Følg
Sangwon Hyun
Sangwon Hyun
Verificeret mail på mju.ac.kr
Titel
Citeret af
Citeret af
År
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
S Hyun, P Ning, A Liu, W Du
2008 International Conference on Information Processing in Sensor Networks …, 2008
1782008
Analysis of autoencoders for network intrusion detection
Y Song, S Hyun, YG Cheong
Sensors 21 (13), 4294, 2021
1012021
Network node and method of operating the network node
E Kim, S Seo, M Jang, S Hyun
US Patent 9,774,708, 2017
732017
SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
712020
Interface to network security functions for cloud-based security services
S Hyun, J Kim, H Kim, J Jeong, S Hares, L Dunbar, A Farrel
IEEE Communications Magazine 56 (1), 171-178, 2018
462018
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
J Choi, J Yu, S Hyun, H Kim
Digital Investigation 28, S50-S59, 2019
452019
Ibcs: Intent-based cloud services for security applications
J Kim, E Kim, J Yang, J Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ...
IEEE Communications Magazine 58 (4), 45-51, 2020
312020
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
202019
Machine learning based intrusion detection systems for class imbalanced datasets
YG Cheong, K Park, H Kim, J Kim, S Hyun
Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017
172017
Method and apparatus of data authentication
SC Seo, EA Kim, TH Kim, MW Jang, SW Hyun
US Patent 9,473,307, 2016
172016
Design and Analysis of Push Notification‐Based Malware on Android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018 (1), 8510256, 2018
112018
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 1962, 2020
102020
Mitigating wireless jamming attacks via channel migration
S Hyun, P Ning, A Liu
2011 31st International Conference on Distributed Computing Systems …, 2011
102011
Kerberoid: A practical android app decompilation system with multiple decompilers
H Jang, B Jin, S Hyun, H Kim
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
82019
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J Cho, G Cho, S Hyun, H Kim
J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017
72017
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes
S Hyun, K Sun, P Ning
Computer Communications 104, 191-203, 2017
52017
Method of authenticating and verifying data packet transmission, and apparatuses for performing the same
SW Hyun, EA Kim, SC Seo, MW Jang
US Patent App. 14/470,051, 2015
42015
An efficient code dissemination mechanism for building automation and industrial control networks
S Hyun, M Kim
Proceedings of the 5th International Conference on Ubiquitous Information …, 2011
42011
Mutexion: Mutually exclusive compression system for mitigating compression side-channel attacks
T Moon, H Kim, S Hyun
ACM Transactions on the Web 16 (4), 1-20, 2022
22022
Secure Code Dissemination in Wireless Sensor Networks.
S Hyun, P Ning
Encyclopedia of Cryptography and Security (2nd Ed.), 1099-1102, 2011
22011
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20