Search

Your search keyword '"Taeshik Shon"' showing total 72 results

Search Constraints

Start Over You searched for: Author "Taeshik Shon" Remove constraint Author: "Taeshik Shon" Language english Remove constraint Language: english
72 results on '"Taeshik Shon"'

Search Results

1. Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems

2. IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System

3. Digital Forensic Case Studies for In-Vehicle Infotainment Systems Using Android Auto and Apple CarPlay

4. Digital Forensic Analysis to Improve User Privacy on Android

5. Toward Security Enhanced Provisioning in Industrial IoT Systems

6. Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks

7. Untraceable Mobile Node Authentication in WSN

8. An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles

9. High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions

10. Software Authority Transition through Multiple Distributors

11. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

12. Data Aggregation Gateway Framework for CoAP Group Communications

13. Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

14. An Adaptive Allocation Algorithm Using Directional CSMA/CA over mmWave Wireless Personal Area Networks

17. Novel Approaches to Enhance Mobile WiMAX Security

18. Forensic Analysis of IoT File Systems for Linux-Compatible Platforms

19. Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems

20. Ext4 and XFS File System Forensic Framework Based on TSK

21. Packet Preprocessing in CNN-Based Network Intrusion Detection System

22. An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices

23. Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems

24. Toward Security Enhanced Provisioning in Industrial IoT Systems

25. Velocity Obstacle Based 3D Collision Avoidance Scheme for Low-Cost Micro UAVs

26. Untraceable Mobile Node Authentication in WSN

27. High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions

28. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

29. Future Information Technology, Application, and Service : FutureTech 2012 Volume 2

30. Future Information Technology, Application, and Service : FutureTech 2012 Volume 1

31. IT Convergence and Services : ITCS & IRoA 2011

32. Secure and Trust Computing, Data Management, and Applications : 8th FIRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Part I

33. Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

36. Velocity Obstacle Based 3D Collision Avoidance Scheme for Low-Cost Micro UAVs.

37. A Hybrid EV Authentication Approach in Smart Grid Based Distributed Network.

38. Wormhole attack prevention mechanism for RPL based LLN network.

45. An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.

46. Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.

47. PPF Model with CTNT to Defend Web Server from DDoS Attack.

48. A New DDoS Detection Model Using Multiple SVMs and TRA.

49. Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks.

50. SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.

Catalog

Books, media, physical & digital resources