Whitelist-based network switch KIM Heemin, YUN Jeong-Han, KH Kim, W Kim, SEO Jungtaek US Patent 9,369,434, 2016 | 120 | 2016 |
{HAI} 1.0:{HIL-based} Augmented {ICS} Security Dataset HK Shin, W Lee, JH Yun, HC Kim 13Th USENIX workshop on cyber security experimentation and test (CSET 20), 2020 | 90 | 2020 |
Anomaly detection for industrial control systems using sequence-to-sequence neural networks J Kim, JH Yun, HC Kim Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020 | 77 | 2020 |
Time-series aware precision and recall for anomaly detection: considering variety of detection result and addressing ambiguous labeling WS Hwang, JH Yun, J Kim, HC Kim Proceedings of the 28th ACM International Conference on Information and …, 2019 | 52 | 2019 |
A comparison of ICS datasets for security research based on attack paths S Choi, JH Yun, SK Kim Critical Information Infrastructures Security: 13th International Conference …, 2019 | 52 | 2019 |
Probabilistic attack sequence generation and execution based on mitre att&ck for ics datasets S Choi, JH Yun, BG Min Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 41-48, 2021 | 41 | 2021 |
Burst-based anomaly detection on the DNP3 protocol JH Yun, SH Jeon, KH Kim, WN Kim International Journal of Control and Automation 6 (2), 313-324, 2013 | 38 | 2013 |
Implementation of Programmable CPS Testbed for Anomaly Detection HK Shin, W Lee, JH Yun, HC Kim 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019 | 33 | 2019 |
Two ICS security datasets and anomaly detection contest on the HIL-based augmented ICS testbed HK Shin, W Lee, JH Yun, BG Min Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 36-40, 2021 | 29 | 2021 |
CNN-based anomaly detection for packet payloads of industrial control system JY Song, R Paul, JH Yun, HC Kim, YJ Choi International Journal of Sensor Networks 36 (1), 36-49, 2021 | 28 | 2021 |
Whitelist-based anomaly detection for industrial control system security H Yoo, JH Yun, T Shon The Journal of Korean Institute of Communications and Information Sciences …, 2013 | 27 | 2013 |
Expansion of {ICS} testbed for security validation based on {MITRE}{ATT&CK} techniques S Choi, J Choi, JH Yun, BG Min, HC Kim 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020 | 25 | 2020 |
Statistical similarity of critical infrastructure network traffic based on nearest neighbor distances JH Yun, Y Hwang, W Lee, HK Ahn, SK Kim Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 18 | 2018 |
Do you know existing accuracy metrics overrate time-series anomaly detections? WS Hwang, JH Yun, J Kim, BG Min Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, 403-412, 2022 | 17 | 2022 |
Physical one-way data transfer system design for control system network KH Kim, Y Chang, H Kim, J Yun, W Kim Journal of KISS, Information networking 40 (2), 126-130, 2013 | 13 | 2013 |
Traffic-locality-based creation of flow whitelists for SCADA networks S Choi, Y Chang, JH Yun, W Kim Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015 | 10 | 2015 |
One step more: automatic ICS protocol field analysis Y Chang, S Choi, JH Yun, SK Kim Critical Information Infrastructures Security: 12th International Conference …, 2018 | 9 | 2018 |
Physical unidirectional communication apparatus and method KH Kim, YUN Jeong-Han, KIM Heemin, M Chung, W Kim, EK Park, S Park US Patent 9,749,011, 2017 | 9 | 2017 |
System and method for unidirectional data transmission JM Baek, MS Choi, CH Kim, Y Chang, BG Min, WN Kim, MS Jang, JH Yun US Patent 9,397,790, 2016 | 9 | 2016 |
Refining schizophrenia via graph reachability in esterel JH Yun, CJ Kim, S Seo, T Han, KM Choe 2009 7th IEEE/ACM International Conference on Formal Methods and Models for …, 2009 | 9 | 2009 |