Seluge: Secure and dos-resistant code dissemination in wireless sensor networks S Hyun, P Ning, A Liu, W Du 2008 International Conference on Information Processing in Sensor Networks …, 2008 | 180 | 2008 |
Analysis of autoencoders for network intrusion detection Y Song, S Hyun, YG Cheong Sensors 21 (13), 4294, 2021 | 106 | 2021 |
SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles G Cho, J Cho, S Hyun, H Kim Applied Sciences 10 (9), 3149, 2020 | 76 | 2020 |
Network node and method of operating the network node E Kim, S Seo, M Jang, S Hyun US Patent 9,774,708, 2017 | 74 | 2017 |
Interface to network security functions for cloud-based security services S Hyun, J Kim, H Kim, J Jeong, S Hares, L Dunbar, A Farrel IEEE Communications Magazine 56 (1), 171-178, 2018 | 48 | 2018 |
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger J Choi, J Yu, S Hyun, H Kim Digital Investigation 28, S50-S59, 2019 | 47 | 2019 |
Ibcs: Intent-based cloud services for security applications J Kim, E Kim, J Yang, J Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ... IEEE Communications Magazine 58 (4), 45-51, 2020 | 33 | 2020 |
Threat modeling and analysis of voice assistant applications G Cho, J Choi, H Kim, S Hyun, J Ryoo Information Security Applications: 19th International Conference, WISA 2018 …, 2019 | 20 | 2019 |
Machine learning based intrusion detection systems for class imbalanced datasets YG Cheong, K Park, H Kim, J Kim, S Hyun Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017 | 17 | 2017 |
Method and apparatus of data authentication SC Seo, EA Kim, TH Kim, MW Jang, SW Hyun US Patent 9,473,307, 2016 | 17 | 2016 |
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things J Choi, J Cho, H Kim, S Hyun Applied Sciences 10 (6), 1962, 2020 | 11 | 2020 |
Design and Analysis of Push Notification‐Based Malware on Android S Hyun, J Cho, G Cho, H Kim Security and Communication Networks 2018 (1), 8510256, 2018 | 11 | 2018 |
Mitigating wireless jamming attacks via channel migration S Hyun, P Ning, A Liu 2011 31st International Conference on Distributed Computing Systems …, 2011 | 10 | 2011 |
Kerberoid: A practical android app decompilation system with multiple decompilers H Jang, B Jin, S Hyun, H Kim Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 9 | 2019 |
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices. J Cho, G Cho, S Hyun, H Kim J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017 | 7 | 2017 |
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes S Hyun, K Sun, P Ning Computer Communications 104, 191-203, 2017 | 5 | 2017 |
Method of authenticating and verifying data packet transmission, and apparatuses for performing the same SW Hyun, EA Kim, SC Seo, MW Jang US Patent App. 14/470,051, 2015 | 4 | 2015 |
An efficient code dissemination mechanism for building automation and industrial control networks S Hyun, M Kim Proceedings of the 5th International Conference on Ubiquitous Information …, 2011 | 4 | 2011 |
Mutexion: Mutually exclusive compression system for mitigating compression side-channel attacks T Moon, H Kim, S Hyun ACM Transactions on the Web 16 (4), 1-20, 2022 | 3 | 2022 |
Secure Code Dissemination in Wireless Sensor Networks. S Hyun, P Ning Encyclopedia of Cryptography and Security (2nd Ed.), 1099-1102, 2011 | 2 | 2011 |