Search

Your search keyword '"Taeshik Shon"' showing total 124 results

Search Constraints

Start Over You searched for: Author "Taeshik Shon" Remove constraint Author: "Taeshik Shon" Search Limiters Full Text Remove constraint Search Limiters: Full Text
124 results on '"Taeshik Shon"'

Search Results

1. Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems

2. IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System

3. Digital Forensic Case Studies for In-Vehicle Infotainment Systems Using Android Auto and Apple CarPlay

4. Digital Forensic Analysis to Improve User Privacy on Android

5. Toward Security Enhanced Provisioning in Industrial IoT Systems

6. Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks

7. Untraceable Mobile Node Authentication in WSN

8. An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles

9. High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions

10. Software Authority Transition through Multiple Distributors

11. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

12. Data Aggregation Gateway Framework for CoAP Group Communications

13. Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

14. An Adaptive Allocation Algorithm Using Directional CSMA/CA over mmWave Wireless Personal Area Networks

17. Novel Approaches to Enhance Mobile WiMAX Security

19. Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing

20. Forensic Analysis of IoT File Systems for Linux-Compatible Platforms

21. AI-enabled device digital forensics for smart cities

22. Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems

23. Smart seed selection-based effective black box fuzzing for IIoT protocol

24. IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System

26. Ext4 and XFS File System Forensic Framework Based on TSK

27. Digital Forensic Practices and Methodologies for AI Speaker Ecosystems

28. Packet Preprocessing in CNN-Based Network Intrusion Detection System

29. An Anonymous Device to Device Authentication Protocol Using ECC and Self Certified Public Keys Usable in Internet of Things Based Autonomous Devices

30. Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems

31. Design and implementation of cybersecurity testbed for industrial IoT systems

32. Cyber Security Framework for Critical Infrastructure

35. Field classification-based novel fuzzing case generation for ICS protocols

36. Recovery Measure against Disabling Reassembly Attack to DNP3 Communication

37. VANET Privacy Assurance Architecture Design

38. Research on Institutional and Technical Improvement Regarding on the Collection and Application of Non-Specific Personal Information

39. Digital forensic science approach by file recovery research

41. Toward Security Enhanced Provisioning in Industrial IoT Systems

42. In-Vehicle Networking/Autonomous Vehicle Security for Internet of Things/Vehicles

43. Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture

44. A lightweight message authentication scheme for Smart Grid communications in power sector

45. Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation

46. An improved and robust biometrics-based three factor authentication scheme for multiserver environments

47. A novel security architecture of electronic vehicle system for smart grid communication

48. APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE

49. Neighbor stability-based VANET clustering for urban vehicular environments

50. Exploring an area by groups of UAVs in the presence of a refueling base

Catalog

Books, media, physical & digital resources