IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system S Kwon, H Yoo, T Shon IEEE Access 8, 77572-77586, 2020 | 82 | 2020 |
Design and implementation of cybersecurity testbed for industrial IoT systems S Lee, S Lee, H Yoo, S Kwon, T Shon The Journal of Supercomputing 74, 4506-4520, 2018 | 61 | 2018 |
Towards 5G-based IoT security analysis against Vo5G eavesdropping S Kwon, S Park, H Cho, Y Park, D Kim, K Yim Computing 103, 425-447, 2021 | 32 | 2021 |
5G security threat assessment in real networks S Park, D Kim, Y Park, H Cho, D Kim, S Kwon Sensors 21 (16), 5524, 2021 | 26 | 2021 |
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance JH Jeong, S Kwon, MP Hong, J Kwak, T Shon Multimedia Tools and Applications 79, 16077-16091, 2020 | 24 | 2020 |
Session management for security systems in 5g standalone network S Park, S Kwon, Y Park, D Kim, I You IEEE Access 10, 73421-73436, 2022 | 19 | 2022 |
Toward security enhanced provisioning in industrial IoT systems S Kwon, J Jeong, T Shon Sensors 18 (12), 4372, 2018 | 17 | 2018 |
RNN-based anomaly detection in DNP3 transport layer S Kwon, H Yoo, T Shon 2019 IEEE international conference on communications, control, and computing …, 2019 | 16 | 2019 |
Cybersecurity framework for IIoT-based power system connected to microgrid JW Jang, S Kwon, SJ Kim, J Seo, J Oh, K Lee KSII Transactions on Internet and Information Systems (TIIS) 14 (5), 2221-2235, 2020 | 11 | 2020 |
Digital forensic readiness for financial network S Kwon, J Jeong, T Shon 2019 International conference on platform technology and service (PlatCon), 1-4, 2019 | 8 | 2019 |
A novel security framework for industrial iot based on isa 100.11 a H Kim, S Kim, S Kwon, W Jo, T Shon Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th …, 2019 | 5 | 2019 |
Recovery measure against disabling reassembly attack to DNP3 communication S Kwon, H Yoo, T Shon IEICE TRANSACTIONS on Information and Systems 100 (8), 1790-1797, 2017 | 4 | 2017 |
DNP3 protocol security and attack detection method S Kwon, H Yoo, S Lee, T Shon Journal of Advanced Navigation Technology 18 (4), 353-358, 2014 | 4 | 2014 |
제어시스템 DNP3 프로토콜 취약점과 보안 현황 S Kwon, T Shon Review of KIISC 24 (1), 53-58, 2014 | 3 | 2014 |
Security Threats Analysis and Security Requirement for Industrial Wireless Protocols: ISA 100.11 a and WirelessHART JH Jeong, SM Kwon, TS Shon Journal of the Korea Institute of Information Security & Cryptology 29 (5 …, 2019 | 2 | 2019 |
Cyber Security Framework for Critical Infrastructure S Kwon, S Lee, J Jang, T Shon Journal of The Korea Institute of information Security & Cryptology 27 (2 …, 2017 | 2 | 2017 |
Digital forensic consideration for financial IT security K Park, S Kwon, S Kim, T Shon 2016 Future Technologies Conference (FTC), 1025-1029, 2016 | 2 | 2016 |
WhiteList-based DNP3 Intrusion Detection System for SCADA M Kim, S Kwon, W Jo, T Shon Proceedings of the Korea Information Processing Society Conference, 228-231, 2016 | 2 | 2016 |
Scenario-based attack route on industrial control system SM Kwon, HU Yoo, T Shon, GW Lee 2014 International Conference on IT Convergence and Security (ICITCS), 1-3, 2014 | 2 | 2014 |
Digital forensic artifact collection technique using application decompilation D Yoo, Y Shin, SJ Kim, HJ Kim, SM Kwon, T Shon 2019 International Conference on Platform Technology and Service (PlatCon), 1-3, 2019 | 1 | 2019 |