default search action
Taeshik Shon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j106]Yeonghun Shin, Taeshik Shon:
Towards a practical usage for the Sleuth Kit supporting file system add-ons. Forensic Sci. Int. Digit. Investig. 50: 301799 (2024) - 2023
- [j105]Donghyun Kim, Subin Oh, Taeshik Shon:
Digital forensic approaches for metaverse ecosystems. Forensic Sci. Int. Digit. Investig. 46(Supplement): 301608 (2023) - [j104]Minju Kim, Yeonghun Shin, Wooyeon Jo, Taeshik Shon:
Digital forensic analysis of intelligent and smart IoT devices. J. Supercomput. 79(1): 973-997 (2023) - 2022
- [j103]Wooyeon Jo, SungJin Kim, Hyunjin Kim, Yeonghun Shin, Taeshik Shon:
Automatic whitelist generation system for ethernet based in-vehicle network. Comput. Ind. 142: 103735 (2022) - [j102]Hyungchan Kim, Yeonghun Shin, Sungbum Kim, Wooyeon Jo, Minju Kim, Taeshik Shon:
Digital Forensic Analysis to Improve User Privacy on Android. Sensors 22(11): 3971 (2022) - [j101]Yeonghun Shin, Sungbum Kim, Wooyeon Jo, Taeshik Shon:
Digital Forensic Case Studies for In-Vehicle Infotainment Systems Using Android Auto and Apple CarPlay. Sensors 22(19): 7196 (2022) - [j100]Sungbum Kim, Wooyeon Jo, Jino Lee, Taeshik Shon:
AI-enabled device digital forensics for smart cities. J. Supercomput. 78(2): 3029-3044 (2022) - [j99]HyunJin Kim, Taeshik Shon:
Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing. J. Supercomput. 78(11): 13554-13563 (2022) - 2021
- [j98]Hyunjin Kim, Sungjin Kim, Wooyeon Jo, Ki-Hyun Kim, Taeshik Shon:
Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems. IEEE Access 9: 75542-75552 (2021) - [c42]Hyungchan Kim, Yeonghun Shin, Sungbum Kim, Minju Kim, Wooyeon Jo, Taeshik Shon:
Data Deletion and Recovery of Androd Plaforms. CSCI 2021: 651-654 - [c41]Minju Kim, Yeonghun Shin, Wooyeon Jo, Taeshik Shon:
Security Analysis of Smart Watch and Band Devices. CSCI 2021: 655-658 - 2020
- [j97]SungMoon Kwon, Hyunguk Yoo, Taeshik Shon:
IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System. IEEE Access 8: 77572-77586 (2020) - [j96]SungJin Kim, Wooyeon Jo, Taeshik Shon:
APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE. Appl. Soft Comput. 88: 106017 (2020) - [j95]Shehzad Ashraf Chaudhry, Taeshik Shon, Fadi Al-Turjman, Mohammed H. Alsharif:
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems. Comput. Commun. 153: 527-537 (2020) - [j94]Yeonghun Shin, Hyungchan Kim, Sungbum Kim, Dongkyun Yoo, Wooyeon Jo, Taeshik Shon:
Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem. Digit. Investig. 33 Supplement: 301010 (2020) - [j93]Jaehan Jeong, SungMoon Kwon, Man-Pyo Hong, Jin Kwak, Taeshik Shon:
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance. Multim. Tools Appl. 79(23-24): 16077-16091 (2020) - [j92]Seokjun Lee, Wooyeon Jo, Soowoong Eo, Taeshik Shon:
ExtSFR: scalable file recovery framework based on an Ext file system. Multim. Tools Appl. 79(23-24): 16093-16111 (2020) - [j91]SungJin Kim, Jaeik Cho, Changhoon Lee, Taeshik Shon:
Smart seed selection-based effective black box fuzzing for IIoT protocol. J. Supercomput. 76(12): 10140-10154 (2020)
2010 – 2019
- 2019
- [j90]Shehzad Ashraf Chaudhry, I Luk Kim, Seungmin Rho, Mohammad Sabzinejad Farash, Taeshik Shon:
An improved anonymous authentication scheme for distributed mobile cloud computing services. Clust. Comput. 22(Suppl 1): 1595-1609 (2019) - [j89]Wooyeon Jo, Yeonghun Shin, Hyungchan Kim, Dongkyun Yoo, Donghyun Kim, Cheulhoon Kang, Jongmin Jin, Jungkyung Oh, Bitna Na, Taeshik Shon:
Digital Forensic Practices and Methodologies for AI Speaker Ecosystems. Digit. Investig. 29 Supplement: S80-S93 (2019) - [j88]Myungjong Kim, Wooyeon Jo, Jaehoon Kim, Taeshik Shon:
Visualization for internet of things: power system and financial network cases. Multim. Tools Appl. 78(3): 3241-3265 (2019) - [c40]SungMoon Kwon, Hyunguk Yoo, Taeshik Shon:
RNN-based Anomaly Detection in DNP3 Transport Layer. SmartGridComm 2019: 1-7 - 2018
- [j87]Seokcheol Lee, SungJin Kim, Ken Choi, Taeshik Shon:
Game theory-based Security Vulnerability Quantification for Social Internet of Things. Future Gener. Comput. Syst. 82: 752-760 (2018) - [j86]SungMoon Kwon, Jaehan Jeong, Taeshik Shon:
Toward Security Enhanced Provisioning in Industrial IoT Systems. Sensors 18(12): 4372 (2018) - [j85]Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash, Taeshik Shon, Muhammad Sher:
An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J. Supercomput. 74(8): 3504-3520 (2018) - [j84]Wooyeon Jo, Hyun Soo Chang, Taeshik Shon:
Digital forensic science approach by file recovery research. J. Supercomput. 74(8): 3704-3725 (2018) - [j83]SungJin Kim, Taeshik Shon:
Field classification-based novel fuzzing case generation for ICS protocols. J. Supercomput. 74(9): 4434-4450 (2018) - [j82]Seokcheol Lee, Seokjun Lee, Hyunguk Yoo, SungMoon Kwon, Taeshik Shon:
Design and implementation of cybersecurity testbed for industrial IoT systems. J. Supercomput. 74(9): 4506-4520 (2018) - [c39]Hyunjin Kim, SungJin Kim, SungMoon Kwon, Wooyeon Jo, Taeshik Shon:
A Novel Security Framework for Industrial IoT Based on ISA 100.11a. QSHINE 2018: 61-72 - 2017
- [j81]Shehzad Ashraf Chaudhry, Aiiad Albeshri, Naixue Xiong, Changhoon Lee, Taeshik Shon:
A privacy preserving authentication scheme for roaming in ubiquitous networks. Clust. Comput. 20(2): 1223-1236 (2017) - [j80]SungMoon Kwon, Hyunguk Yoo, Taeshik Shon:
Recovery Measure against Disabling Reassembly Attack to DNP3 Communication. IEICE Trans. Inf. Syst. 100-D(8): 1790-1797 (2017) - [j79]Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, SK Hafizul Islam, Taeshik Shon:
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks. Wirel. Pers. Commun. 93(2): 311-335 (2017) - [j78]Hyo Hyun Choi, Su Hyun Nam, Taeshik Shon:
Two Tier Search Scheme Using Micro UAV Swarm. Wirel. Pers. Commun. 93(2): 349-363 (2017) - [j77]Tewodros Legesse Munea, I Luk Kim, Taeshik Shon:
Design and Implementation of Fuzzing Framework Based on IoT Applications. Wirel. Pers. Commun. 93(2): 365-382 (2017) - 2016
- [j76]Sania Yaqoob, Taeshik Shon:
A Hybrid EV Authentication Approach in Smart Grid Based Distributed Network. Ad Hoc Sens. Wirel. Networks 31(1-4): 89-99 (2016) - [j75]Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Hafiz Farooq Ahmad:
A lightweight message authentication scheme for Smart Grid communications in power sector. Comput. Electr. Eng. 52: 114-124 (2016) - [j74]Hyunguk Yoo, Taeshik Shon:
Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture. Future Gener. Comput. Syst. 61: 128-136 (2016) - [j73]Shehzad Ashraf Chaudhry, Muhammad Tawab Khan, Muhammad Khurram Khan, Taeshik Shon:
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography. J. Medical Syst. 40(11): 230:1-230:13 (2016) - [j72]Seokcheol Lee, Jongwan Kim, Taeshik Shon:
User privacy-enhanced security architecture for home area network of Smartgrid. Multim. Tools Appl. 75(20): 12749-12764 (2016) - [j71]Yongmin Park, Hyun Soo Chang, Taeshik Shon:
Data investigation based on XFS file system metadata. Multim. Tools Appl. 75(22): 14721-14743 (2016) - [j70]Tewodros Legesse Munea, Hyunwoo Lim, Taeshik Shon:
Network protocol fuzz testing for information systems and applications: a survey and taxonomy. Multim. Tools Appl. 75(22): 14745-14757 (2016) - [j69]Minki Cha, Jung-Hyok Kwon, SungJin Kim, Taeshik Shon, Eui-Jik Kim:
Data Aggregation Gateway Framework for CoAP Group Communications. Symmetry 8(12): 138 (2016) - [j68]Eui-Jik Kim, Jung-Hyok Kwon, Ken Choi, Taeshik Shon:
Unified Medium Access Control Architecture for Resource-Constrained Machine-to-Machine Devices. ACM Trans. Embed. Comput. Syst. 15(2): 40:1-40:17 (2016) - [j67]Jung-Hyok Kwon, Hyun Soo Chang, Taeshik Shon, Jai-Jin Jung, Eui-Jik Kim:
Neighbor stability-based VANET clustering for urban vehicular environments. J. Supercomput. 72(1): 161-176 (2016) - [j66]Kyumin Cho, Hyunwoo Lim, Taeshik Shon, Seungjoo Kim:
A novel security architecture of electronic vehicle system for smart grid communication. J. Supercomput. 72(1): 214-231 (2016) - [j65]Myungwhan Choi, Paul Vincent Contreras, Taeshik Shon, Hyo Hyun Choi:
Exploring an area by groups of UAVs in the presence of a refueling base. J. Supercomput. 72(9): 3409-3427 (2016) - [c38]Seokjun Lee, Hyunguk Yoo, Jung-Taek Seo, Taeshik Shon:
Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model. iThings/GreenCom/CPSCom/SmartData 2016: 498-503 - [c37]Hyunguk Yoo, Taeshik Shon:
Inferring State Machine Using Hybrid Teacher. iThings/GreenCom/CPSCom/SmartData 2016: 504-509 - [c36]Seokjun Lee, Jongwan Kim, Hyunguk Yoo, Taeshik Shon:
Case Studies for Analyzing DLMS/COSEM-Based Smart Meter Vulnerabilities in Korea. iThings/GreenCom/CPSCom/SmartData 2016: 667-674 - [c35]Hyunguk Yoo, Taeshik Shon:
Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol. SmartGridComm 2016: 557-563 - 2015
- [j64]Shiuh-Jeng Wang, Jigang Liu, Taeshik Shon, Binod Vaidya, Yeong-Sheng Chen:
Security and privacy information technologies and applications for wireless pervasive computing environments. Inf. Sci. 321: 147-149 (2015) - [j63]Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash:
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems. J. Medical Syst. 39(6): 66:1-66:11 (2015) - [j62]Hyunguk Yoo, Taeshik Shon:
Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850. Multim. Tools Appl. 74(1): 303-318 (2015) - [j61]Kyusuk Han, Taeshik Shon:
Authentication of mobile applications through various local distributors. Multim. Tools Appl. 74(5): 1541-1555 (2015) - [j60]Kangseok Kim, Wonjeong Ha, Okkyung Choi, Hongjin Yeh, Jai-Hoon Kim, Manpyo Hong, Taeshik Shon:
An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration. Multim. Tools Appl. 74(5): 1557-1576 (2015) - [j59]Hyunhee Park, Seunghyun Park, Taeshik Shon, Eui-Jik Kim:
Multi-hop-based opportunistic concurrent directional transmission in 60 GHz WPANs. Multim. Tools Appl. 74(5): 1627-1644 (2015) - [j58]Jung-Taek Seo, Seokjun Lee, Taeshik Shon:
A study on memory dump analysis based on digital forensic tools. Peer-to-Peer Netw. Appl. 8(4): 694-703 (2015) - [c34]Soowoong Eo, Wooyeon Jo, Seokjun Lee, Taeshik Shon:
A Phase of Deleted File Recovery for Digital Forensics Research in Tizen. ICITCS 2015: 1-3 - [c33]Hyunjin Kim, Seokcheol Lee, SungJin Kim, Taeshik Shon:
Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard. ICITCS 2015: 1-4 - [c32]Yoona Kim, Ki-Hyung Kim, Taeshik Shon, Jai-Hoon Kim:
A hybrid service discovery approach to mitigate overhead concentration on resource directory. ICOIN 2015: 407-409 - [c31]Hyejin Cha, Taeshik Shon, Kangseok Kim, Manpyo Hong:
Improving packet header compression with adaptive sliding window size. ICOIN 2015: 541-543 - 2014
- [j57]Hyo Hyun Choi, Hyunsoo Choi, Myungwhan Choi, Taeshik Shon, ByoungSeob Park:
An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles. Int. J. Distributed Sens. Networks 10 (2014) - [j56]Yunlong Zhang, Joohee Kim, Ken Choi, Taeshik Shon:
High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions. Int. J. Distributed Sens. Networks 10 (2014) - [j55]Seokjun Lee, Taeshik Shon:
Physical Memory Collection and Analysis in Smart Grid Embedded System. Mob. Networks Appl. 19(3): 382-391 (2014) - [j54]Taeshik Shon, Jaeik Cho, Kyusuk Han, Hyohyun Choi:
Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction. Mob. Networks Appl. 19(3): 404-413 (2014) - [j53]Soobok Shin, Taeshik Shon, Hongjin Yeh, Kangseok Kim:
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment. Peer-to-Peer Netw. Appl. 7(4): 612-619 (2014) - [j52]Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee, Ki-Hyung Kim:
Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks. Secur. Commun. Networks 7(8): 1292-1309 (2014) - [j51]I Luk Kim, Jung-Taek Seo, Taeshik Shon, Jongsub Moon:
A novel approach to detection of mobile rogue access points. Secur. Commun. Networks 7(10): 1510-1516 (2014) - [j50]Seokjun Lee, Taeshik Shon:
Improved deleted file recovery technique for Ext2/3 filesystem. J. Supercomput. 70(1): 20-30 (2014) - [j49]Sekie Amanuel Majore, Hyunguk Yoo, Taeshik Shon:
Secure and reliable electronic record management system using digital forensic technologies. J. Supercomput. 70(1): 149-165 (2014) - [c30]SungMoon Kwon, Hyunguk Yoo, Taeshik Shon, GunWoong Lee:
Scenario-Based Attack Route on Industrial Control System. ICITCS 2014: 1-3 - [c29]Seokcheol Lee, Yongmin Park, Hyunwoo Lim, Taeshik Shon:
Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology. ICITCS 2014: 1-4 - [c28]Yongmin Park, Seokjun Lee, Jongwan Kim, Taeshik Shon:
Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force. ICITCS 2014: 1-4 - 2013
- [j48]Taeshik Shon, Ching-Hsien Hsu, Isaac Woungang:
Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing. Comput. Electr. Eng. 39(1): 1-2 (2013) - [j47]Eui-Jik Kim, Sung-Kwan Youm, Taeshik Shon, Chul-Hee Kang:
Stable pairwise time synchronization in the application layer for capillary machine-to-machine networks. Comput. Electr. Eng. 39(7): 2207-2213 (2013) - [j46]Taeshik Shon, Danielo Goncalves Gomes:
Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing. Comput. Electr. Eng. 39(7): 2330-2331 (2013) - [j45]Taeshik Shon, Jong Hyuk Park, Costas Lambrinoudakis, Jean-Marc Seigneur:
Special Issue on Advanced Information Security for Secure and Trust Computing. Comput. Math. Appl. 65(9): 1233 (2013) - [j44]Taeshik Shon, Hyohyun Choi, Eui-Jik Kim:
Joint routing and scheduling in multi-channel capillary machine-to-machine networks. EURASIP J. Wirel. Commun. Netw. 2013: 126 (2013) - [j43]Sung-Kwan Youm, Taeshik Shon, Eui-Jik Kim:
Integrated multicast routing algorithms considering traffic engineering for broadband IPTV services. EURASIP J. Wirel. Commun. Netw. 2013: 127 (2013) - [j42]Jongbin Ko, Seokjun Lee, Yong-hun Lim, Seong-ho Ju, Taeshik Shon:
A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems. IEICE Trans. Inf. Syst. 96-D(9): 2021-2025 (2013) - [j41]Yunlim Ku, Okkyung Choi, Kangseok Kim, Taeshik Shon, Manpyo Hong, Hongjin Yeh, Jai-Hoon Kim:
Two-factor authentication system based on extended OTP mechanism. Int. J. Comput. Math. 90(12): 2515-2529 (2013) - [j40]Hyunhee Park, Taeshik Shon, Seunghyun Park, Eui-Jik Kim:
Adaptive anomaly control for alleviating the exclusive channel occupation in wireless networks. Int. J. Commun. Syst. 26(6): 720-731 (2013) - [j39]Taeshik Shon, Athanasios V. Vasilakos, Bharat K. Bhargava, Ivan Stojmenovic, Hai Jin, Albert Y. Zomaya:
Editorial for Special Issue on "New Technologies and Applications for Wireless Communications & Mobile Cloud Computing". Mob. Networks Appl. 18(1): 98-102 (2013) - [j38]Junwon Lee, Jaeik Cho, Jung-Taek Seo, Taeshik Shon, Dongho Won:
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed. Mob. Networks Appl. 18(1): 122-128 (2013) - [j37]Kyusuk Han, Jangseong Kim, Taeshik Shon, Daesik Ko:
A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers. Ubiquitous Comput. 17(5): 945-949 (2013) - [j36]Manhyun Chung, Younghoon Lee, Taeshik Shon, Jongsub Moon:
A security model for IPTV with one-time password and Conditional Access System for smart mobile platform. Telecommun. Syst. 52(2): 1399-1407 (2013) - [j35]Bonhyun Koo, Kyusuk Han, James J. Park, Taeshik Shon:
Design and implementation of a wireless sensor network architecture using smart mobile devices. Telecommun. Syst. 52(4): 2311-2320 (2013) - [j34]Jaeik Cho, Taeshik Shon, Ken Choi, Jongsub Moon:
Dynamic learning model update of hybrid-classifiers for intrusion detection. J. Supercomput. 64(2): 522-526 (2013) - [j33]Bonhyun Koo, Yang Sun Lee, Taeshik Shon:
A novel approach to visualize web anomaly attacks in pervasive computing environment. J. Supercomput. 65(1): 301-316 (2013) - [j32]Taeshik Shon, Shiuh-Jeng Wang, Lei Shu, Liudong Xing:
Editorial of special section on advanced in high performance, algorithm, and framework for future computing. J. Supercomput. 65(2): 483 (2013) - [j31]Eui-Jik Kim, Sung-Kwan Youm, Taeshik Shon, Chul-Hee Kang:
Asynchronous inter-network interference avoidance for wireless body area networks. J. Supercomput. 65(2): 562-579 (2013) - [j30]Hyo Hyun Choi, Su Hyun Nam, Taeshik Shon, Myungwhan Choi:
Information delivery scheme of micro UAVs having limited communication range during tracking the moving target. J. Supercomput. 66(2): 950-972 (2013) - [c27]Hyunwoo Lim, Jongbin Ko, Seokjun Lee, Jongwan Kim, Mijoo Kim, Taeshik Shon:
Security Architecture Model for Smart Grid Communication Systems. ICITCS 2013: 1-4 - 2012
- [j29]Kyusuk Han, Kwangjo Kim, Wook Choi, Hyo Hyun Choi, Jung-Taek Seo, Taeshik Shon:
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 14(3-4): 251-269 (2012) - [j28]Jangseong Kim, Joonsang Baek, Jianying Zhou, Taeshik Shon:
An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments. IEICE Trans. Inf. Syst. 95-D(1): 117-125 (2012) - [j27]Eui-Jik Kim, Taeshik Shon, Hyunhee Park, Chul-Hee Kang:
Latency bounded and energy efficient MAC for wireless sensor networks. IET Commun. 6(14): 2120-2127 (2012) - [j26]Jangseong Kim, Kwangjo Kim, Jong Hyuk Park, Taeshik Shon:
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment. Math. Comput. Model. 55(1-2): 45-57 (2012) - [j25]Jong Hyuk Park, Han-Chieh Chao, Taeshik Shon, Mieso K. Denko:
Guest editorial: Theme issue on smartphone applications and services for pervasive computing. Pers. Ubiquitous Comput. 16(6): 611-612 (2012) - [j24]Kyusuk Han, Hyeran Mun, Taeshik Shon, Chan Yeob Yeun, Jong Hyuk Park:
Secure and efficient public key management in next generation mobile networks. Pers. Ubiquitous Comput. 16(6): 677-685 (2012) - [j23]Taeshik Shon, Jong Hyuk Park, Doo-Soon Park:
Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device. Secur. Commun. Networks 5(9): 974-986 (2012) - [j22]Taeshik Shon, Costas Lambrinoudakis, Xiaobo Zhou:
Special issue on next generation communication and network security. Secur. Commun. Networks 5(10): 1083-1085 (2012) - 2011
- [j21]Taeshik Shon, Hyohyun Choi:
An Approach for Efficient Hybrid Reliable Transport in IEEE 802.15.4-based Wireless Sensor Network. Ad Hoc Sens. Wirel. Networks 11(3-4): 199-217 (2011) - [j20]Taeshik Shon, Kyusuk Han, Jong Hyuk Park, Hangbae Chang:
A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j19]Taeshik Shon, Kyusuk Han, James J. Park, Young-Sik Jeong, Yang Sun Lee:
A Secure and Robust Connectivity Architecture for Smart Devices and Applications. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j18]Jangseong Kim, Taeshik Shon, Kwangjo Kim:
Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment. IEICE Trans. Commun. 94-B(3): 686-689 (2011) - [j17]Kyusuk Han, Kwangjo Kim, Taeshik Shon:
Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies. IEICE Trans. Inf. Syst. 94-D(6): 1181-1184 (2011) - [j16]Kyusuk Han, Taeshik Shon, Kwangjo Kim:
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security. IEICE Trans. Commun. 94-B(8): 2235-2238 (2011) - [j15]Kyusuk Han, Kwangjo Kim, Jong Hyuk Park, Taeshik Shon:
Efficient sensor node authentication in third generation-wireless sensor networks integrated networks. IET Commun. 5(12): 1744-1754 (2011) - [j14]Kyusuk Han, Chan Yeob Yeun, Taeshik Shon, Jong Hyuk Park, Kwangjo Kim:
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication. Int. J. Commun. Syst. 24(4): 461-472 (2011) - [j13]Bonhyun Koo, Wook Choi, James J. Park, Taeshik Shon:
A novel low-power RF4CE-based communication framework for multimedia system control. Int. J. Commun. Syst. 24(10): 1340-1353 (2011) - [j12]Kyusuk Han, Youngjoon Seo, Sungjune Yoon, James J. Park, Taeshik Shon:
Providing security vertical handoff in SARAH for heterogeneous networks. J. Netw. Comput. Appl. 34(6): 1903-1907 (2011) - [j11]Eui-Jik Kim, Taeshik Shon, James Jong Hyuk Park, Young-Sik Jeong:
Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks. Sensors 11(7): 6629-6644 (2011) - [j10]Jangseong Kim, Joonsang Baek, Taeshik Shon:
An efficient and scalable re-authentication protocol over wireless sensor network. IEEE Trans. Consumer Electron. 57(2): 516-522 (2011) - [j9]Taeshik Shon, Ching-Hsien Hsu, Liudong Xing:
Editorial: Special Issue on "Advanced Technologies and Practices in Recent Wireless Sensor Networks". Wirel. Pers. Commun. 60(3): 385-388 (2011) - [c26]Jaeik Cho, Junwon Lee, Jung-Taek Seo, Taeshik Shon:
A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors. NBiS 2011: 573-577 - [c25]Jaeik Cho, Kyuwon Choi, Taeshik Shon, Jongsub Moon:
A Network Data Abstraction Method for Data Set Verification. STA 2011: 54-62 - [e1]James J. Park, Javier López, Sang-Soo Yeo, Taeshik Shon, David Taniar:
Secure and Trust Computing, Data Management and Applications - 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Communications in Computer and Information Science 186, Springer 2011, ISBN 978-3-642-22338-9 [contents] - 2010
- [j8]Taeshik Shon, Bonhyun Koo, Jong Hyuk Park, Hangbae Chang:
Novel Approaches to Enhance Mobile WiMAX Security. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j7]Taeshik Shon, Eui-Jik Kim, Jeongsik In, Yongsuk Park:
Design and Implementation of Hybrid MAC-Based Robust Architecture for Wireless Sensor Network. IEICE Trans. Commun. 93-B(4): 1016-1019 (2010) - [j6]Bonhyun Koo, Taeshik Shon:
Implementation of a WSN-Based Structural Health Monitoring Architecture Using 3D and AR Mode. IEICE Trans. Commun. 93-B(11): 2963-2966 (2010) - [j5]Kyusuk Han, Kwangjo Kim, Taeshik Shon:
Untraceable Mobile Node Authentication in WSN. Sensors 10(5): 4410-4429 (2010) - [j4]Kyusuk Han, Taeshik Shon, Kwangjo Kim:
Efficient mobile sensor authentication in smart home and WPAN. IEEE Trans. Consumer Electron. 56(2): 591-596 (2010) - [c24]Kyusuk Han, Jangseong Kim, Kwangjo Kim, Taeshik Shon:
Efficient sensor node authentication via 3GPP mobile communication networks. CCS 2010: 687-689 - [c23]Taeshik Shon, Yongsuk Park:
Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home. CISIS 2010: 779-783 - [c22]Bonhyun Koo, Taewon Ahn, JungSik In, Yongsuk Park, Taeshik Shon:
R-URC: RF4CE-Based Universal Remote Control Framework Using Smartphone. ICCSA Workshops 2010: 311-314 - [c21]Kyusuk Han, Hyeran Mun, Taeshik Shon:
Design of secure key agreement protocol for pairing in RF4CE. ICITST 2010: 1-5
2000 – 2009
- 2009
- [j3]Taeshik Shon, Yongsuk Park:
A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(6): 597-611 (2009) - [c20]Bonhyun Koo, Hyohyun Choi, Taeshik Shon:
WIVA: WSN Monitoring Framework Based on 3D Visualization and Augmented Reality in Mobile Devices. ICOST 2009: 158-165 - [c19]Eui-Jik Kim, Jeongsik In, Taeshik Shon, Yongsuk Park, Bong Wan Jun:
Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks. NBiS 2009: 115-120 - 2008
- [c18]Taeshik Shon, Hyohyun Choi:
Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks. UIC 2008: 363-372 - 2007
- [j2]Taeshik Shon, Jongsub Moon:
A hybrid machine learning approach to network anomaly detection. Inf. Sci. 177(18): 3799-3821 (2007) - [c17]Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon:
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. ICIC (1) 2007: 646-655 - [c16]Taeshik Shon, Wook Choi:
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. NBiS 2007: 88-97 - [c15]Wook Choi, Taeshik Shon, Hyohyun Choi, Y. Lee:
Designing a Novel Unlicensed Nomadic Access Relay Station in IEEE 802.16-Based Wireless Access Networks. VTC Spring 2007: 2961-2965 - 2006
- [j1]Taeshik Shon, Xeno Kovah, Jongsub Moon:
Applying genetic algorithm for classifying anomalous TCP/IP packets. Neurocomputing 69(16-18): 2429-2433 (2006) - [c14]Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon:
Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. FSKD 2006: 716-724 - 2005
- [c13]Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon:
A New DDoS Detection Model Using Multiple SVMs and TRA. EUC Workshops 2005: 976-985 - [c12]Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon:
PPF Model with CTNT to Defend Web Server from DDoS Attack. EUC Workshops 2005: 986-995 - [c11]Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon:
SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. GCC 2005: 59-70 - [c10]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
SVM Approach with a Genetic Algorithm for Network Intrusion Detection. ISCIS 2005: 224-233 - [c9]Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon:
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. NPC 2005: 351-354 - [p1]Jungtaek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon:
A New Approach to Detect DDoS Attacks using Support Vector Machine. New Trends in Computer Networks 2005 - 2004
- [c8]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments. GCC 2004: 891-894 - [c7]Taeshik Shon, Jongsub Moon, HongMin Choi:
Effciency Evaluation for Key Distribution Models in Satellite Terminals. INTELLCOMM 2004: 92-99 - [c6]Jongsub Moon, Taeshik Shon, Jung-Taek Seo, Jongho Kim, Jungwoo Seo:
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing. ISCIS 2004: 351-362 - [c5]Jung-Taek Seo, Dae-Sik Choi, Eung Ki Park, Taeshik Shon, Jongsub Moon:
Patch Management System for Multi-platform Environment. PDCAT 2004: 654-661 - 2003
- [c4]Taeshik Shon, Jongsub Moon, Cheolwon Lee, Eul-Gyu Im, Jung-Taek Seo:
Safe Patch Distribution Architecture in Intranet Environments. Security and Management 2003: 455-460 - [c3]Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. ICICS 2003: 313-324 - [c2]Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim:
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835 - [c1]Taeshik Shon, Taewoo Noh, Jongsub Moon:
Support Vector Machine Based ICMP Covert Channel Attack Detection. MMM-ACNS 2003: 461-464
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint