Følg
Sangwon Hyun
Sangwon Hyun
Verificeret mail på mju.ac.kr
Titel
Citeret af
Citeret af
År
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
S Hyun, P Ning, A Liu, W Du
2008 International Conference on Information Processing in Sensor Networks …, 2008
1772008
Analysis of autoencoders for network intrusion detection
Y Song, S Hyun, YG Cheong
Sensors 21 (13), 4294, 2021
862021
SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
652020
Interface to network security functions for cloud-based security services
S Hyun, J Kim, H Kim, J Jeong, S Hares, L Dunbar, A Farrel
IEEE Communications Magazine 56 (1), 171-178, 2018
462018
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
J Choi, J Yu, S Hyun, H Kim
Digital Investigation 28, S50-S59, 2019
432019
Ibcs: Intent-based cloud services for security applications
J Kim, E Kim, J Yang, J Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ...
IEEE Communications Magazine 58 (4), 45-51, 2020
262020
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
202019
Machine learning based intrusion detection systems for class imbalanced datasets
YG Cheong, K Park, H Kim, J Kim, S Hyun
Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017
172017
Method and apparatus of data authentication
SC Seo, EA Kim, TH Kim, MW Jang, SW Hyun
US Patent 9,473,307, 2016
172016
Design and analysis of push notification-based malware on android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018, 2018
102018
Mitigating wireless jamming attacks via channel migration
S Hyun, P Ning, A Liu
2011 31st International Conference on Distributed Computing Systems …, 2011
102011
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 1962, 2020
82020
Kerberoid: A practical android app decompilation system with multiple decompilers
H Jang, B Jin, S Hyun, H Kim
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
82019
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J Cho, G Cho, S Hyun, H Kim
J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017
72017
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes
S Hyun, K Sun, P Ning
Computer Communications 104, 191-203, 2017
52017
Method of authenticating and verifying data packet transmission, and apparatuses for performing the same
SW Hyun, EA Kim, SC Seo, MW Jang
US Patent App. 14/470,051, 2015
42015
An efficient code dissemination mechanism for building automation and industrial control networks
S Hyun, M Kim
Proceedings of the 5th International Conference on Ubiquitous Information …, 2011
42011
Secure Code Dissemination in Wireless Sensor Networks.
S Hyun, P Ning
Encyclopedia of Cryptography and Security (2nd Ed.), 1099-1102, 2011
22011
Mutexion: Mutually exclusive compression system for mitigating compression side-channel attacks
T Moon, H Kim, S Hyun
ACM Transactions on the Web 16 (4), 1-20, 2022
12022
A systematic approach to building autoencoders for intrusion detection
Y Song, S Hyun, YG Cheong
Silicon Valley Cybersecurity Conference, 188-204, 2020
12020
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20