Search

Your search keyword '"Jungtaek Seo"' showing total 107 results

Search Constraints

Start Over You searched for: Author "Jungtaek Seo" Remove constraint Author: "Jungtaek Seo"
107 results on '"Jungtaek Seo"'

Search Results

1. Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid

2. Reset Tree-Based Optical Fault Detection

3. Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs

4. An Effective Wormhole Attack Defence Method for a Smart Meter Mesh Network in an Intelligent Power Grid

5. Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

13. Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process

15. Auditing on Smart-Grid With Dynamic Traffic Flows: An Algorithmic Approach

16. Privacy Enhanced Location Sharing for Mobile Online Social Networks

17. A novel transparent and auditable fog-assisted cloud storage with compensation mechanism

18. Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs)

19. A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant

20. A Study on the Digital Forensic Method for Decentralized Web Service

21. Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic

22. Proposed On-site Document Sharing System using FIDO

23. Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning

24. Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid

26. A new maximum fault-tolerance barrier-coverage problem in hybrid sensor network and its polynomial time exact algorithm

27. Price Modification Attack and Protection Scheme in Smart Grid

29. An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants

30. Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid

31. Cyber attack scenarios on smart city and their ripple effects

32. Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things

33. Towards the advanced security architecture for Microgrid systems and applications

34. Optimal packet scan against malicious attacks in smart grids

35. Detection of Replay Attack Traffic in ICS Network

36. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System

37. A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework

38. A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services

39. Secure Multicast Using Proxy Re-encryption in IoT Environment

40. Catastrophic cascading failures in power networks

41. Risk Rating Process of Cyber Security Threats in NPP I&C

42. A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments

43. A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks

44. PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability

45. A Study on Method to Establish Cyber Security Technical System in NPP Digital I&C

46. A granular approach for user-centric network analysis to identify digital evidence

47. Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model

48. Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid.

49. A study on memory dump analysis based on digital forensic tools

50. Reset Tree-Based Optical Fault Detection

Catalog

Books, media, physical & digital resources