Seungwon Shin
Seungwon Shin
Verified email at - Homepage
Cited by
Cited by
FRESCO: Modular Composable Security Services for Software-Defined Networks
S Shin, P Porras, V Yegneswaran, M Fong, G Gu, M Tyson
Internet Society NDSS (Feb. 2013). To appear, 2013
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
S Shin, V Yegneswaran, P Porras, G Gu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
A security enforcement kernel for OpenFlow networks
P Porras, S Shin, V Yegneswaran, M Fong, M Tyson, G Gu
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
Attacking software-defined networks: A first feasibility study
S Shin, G Gu
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Proceedings of the 21st international conference on World Wide Web, 71-80, 2012
Rosemary: A robust, secure, and high-performance network operating system
S Shin, Y Song, T Lee, S Lee, J Chung, P Porras, V Yegneswaran, J Noh, ...
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
S Shin, G Gu
2012 20th IEEE international conference on network protocols (ICNP), 1-6, 2012
Model checking invariant security properties in OpenFlow
S Son, S Shin, V Yegneswaran, P Porras, G Gu
2013 IEEE international conference on communications (ICC), 1974-1979, 2013
Enhancing network security through software defined networking (SDN)
S Shin, L Xu, S Hong, G Gu
2016 25th international conference on computer communication and networks …, 2016
Delta: A security assessment framework for software-defined networks.
S Lee, C Yoon, C Lee, S Shin, V Yegneswaran, PA Porras
NDSS, 2017
Enabling security functions with SDN: A feasibility study
C Yoon, T Park, S Lee, H Kang, S Shin, Z Zhang
Computer Networks 85, 19-35, 2015
Flow wars: Systemizing the attack surface and defenses in software-defined networks
C Yoon, S Lee, H Kang, T Park, S Shin, V Yegneswaran, P Porras, G Gu
IEEE/ACM Transactions on Networking 25 (6), 3514-3530, 2017
Conficker and beyond: a large-scale empirical study
S Shin, G Gu
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
Cybercriminal minds: an investigative study of cryptocurrency abuses in the dark web
S Lee, C Yoon, H Kang, Y Kim, Y Kim, D Han, S Son, S Shin
Proceedings 2019 Network and Distributed System Security Symposium, 2019
A large-scale empirical study of conficker
S Shin, G Gu, N Reddy, CP Lee
IEEE Transactions on Information Forensics and Security 7 (2), 676-690, 2011
Athena: A framework for scalable anomaly detection in software-defined networks
S Lee, J Kim, S Shin, P Porras, V Yegneswaran
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
A first step toward network security virtualization: From concept to prototype
S Shin, H Wang, G Gu
IEEE Transactions on Information Forensics and Security 10 (10), 2236-2249, 2015
Malware prevalence in the KaZaA file-sharing network
S Shin, J Jung, H Balakrishnan
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 333-338, 2006
Network intrusion detection and prevention system and method thereof
SW Shin, J Oh, KY Kim, JS Jang, SW Sohn
US Patent 7,565,693, 2009
EFFORT: efficient and effective bot malware detection
S Shin, Z Xu, G Gu
2012 Proceedings IEEE INFOCOM, 2846-2850, 2012
The system can't perform the operation now. Try again later.
Articles 1–20