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-com.2010.0539},
  doi          = {10.1049/IET-COM.2010.0539},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/HanKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/HanYSPK11,
  author       = {Kyusuk Han and
                  Chan Yeob Yeun and
                  Taeshik Shon and
                  Jong Hyuk Park and
                  Kwangjo Kim},
  title        = {A scalable and efficient key escrow model for lawful interception
                  of IDBC-based secure communication},
  journal      = {Int. J. Commun. Syst.},
  volume       = {24},
  number       = {4},
  pages        = {461--472},
  year         = {2011},
  url          = {https://doi.org/10.1002/dac.1165},
  doi          = {10.1002/DAC.1165},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/HanYSPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/KooCPS11,
  author       = {Bonhyun Koo and
                  Wook Choi and
                  James J. Park and
                  Taeshik Shon},
  title        = {A novel low-power RF4CE-based communication framework for multimedia
                  system control},
  journal      = {Int. J. Commun. Syst.},
  volume       = {24},
  number       = {10},
  pages        = {1340--1353},
  year         = {2011},
  url          = {https://doi.org/10.1002/dac.1223},
  doi          = {10.1002/DAC.1223},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/KooCPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/HanSYPS11,
  author       = {Kyusuk Han and
                  Youngjoon Seo and
                  Sungjune Yoon and
                  James J. Park and
                  Taeshik Shon},
  title        = {Providing security vertical handoff in {SARAH} for heterogeneous networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {34},
  number       = {6},
  pages        = {1903--1907},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jnca.2011.01.006},
  doi          = {10.1016/J.JNCA.2011.01.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/HanSYPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KimSPJ11,
  author       = {Eui{-}Jik Kim and
                  Taeshik Shon and
                  James Jong Hyuk Park and
                  Young{-}Sik Jeong},
  title        = {Throughput Fairness Enhancement Using Differentiated Channel Access
                  in Heterogeneous Sensor Networks},
  journal      = {Sensors},
  volume       = {11},
  number       = {7},
  pages        = {6629--6644},
  year         = {2011},
  url          = {https://doi.org/10.3390/s110706629},
  doi          = {10.3390/S110706629},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KimSPJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/KimBS11,
  author       = {Jangseong Kim and
                  Joonsang Baek and
                  Taeshik Shon},
  title        = {An efficient and scalable re-authentication protocol over wireless
                  sensor network},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {57},
  number       = {2},
  pages        = {516--522},
  year         = {2011},
  url          = {https://doi.org/10.1109/TCE.2011.5955187},
  doi          = {10.1109/TCE.2011.5955187},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/KimBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ShonHX11,
  author       = {Taeshik Shon and
                  Ching{-}Hsien Hsu and
                  Liudong Xing},
  title        = {Editorial: Special Issue on "Advanced Technologies and Practices
                  in Recent Wireless Sensor Networks"},
  journal      = {Wirel. Pers. Commun.},
  volume       = {60},
  number       = {3},
  pages        = {385--388},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-011-0296-5},
  doi          = {10.1007/S11277-011-0296-5},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ShonHX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/ChoLSS11,
  author       = {Jaeik Cho and
                  Junwon Lee and
                  Jung{-}Taek Seo and
                  Taeshik Shon},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {A Suggestion for Cloud Environments New Layer Contemplating and Its
                  Security Factors},
  booktitle    = {The 14th International Conference on Network-Based Information Systems,
                  NBiS 2011, Tirana, Albania, September 7-9, 2011},
  pages        = {573--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/NBiS.2011.95},
  doi          = {10.1109/NBIS.2011.95},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/ChoLSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/ChoCSM11,
  author       = {Jaeik Cho and
                  Kyuwon Choi and
                  Taeshik Shon and
                  Jongsub Moon},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {A Network Data Abstraction Method for Data Set Verification},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {54--62},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_7},
  doi          = {10.1007/978-3-642-22339-6\_7},
  timestamp    = {Mon, 08 Apr 2019 12:52:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/ChoCSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sta/2011,
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6},
  doi          = {10.1007/978-3-642-22339-6},
  isbn         = {978-3-642-22338-9},
  timestamp    = {Mon, 08 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ShonKPC10,
  author       = {Taeshik Shon and
                  Bonhyun Koo and
                  Jong Hyuk Park and
                  Hangbae Chang},
  title        = {Novel Approaches to Enhance Mobile WiMAX Security},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/926275},
  doi          = {10.1155/2010/926275},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ShonKPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShonKIP10,
  author       = {Taeshik Shon and
                  Eui{-}Jik Kim and
                  Jeongsik In and
                  Yongsuk Park},
  title        = {Design and Implementation of Hybrid MAC-Based Robust Architecture
                  for Wireless Sensor Network},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {93-B},
  number       = {4},
  pages        = {1016--1019},
  year         = {2010},
  url          = {https://doi.org/10.1587/transcom.E93.B.1016},
  doi          = {10.1587/TRANSCOM.E93.B.1016},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShonKIP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KooS10,
  author       = {Bonhyun Koo and
                  Taeshik Shon},
  title        = {Implementation of a WSN-Based Structural Health Monitoring Architecture
                  Using 3D and {AR} Mode},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {93-B},
  number       = {11},
  pages        = {2963--2966},
  year         = {2010},
  url          = {https://doi.org/10.1587/transcom.E93.B.2963},
  doi          = {10.1587/TRANSCOM.E93.B.2963},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KooS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HanKS10,
  author       = {Kyusuk Han and
                  Kwangjo Kim and
                  Taeshik Shon},
  title        = {Untraceable Mobile Node Authentication in {WSN}},
  journal      = {Sensors},
  volume       = {10},
  number       = {5},
  pages        = {4410--4429},
  year         = {2010},
  url          = {https://doi.org/10.3390/s100504410},
  doi          = {10.3390/S100504410},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HanKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/HanSK10,
  author       = {Kyusuk Han and
                  Taeshik Shon and
                  Kwangjo Kim},
  title        = {Efficient mobile sensor authentication in smart home and {WPAN}},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {56},
  number       = {2},
  pages        = {591--596},
  year         = {2010},
  url          = {https://doi.org/10.1109/TCE.2010.5505975},
  doi          = {10.1109/TCE.2010.5505975},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/HanSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanKKS10,
  author       = {Kyusuk Han and
                  Jangseong Kim and
                  Kwangjo Kim and
                  Taeshik Shon},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Efficient sensor node authentication via 3GPP mobile communication
                  networks},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {687--689},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866398},
  doi          = {10.1145/1866307.1866398},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HanKKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/ShonP10,
  author       = {Taeshik Shon and
                  Yongsuk Park},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Salvatore Vitabile and
                  Hui{-}Huang Hsu},
  title        = {Implementation of RF4CE-Based Wireless Auto Configuration Architecture
                  for Ubiquitous Smart Home},
  booktitle    = {{CISIS} 2010, The Fourth International Conference on Complex, Intelligent
                  and Software Intensive Systems, Krakow, Poland, 15-18 February 2010},
  pages        = {779--783},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CISIS.2010.36},
  doi          = {10.1109/CISIS.2010.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis/ShonP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KooAIPS10,
  author       = {Bonhyun Koo and
                  Taewon Ahn and
                  JungSik In and
                  Yongsuk Park and
                  Taeshik Shon},
  editor       = {Bernady O. Apduhan and
                  Osvaldo Gervasi and
                  Andr{\'{e}}s Iglesias and
                  David Taniar and
                  Marina L. Gavrilova},
  title        = {{R-URC:} RF4CE-Based Universal Remote Control Framework Using Smartphone},
  booktitle    = {Prodeedings of the 2010 International Conference on Computational
                  Science and Its Applications, {ICCSA} 2010, Fukuoka, Japan, March
                  23-26, 2010},
  pages        = {311--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICCSA.2010.73},
  doi          = {10.1109/ICCSA.2010.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsa/KooAIPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HanMS10,
  author       = {Kyusuk Han and
                  Hyeran Mun and
                  Taeshik Shon},
  title        = {Design of secure key agreement protocol for pairing in {RF4CE}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678042/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HanMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ShonP09,
  author       = {Taeshik Shon and
                  Yongsuk Park},
  title        = {A Hybrid Adaptive Security Framework for {IEEE} 802.15.4-based Wireless
                  Sensor Networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {3},
  number       = {6},
  pages        = {597--611},
  year         = {2009},
  url          = {https://doi.org/10.3837/tiis.2009.06.002},
  doi          = {10.3837/TIIS.2009.06.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ShonP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icost/KooCS09,
  author       = {Bonhyun Koo and
                  Hyohyun Choi and
                  Taeshik Shon},
  editor       = {Mounir Mokhtari and
                  Ismail Khalil and
                  J{\'{e}}r{\'{e}}my Bauchet and
                  Daqing Zhang and
                  Chris D. Nugent},
  title        = {{WIVA:} {WSN} Monitoring Framework Based on 3D Visualization and Augmented
                  Reality in Mobile Devices},
  booktitle    = {Ambient Assistive Health and Wellness Management in the Heart of the
                  City, 7th International Conference on Smart Homes and Health Telematics,
                  {ICOST} 2009, Tours, France, July 1-3, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5597},
  pages        = {158--165},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02868-7\_20},
  doi          = {10.1007/978-3-642-02868-7\_20},
  timestamp    = {Tue, 21 Mar 2023 21:01:52 +0100},
  biburl       = {https://dblp.org/rec/conf/icost/KooCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/KimISPJ09,
  author       = {Eui{-}Jik Kim and
                  Jeongsik In and
                  Taeshik Shon and
                  Yongsuk Park and
                  Bong Wan Jun},
  editor       = {Arjan Durresi and
                  Leonard Barolli and
                  Tomoya Enokido and
                  Minoru Uehara and
                  Elhadi M. Shakshuki and
                  Makoto Takizawa},
  title        = {Design and Implementation of Energy-Efficient and Secure Framework
                  for Wireless Sensor Networks},
  booktitle    = {NBiS 2009, 12th International Conference on Network-Based Information
                  Systems, Indianapolis, Indiana, USA, 19-21 August 2009},
  pages        = {115--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NBiS.2009.45},
  doi          = {10.1109/NBIS.2009.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/KimISPJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/ShonC08,
  author       = {Taeshik Shon and
                  Hyohyun Choi},
  editor       = {Frode Eika Sandnes and
                  Yan Zhang and
                  Chunming Rong and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {Towards the Implementation of Reliable Data Transmission for 802.15.4-Based
                  Wireless Sensor Networks},
  booktitle    = {Ubiquitous Intelligence and Computing, 5th International Conference,
                  {UIC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5061},
  pages        = {363--372},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69293-5\_29},
  doi          = {10.1007/978-3-540-69293-5\_29},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/ShonC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShonM07,
  author       = {Taeshik Shon and
                  Jongsub Moon},
  title        = {A hybrid machine learning approach to network anomaly detection},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {18},
  pages        = {3799--3821},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2007.03.025},
  doi          = {10.1016/J.INS.2007.03.025},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/LeeSCCSM07,
  author       = {Minsoo Lee and
                  Taeshik Shon and
                  Kyuhyung Cho and
                  Manhyun Chung and
                  Jung{-}Taek Seo and
                  Jongsub Moon},
  editor       = {De{-}Shuang Huang and
                  Laurent Heutte and
                  Marco Loog},
  title        = {An Approach for Classifying Internet Worms Based on Temporal Behaviors
                  and Packet Flows},
  booktitle    = {Advanced Intelligent Computing Theories and Applications. With Aspects
                  of Theoretical and Methodological Issues, Third International Conference
                  on Intelligent Computing, {ICIC} 2007, Qingdao, China, August 21-24,
                  2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4681},
  pages        = {646--655},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74171-8\_64},
  doi          = {10.1007/978-3-540-74171-8\_64},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/LeeSCCSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/ShonC07,
  author       = {Taeshik Shon and
                  Wook Choi},
  editor       = {Tomoya Enokido and
                  Leonard Barolli and
                  Makoto Takizawa},
  title        = {An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions},
  booktitle    = {Network-Based Information Systems, First International Conference,
                  NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4658},
  pages        = {88--97},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74573-0\_10},
  doi          = {10.1007/978-3-540-74573-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/ShonC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/ChoiSCL07,
  author       = {Wook Choi and
                  Taeshik Shon and
                  Hyohyun Choi and
                  Y. Lee},
  title        = {Designing a Novel Unlicensed Nomadic Access Relay Station in {IEEE}
                  802.16-Based Wireless Access Networks},
  booktitle    = {Proceedings of the 65th {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2007, 22-25 April 2007, Dublin, Ireland},
  pages        = {2961--2965},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/VETECS.2007.607},
  doi          = {10.1109/VETECS.2007.607},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/ChoiSCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ShonKM06,
  author       = {Taeshik Shon and
                  Xeno Kovah and
                  Jongsub Moon},
  title        = {Applying genetic algorithm for classifying anomalous {TCP/IP} packets},
  journal      = {Neurocomputing},
  volume       = {69},
  number       = {16-18},
  pages        = {2429--2433},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.neucom.2006.01.023},
  doi          = {10.1016/J.NEUCOM.2006.01.023},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ShonKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/SeoKPLSM06,
  author       = {Jung{-}Taek Seo and
                  Yun{-}ju Kim and
                  Eung Ki Park and
                  Sang{-}Won Lee and
                  Taeshik Shon and
                  Jongsub Moon},
  editor       = {Lipo Wang and
                  Licheng Jiao and
                  Guangming Shi and
                  Xue Li and
                  Jing Liu},
  title        = {Design and Implementation of a Patch Management System to Remove Security
                  Vulnerability in Multi-platforms},
  booktitle    = {Fuzzy Systems and Knowledge Discovery, Third International Conference,
                  {FSKD} 2006, Xi'an, China, September 24-28, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4223},
  pages        = {716--724},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11881599\_87},
  doi          = {10.1007/11881599\_87},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/SeoKPLSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/SeoLSCM05,
  author       = {Jung{-}Taek Seo and
                  Cheolho Lee and
                  Taeshik Shon and
                  Kyuhyung Cho and
                  Jongsub Moon},
  editor       = {Tomoya Enokido and
                  Lu Yan and
                  Bin Xiao and
                  Daeyoung Kim and
                  Yuan{-}Shun Dai and
                  Laurence Tianruo Yang},
  title        = {A New DDoS Detection Model Using Multiple SVMs and {TRA}},
  booktitle    = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005
                  Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December
                  6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3823},
  pages        = {976--985},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596042\_100},
  doi          = {10.1007/11596042\_100},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/SeoLSCM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/SeoLKSM05,
  author       = {Jung{-}Taek Seo and
                  Cheolho Lee and
                  Jungtae Kim and
                  Taeshik Shon and
                  Jongsub Moon},
  editor       = {Tomoya Enokido and
                  Lu Yan and
                  Bin Xiao and
                  Daeyoung Kim and
                  Yuan{-}Shun Dai and
                  Laurence Tianruo Yang},
  title        = {{PPF} Model with {CTNT} to Defend Web Server from DDoS Attack},
  booktitle    = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005
                  Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December
                  6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3823},
  pages        = {986--995},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596042\_101},
  doi          = {10.1007/11596042\_101},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/SeoLKSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/SeoLSM05,
  author       = {Jung{-}Taek Seo and
                  Cheolho Lee and
                  Taeshik Shon and
                  Jongsub Moon},
  editor       = {Hai Zhuge and
                  Geoffrey C. Fox},
  title        = {{SVM} Approach with {CTNT} to Detect DDoS Attacks in Grid Computing},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference,
                  Beijing, China, November 30 - December 3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3795},
  pages        = {59--70},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11590354\_7},
  doi          = {10.1007/11590354\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/SeoLSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/ShonSM05,
  author       = {Taeshik Shon and
                  Jung{-}Taek Seo and
                  Jongsub Moon},
  editor       = {Pinar Yolum and
                  Tunga G{\"{u}}ng{\"{o}}r and
                  Fikret S. G{\"{u}}rgen and
                  Can C. {\"{O}}zturan},
  title        = {{SVM} Approach with a Genetic Algorithm for Network Intrusion Detection},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2005, 20th International
                  Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3733},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11569596\_25},
  doi          = {10.1007/11569596\_25},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscis/ShonSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/SeoLKSM05,
  author       = {Jung{-}Taek Seo and
                  Cheolho Lee and
                  Jungtae Kim and
                  Taeshik Shon and
                  Jongsub Moon},
  editor       = {Hai Jin and
                  Daniel A. Reed and
                  Wenbin Jiang},
  title        = {Probabilistic Packet Filtering Model to Protect Web Server from DDoS
                  Attacks},
  booktitle    = {Network and Parallel Computing, {IFIP} International Conference, {NPC}
                  2005, Beijing, China, November 30 - December 3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3779},
  pages        = {351--354},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11577188\_50},
  doi          = {10.1007/11577188\_50},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/npc/SeoLKSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/others/05/SeoLSM05,
  author       = {Jungtaek Seo and
                  Cheolho Lee and
                  Taeshik Shon and
                  Jongsub Moon},
  editor       = {Tuna Tugcu and
                  Erol Gelenbe and
                  M. Ufuk {\c{C}}aglayan and
                  Fatih Alag{\"{o}}z},
  title        = {A New Approach to Detect DDoS Attacks using Support Vector Machine},
  booktitle    = {New Trends in Computer Networks},
  series       = {Advances in Computer Science and Engineering : Reports and Monographs},
  volume       = {1},
  publisher    = {Imperial College Press},
  year         = {2005},
  url          = {https://doi.org/10.1142/9781860947308\_0020},
  doi          = {10.1142/9781860947308\_0020},
  timestamp    = {Mon, 22 Jun 2020 14:58:58 +0200},
  biburl       = {https://dblp.org/rec/books/others/05/SeoLSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ShonSM04,
  author       = {Taeshik Shon and
                  Jung{-}Taek Seo and
                  Jongsub Moon},
  editor       = {Hai Jin and
                  Yi Pan and
                  Nong Xiao and
                  Jianhua Sun},
  title        = {Simple Key Agreement and Its Efficiency Analysis for Grid Computing
                  Environments},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference,
                  Wuhan, China, October 21-24, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3251},
  pages        = {891--894},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30208-7\_131},
  doi          = {10.1007/978-3-540-30208-7\_131},
  timestamp    = {Fri, 26 Feb 2021 08:55:11 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/ShonSM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intellcomm/ShonMC04,
  author       = {Taeshik Shon and
                  Jongsub Moon and
                  HongMin Choi},
  editor       = {Finn Arve Aagesen and
                  Chutiporn Anutariya and
                  Vilas Wuwongse},
  title        = {Effciency Evaluation for Key Distribution Models in Satellite Terminals},
  booktitle    = {Intelligence in Communication Systems, {IFIP} International Conference,
                  {INTELLCOMM} 2004, Bangkok, Thailand, November 23-26, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3283},
  pages        = {92--99},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30179-0\_8},
  doi          = {10.1007/978-3-540-30179-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/intellcomm/ShonMC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/MoonSSKS04,
  author       = {Jongsub Moon and
                  Taeshik Shon and
                  Jung{-}Taek Seo and
                  Jongho Kim and
                  Jungwoo Seo},
  editor       = {Cevdet Aykanat and
                  Tugrul Dayar and
                  Ibrahim Korpeoglu},
  title        = {An Approach for Spam E-mail Detection with Support Vector Machine
                  and n-Gram Indexing},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2004, 19th International
                  Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3280},
  pages        = {351--362},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30182-0\_36},
  doi          = {10.1007/978-3-540-30182-0\_36},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/MoonSSKS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/SeoCPSM04,
  author       = {Jung{-}Taek Seo and
                  Dae{-}Sik Choi and
                  Eung Ki Park and
                  Taeshik Shon and
                  Jongsub Moon},
  editor       = {Kim{-}Meow Liew and
                  Hong Shen and
                  Simon See and
                  Wentong Cai and
                  Pingzhi Fan and
                  Susumu Horiguchi},
  title        = {Patch Management System for Multi-platform Environment},
  booktitle    = {Parallel and Distributed Computing: Applications and Technologies,
                  5th International Conference, {PDCAT} 2004, Singapore, December 8-10,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3320},
  pages        = {654--661},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30501-9\_126},
  doi          = {10.1007/978-3-540-30501-9\_126},
  timestamp    = {Fri, 12 Jun 2020 16:01:21 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcat/SeoCPSM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/SohnMLIS03,
  author       = {Taeshik Shon and
                  Jongsub Moon and
                  Cheolwon Lee and
                  Eul{-}Gyu Im and
                  Jung{-}Taek Seo},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {Safe Patch Distribution Architecture in Intranet Environments},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 2},
  pages        = {455--460},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Fri, 10 Aug 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/SohnMLIS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SohnSM03,
  author       = {Taeshik Shon and
                  Jung{-}Taek Seo and
                  Jongsub Moon},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {A Study on the Covert Channel Detection of {TCP/IP} Header Using Support
                  Vector Machine},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {313--324},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_29},
  doi          = {10.1007/978-3-540-39927-8\_29},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/SohnSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/SohnMLLL03,
  author       = {Taeshik Shon and
                  Jongsub Moon and
                  Sangjin Lee and
                  Dong Hoon Lee and
                  Jongin Lim},
  editor       = {Adnan Yazici and
                  Cevat Sener},
  title        = {Covert Channel Detection in the {ICMP} Payload Using Support Vector
                  Machine},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2003, 18th International
                  Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2869},
  pages        = {828--835},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39737-3\_103},
  doi          = {10.1007/978-3-540-39737-3\_103},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/SohnMLLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SohnNM03,
  author       = {Taeshik Shon and
                  Taewoo Noh and
                  Jongsub Moon},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Support Vector Machine Based {ICMP} Covert Channel Attack Detection},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {461--464},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_46},
  doi          = {10.1007/978-3-540-45215-7\_46},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SohnNM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics