| Seluge: Secure and dos-resistant code dissemination in wireless sensor networks S Hyun, P Ning, A Liu, W Du 2008 International Conference on Information Processing in Sensor Networks …, 2008 | 182 | 2008 |
| Analysis of autoencoders for network intrusion detection Y Song, S Hyun, YG Cheong Sensors 21 (13), 4294, 2021 | 175 | 2021 |
| SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles G Cho, J Cho, S Hyun, H Kim Applied Sciences 10 (9), 3149, 2020 | 108 | 2020 |
| Network node and method of operating the network node E Kim, S Seo, M Jang, S Hyun US Patent 9,774,708, 2017 | 78 | 2017 |
| Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger J Choi, J Yu, S Hyun, H Kim Digital Investigation 28, S50-S59, 2019 | 58 | 2019 |
| Ibcs: Intent-based cloud services for security applications J Kim, E Kim, J Yang, J Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ... IEEE Communications Magazine 58 (4), 45-51, 2020 | 56 | 2020 |
| Interface to network security functions for cloud-based security services S Hyun, J Kim, H Kim, J Jeong, S Hares, L Dunbar, A Farrel IEEE Communications Magazine 56 (1), 171-178, 2018 | 52 | 2018 |
| Threat modeling and analysis of voice assistant applications G Cho, J Choi, H Kim, S Hyun, J Ryoo International Workshop on Information Security Applications, 197-209, 2018 | 26 | 2018 |
| Machine learning based intrusion detection systems for class imbalanced datasets Y Cheong, K Park, H Kim, J Kim, S Hyun Journal of The Korea Institute of Information Security & Cryptology 27 (6 …, 2017 | 19 | 2017 |
| Method and apparatus of data authentication SC Seo, EA Kim, TH Kim, MW Jang, SW HYUN US Patent 9,473,307, 2016 | 19 | 2016 |
| Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things J Choi, J Cho, H Kim, S Hyun Applied Sciences 10 (6), 1962, 2020 | 14 | 2020 |
| Design and Analysis of Push Notification‐Based Malware on Android S Hyun, J Cho, G Cho, H Kim Security and Communication Networks 2018 (1), 8510256, 2018 | 14 | 2018 |
| Kerberoid: A practical android app decompilation system with multiple decompilers H Jang, B Jin, S Hyun, H Kim Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 11 | 2019 |
| Mitigating wireless jamming attacks via channel migration S Hyun, P Ning, A Liu 2011 31st International Conference on Distributed Computing Systems …, 2011 | 10 | 2011 |
| Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices. J Cho, G Cho, S Hyun, H Kim J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017 | 6 | 2017 |
| Mutexion: Mutually exclusive compression system for mitigating compression side-channel attacks T Moon, H Kim, S Hyun ACM Transactions on the Web 16 (4), 1-20, 2022 | 5 | 2022 |
| FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes S Hyun, K Sun, P Ning Computer Communications 104, 191-203, 2017 | 5 | 2017 |
| Method of authenticating and verifying data packet transmission, and apparatuses for performing the same SW HYUN, EA Kim, SC Seo, MW Jang US Patent App. 14/470,051, 2015 | 4 | 2015 |
| An efficient code dissemination mechanism for building automation and industrial control networks S Hyun, M Kim Proceedings of the 5th International Conference on Ubiquitous Information …, 2011 | 4 | 2011 |
| A systematic approach to building autoencoders for intrusion detection Y Song, S Hyun, YG Cheong Silicon Valley Cybersecurity Conference, 188-204, 2020 | 3 | 2020 |