default search action
Jung-Taek Seo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Seungho Jeon, Jung-Taek Seo:
A Synthetic Time-Series Generation Using a Variational Recurrent Autoencoder with an Attention Mechanism in an Industrial Control System. Sensors 24(1): 128 (2024) - [j37]Ilhwan Ji, Ju Hyeon Lee, Min Ji Kang, Woo Jin Park, Seungho Jeon, Jung-Taek Seo:
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review. Sensors 24(3): 898 (2024) - [c44]Biagio Boi, Christian Esposito, Jung-Taek Seo:
Preventing Data Tampering in Smart Grids: A Blockchain-Based Digital Twin Framework. ICCSA (Workshops 8) 2024: 144-156 - [c43]Biagio Boi, Christian Esposito, Jung-Taek Seo:
Ethereum Attestation Service as a solution for the revocation of hardware-based password-less mechanisms. SAC 2024: 553-559 - 2023
- [j36]Daun Jung, Jiho Shin, Chaechang Lee, Kookheui Kwon, Jung-Taek Seo:
Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology. IEEE Access 11: 15229-15241 (2023) - [j35]Ju Hyeon Lee, Ilhwan Ji, Seungho Jeon, Jung-Taek Seo:
Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression. Sensors 23(24): 9855 (2023) - [c42]Ilhwan Ji, Seungho Jeon, Jung-Taek Seo:
AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0. WISA 2023: 91-104 - [c41]Donghyun Kim, Seungho Jeon, Jiho Shin, Jung-Taek Seo:
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime. WISA 2023: 201-212 - [c40]Seungho Jeon, Jung-Taek Seo:
SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis. WISA 2023: 282-293 - 2022
- [j34]Abdul Wahid Khan, Shah Zaib, Faheem Khan, Ilhan Tarimer, Jung-Taek Seo, Jiho Shin:
Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach. IEEE Access 10: 65044-65054 (2022) - [j33]Jiho Shin, Hyunpyo Choi, Jung-Taek Seo:
A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system. Digit. Investig. 40(Supplement): 301354 (2022) - [j32]Ki-Wan Kang, Jung-Taek Seo, Sung Hoon Baek, Chul-Woo Kim, Ki-Woong Park:
SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation. KSII Trans. Internet Inf. Syst. 16(3): 1063-1075 (2022) - [j31]Abdul Malik, Muhammad Zahid Khan, Mohammad Faisal, Faheem Khan, Jung-Taek Seo:
An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs. Sensors 22(5): 1897 (2022) - [j30]Pilla Vaishno Mohan, Shriniket Dixit, Amogh Gyaneshwar, Utkarsh Chadha, Kathiravan Srinivasan, Jung-Taek Seo:
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions. Sensors 22(6): 2194 (2022) - 2020
- [j29]Ji Woong Jang, SungMoon Kwon, SungJin Kim, Jungtaek Seo, Junhyoung Oh, Kyungho Lee:
Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid. KSII Trans. Internet Inf. Syst. 14(5): 2221-2235 (2020) - [j28]Jiho Shin, Ilsun You, Jung-Taek Seo:
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process. Mob. Inf. Syst. 2020: 8878088:1-8878088:11 (2020) - [j27]Lan N. Nguyen, J. David Smith, Jinsung Bae, Jungmin Kang, Jungtaek Seo, My T. Thai:
Auditing on Smart-Grid With Dynamic Traffic Flows: An Algorithmic Approach. IEEE Trans. Smart Grid 11(3): 2293-2302 (2020) - [j26]Junggab Son, Donghyun Kim, Md. Zakirul Alam Bhuiyan, Rahman Mitchel Tashakkori, Jungtaek Seo, Dong Hoon Lee:
Privacy Enhanced Location Sharing for Mobile Online Social Networks. IEEE Trans. Sustain. Comput. 5(2): 279-290 (2020) - [c39]Junwon Kim, Jiho Shin, Jung-Taek Seo:
Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation. ICEA 2020: 35:1-35:7 - [c38]Hyunpyo Choi, Jiho Shin, Jung-Taek Seo:
A Study on the Digital Forensic Method for Decentralized Web Service. ICEA 2020: 37:1-37:6 - [c37]Mingyu Lee, Hanbyeol Kang, Junbeom Kwak, Donghyun Kim, Hyeonho Jeong, Jung-Taek Seo:
Proposed On-site Document Sharing System using FIDO. ICEA 2020: 43:1-43:6 - [c36]Daun Jung, Jiho Shin, Chaechang Lee, Kookheui Kwon, Jung-Taek Seo:
A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant. ICEA 2020: 44:1-44:7 - [c35]Joochan Lee, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo:
Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic. ICEA 2020: 46:1-46:6 - [c34]Janghoon Kim, Hyunpyo Choi, Jiho Shin, Jung-Taek Seo:
Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning. ICEA 2020: 47:1-47:5 - [i2]Tianyi Pan, Subhankar Mishra, Lan N. Nguyen, Gunhee Lee, Jungmin Kang, Jungtaek Seo, My T. Thai:
Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid. CoRR abs/2005.08705 (2020)
2010 – 2019
- 2019
- [j25]Vishal Sharma, Ilsun You, Jung-Taek Seo, Mohsen Guizani:
Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs). IEEE Access 7: 13867-13881 (2019) - [i1]Vishal Sharma, Jiyoon Kim, Yongho Ko, Ilsun You, Jung-Taek Seo:
An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X). CoRR abs/1909.07568 (2019) - 2018
- [j24]Kyungroul Lee, Kangbin Yim, Jung-Taek Seo:
Ransomware prevention technique using key backup. Concurr. Comput. Pract. Exp. 30(3) (2018) - [j23]Suhyun Kim, YongWoon Hwang, Jung-Taek Seo:
Secure Multicast using Proxy Re-Encryption in an IoT Environment. KSII Trans. Internet Inf. Syst. 12(2): 946-959 (2018) - [j22]Kyungroul Lee, Insu Oh, Yeunsu Lee, Hyeji Lee, Kangbin Yim, Jungtaek Seo:
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services. J. Sensors 2018: 2089626:1-2089626:17 (2018) - [j21]Ilsun You, Soonhyun Kwon, Gaurav Choudhary, Vishal Sharma, Jung-Taek Seo:
An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System. Sensors 18(6): 1888 (2018) - [j20]Ping Xie, Ling Xing, Honghai Wu, Jung-Taek Seo, Ilsun You:
Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things. Sensors 18(12): 4257 (2018) - [j19]Manhyun Chung, Woo-Geun Ahn, Byung-gil Min, Jungtaek Seo, Jongsub Moon:
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants. J. Supercomput. 74(3): 1378-1393 (2018) - [c33]Donghyun Kim, Euiseong Ko, Junggab Son, Yeojin Kim, Jungtaek Seo:
A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework. BigDataService 2018: 254-259 - 2017
- [j18]Tianyi Pan, Subhankar Mishra, Lan N. Nguyen, Gunhee Lee, Jungmin Kang, Jungtaek Seo, My T. Thai:
Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid. IEEE Access 5: 16774-16783 (2017) - [j17]Donghyun Kim, Yeojin Kim, Deying Li, Jungtaek Seo:
A new maximum fault-tolerance barrier-coverage problem in hybrid sensor network and its polynomial time exact algorithm. Ad Hoc Networks 63: 14-19 (2017) - [j16]Mingqiang Zhu, Fei Song, Lei Xu, Jung-Taek Seo, Ilsun You:
A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks. Sensors 17(12): 2767 (2017) - [j15]Subhankar Mishra, Xiang Li, Tianyi Pan, Alan Kuhnle, My T. Thai, Jungtaek Seo:
Price Modification Attack and Protection Scheme in Smart Grid. IEEE Trans. Smart Grid 8(4): 1864-1875 (2017) - [j14]Rasheed Hussain, Junggab Son, Donghyun Kim, Michele Nogueira, Heekuck Oh, Alade O. Tokuta, Jungtaek Seo:
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability. Wirel. Commun. Mob. Comput. 2017 (2017) - 2016
- [j13]Subhankar Mishra, Thang N. Dinh, My T. Thai, Jungtaek Seo, Incheol Shin:
Optimal packet scan against malicious attacks in smart grids. Theor. Comput. Sci. 609: 606-619 (2016) - [j12]Jung-Taek Seo:
Towards the advanced security architecture for Microgrid systems and applications. J. Supercomput. 72(9): 3535-3548 (2016) - [c32]Dohyun Lim, Kitaek Park, DongJun Choi, Jungtaek Seo:
Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures. BWCCA 2016: 429-442 - [c31]Rasheed Hussain, Waqas Nawaz, JooYoung Lee, Junggab Son, Jung-Taek Seo:
A Hybrid Trust Management Framework for Vehicular Social Networks. CSoNet 2016: 214-225 - [c30]Seokjun Lee, Hyunguk Yoo, Jung-Taek Seo, Taeshik Shon:
Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model. iThings/GreenCom/CPSCom/SmartData 2016: 498-503 - 2015
- [j11]Woo-Geun Ahn, Manhyun Chung, Byung-gil Min, Jung-Taek Seo:
Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs. Int. J. Distributed Sens. Networks 11: 836258:1-836258:12 (2015) - [j10]Hang Tu, Neeraj Kumar, Jongsung Kim, Jungtaek Seo:
A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multim. Tools Appl. 74(16): 6365-6377 (2015) - [j9]Jung-Taek Seo, Seokjun Lee, Taeshik Shon:
A study on memory dump analysis based on digital forensic tools. Peer-to-Peer Netw. Appl. 8(4): 694-703 (2015) - [j8]Muhammad Yasin, Junaid Ahmad Qureshi, Firdous Kausar, Jongsung Kim, Jungtaek Seo:
A granular approach for user-centric network analysis to identify digital evidence. Peer-to-Peer Netw. Appl. 8(5): 911-924 (2015) - [j7]Jungtaek Seo, Subhankar Mishra, Xiang Li, My T. Thai:
Catastrophic cascading failures in power networks. Theor. Comput. Sci. 607: 306-319 (2015) - [c29]Subhankar Mishra, Xiang Li, Alan Kuhnle, My T. Thai, Jungtaek Seo:
Rate alteration attacks in smart grid. INFOCOM 2015: 2353-2361 - [c28]Junggab Son, Donghyun Kim, Rasheed Hussain, Alade Tokuta, Sung-Sik Kwon, Jung-Taek Seo:
Privacy aware incentive mechanism to collect mobile data while preventing duplication. MILCOM 2015: 1242-1247 - 2014
- [j6]Incheol Shin, Jun Ho Huh, Sinkyu Kim, Jungtaek Seo:
Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency. Mob. Networks Appl. 19(3): 426-434 (2014) - [j5]I Luk Kim, Jung-Taek Seo, Taeshik Shon, Jongsub Moon:
A novel approach to detection of mobile rogue access points. Secur. Commun. Networks 7(10): 1510-1516 (2014) - [c27]Subhankar Mishra, Xiang Li, My T. Thai, Jungtaek Seo:
Cascading Critical Nodes Detection with Load Redistribution in Complex Systems. COCOA 2014: 379-394 - 2013
- [j4]YoungHwa Jang, Incheol Shin, Byung-gil Min, Jungtaek Seo, MyungKeun Yoon:
Whitelisting for Critical IT-Based Infrastructure. IEICE Trans. Commun. 96-B(4): 1070-1074 (2013) - [j3]Junwon Lee, Jaeik Cho, Jung-Taek Seo, Taeshik Shon, Dongho Won:
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed. Mob. Networks Appl. 18(1): 122-128 (2013) - [j2]Donggeon Lee, Dooho Choi, Jungtaek Seo, Howon Kim:
Reset Tree-Based Optical Fault Detection. Sensors 13(5): 6713-6729 (2013) - 2012
- [j1]Kyusuk Han, Kwangjo Kim, Wook Choi, Hyo Hyun Choi, Jung-Taek Seo, Taeshik Shon:
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 14(3-4): 251-269 (2012) - [c26]Incheol Shin, Sinkyu Kim, Jungtaek Seo:
On Trigger Detection against Reactive Jamming Attacks: A Localized Solution. WISA 2012: 312-327 - 2011
- [c25]Jaeik Cho, Junwon Lee, Jung-Taek Seo, Taeshik Shon:
A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors. NBiS 2011: 573-577
2000 – 2009
- 2007
- [c24]Jungtaek Seo:
An Attack Classification Mechanism Based on Multiple Support Vector Machines. ICCSA (2) 2007: 94-103 - [c23]Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon:
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. ICIC (1) 2007: 646-655 - 2006
- [c22]Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon:
Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. FSKD 2006: 716-724 - [c21]Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations. ISI 2006: 572-577 - 2005
- [c20]Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon:
A New DDoS Detection Model Using Multiple SVMs and TRA. EUC Workshops 2005: 976-985 - [c19]Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon:
PPF Model with CTNT to Defend Web Server from DDoS Attack. EUC Workshops 2005: 986-995 - [c18]Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim:
Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs. FSKD (2) 2005: 205-214 - [c17]Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon:
SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. GCC 2005: 59-70 - [c16]Minsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park:
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. ICCSA (2) 2005: 225-234 - [c15]Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim:
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. ICOIN 2005: 72-79 - [c14]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
SVM Approach with a Genetic Algorithm for Network Intrusion Detection. ISCIS 2005: 224-233 - [c13]Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon:
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. NPC 2005: 351-354 - [p1]Jungtaek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon:
A New Approach to Detect DDoS Attacks using Support Vector Machine. New Trends in Computer Networks 2005 - 2004
- [c12]Eung Ki Park, Dae-Sik Choi, Eul-Gyu Im, Jung-Taek Seo, Dongkyu Kim:
Adaptive Architecture for Web Server Survivability. ADVIS 2004: 172-180 - [c11]Do-Hoon Lee, Jung-Taek Seo, Jae-Cheol Ryou:
Alerts Correlation System to Enhance the Performance of the Network-Based Intrusion Detection System. GCC 2004: 333-340 - [c10]Jung-Taek Seo, Cheolho Lee, Jongsub Moon:
Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. GCC Workshops 2004: 390-397 - [c9]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments. GCC 2004: 891-894 - [c8]Jongsub Moon, Taeshik Shon, Jung-Taek Seo, Jongho Kim, Jungwoo Seo:
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing. ISCIS 2004: 351-362 - [c7]Eung Ki Park, Jung-Taek Seo, Eul-Gyu Im, Cheolwon Lee:
Vulnerability Analysis and Evaluation within an Intranet. ISI 2004: 514-515 - [c6]Jangha Kim, Byungwook Song, Kanghee Lee, Sangwook Kim, Dae-Sik Choi, Jungtaek Seo:
Design a High-Level Language for Large Network Security Management. OTM Workshops 2004: 7-8 - [c5]Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim:
Adaptation Enhanced Mechanism for Web Survivability. PDCAT 2004: 650-653 - [c4]Jung-Taek Seo, Dae-Sik Choi, Eung Ki Park, Taeshik Shon, Jongsub Moon:
Patch Management System for Multi-platform Environment. PDCAT 2004: 654-661 - [c3]Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Seo, Eunyoung Lee, Miri Joo:
A High-Level Policy Description Language for the Network ACL. PDCAT 2004: 748-751 - 2003
- [c2]Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo:
Safe Patch Distribution Architecture in Intranet Environments. Security and Management 2003: 455-460 - [c1]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. ICICS 2003: 313-324
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint