[go: up one dir, main page]

Follow
Sangwon Hyun
Sangwon Hyun
Verified email at mju.ac.kr
Title
Cited by
Cited by
Year
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
S Hyun, P Ning, A Liu, W Du
2008 International Conference on Information Processing in Sensor Networks …, 2008
1822008
Analysis of autoencoders for network intrusion detection
Y Song, S Hyun, YG Cheong
Sensors 21 (13), 4294, 2021
1752021
SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
1082020
Network node and method of operating the network node
E Kim, S Seo, M Jang, S Hyun
US Patent 9,774,708, 2017
782017
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
J Choi, J Yu, S Hyun, H Kim
Digital Investigation 28, S50-S59, 2019
582019
Ibcs: Intent-based cloud services for security applications
J Kim, E Kim, J Yang, J Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ...
IEEE Communications Magazine 58 (4), 45-51, 2020
562020
Interface to network security functions for cloud-based security services
S Hyun, J Kim, H Kim, J Jeong, S Hares, L Dunbar, A Farrel
IEEE Communications Magazine 56 (1), 171-178, 2018
522018
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
International Workshop on Information Security Applications, 197-209, 2018
262018
Machine learning based intrusion detection systems for class imbalanced datasets
Y Cheong, K Park, H Kim, J Kim, S Hyun
Journal of The Korea Institute of Information Security & Cryptology 27 (6 …, 2017
192017
Method and apparatus of data authentication
SC Seo, EA Kim, TH Kim, MW Jang, SW HYUN
US Patent 9,473,307, 2016
192016
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 1962, 2020
142020
Design and Analysis of Push Notification‐Based Malware on Android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018 (1), 8510256, 2018
142018
Kerberoid: A practical android app decompilation system with multiple decompilers
H Jang, B Jin, S Hyun, H Kim
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
112019
Mitigating wireless jamming attacks via channel migration
S Hyun, P Ning, A Liu
2011 31st International Conference on Distributed Computing Systems …, 2011
102011
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J Cho, G Cho, S Hyun, H Kim
J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017
62017
Mutexion: Mutually exclusive compression system for mitigating compression side-channel attacks
T Moon, H Kim, S Hyun
ACM Transactions on the Web 16 (4), 1-20, 2022
52022
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes
S Hyun, K Sun, P Ning
Computer Communications 104, 191-203, 2017
52017
Method of authenticating and verifying data packet transmission, and apparatuses for performing the same
SW HYUN, EA Kim, SC Seo, MW Jang
US Patent App. 14/470,051, 2015
42015
An efficient code dissemination mechanism for building automation and industrial control networks
S Hyun, M Kim
Proceedings of the 5th International Conference on Ubiquitous Information …, 2011
42011
A systematic approach to building autoencoders for intrusion detection
Y Song, S Hyun, YG Cheong
Silicon Valley Cybersecurity Conference, 188-204, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20