Insu Oh

Orcid: 0000-0002-6545-9125

According to our database1, Insu Oh authored at least 25 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies.
IEEE Access, 2024

2023
Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes.
IEEE Access, 2023

A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network.
Proceedings of the Advances in Networked-based Information Systems, 2023

Artifact Extraction Methods for In-Vehicle Infotainment System.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023

A Lightweight Intrusion Detection System on In-Vehicle Network Using Polynomial Features.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

Universal Intrusion Detection System on In-Vehicle Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection.
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023

Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

2022
Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

2021
In-vehicle Network IDS Using Message Time Interval Infrastructure.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

A Concept of IDS for CAN Protocol Based on Statics Theory.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

SPEC: Frame Filtering for CAN Protocol on ECU.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

2020
Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Design and Implementation of a Novel Testbed for Automotive Security Analysis.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Cyber Attack Scenarios in Cooperative Automated Driving.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

2019
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing.
Sensors, 2019

2018
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services.
J. Sensors, 2018

Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Vulnerability Analysis on a Secure USB: Based on a Commercial Product A.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2017
A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Security Assessment of the Image-Based Authentication Using Screen-Capture Tools.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Study on the Transaction Linkage Technique Combining the Designated Terminal.
Proceedings of the Big Data Technologies and Applications - 8th International Conference, 2017

2016
Ransomware-Prevention Technique Using Key Backup.
Proceedings of the Big Data Technologies and Applications - 7th International Conference, 2016


  Loading...