Jeong-Han Yun

According to our database1, Jeong-Han Yun authored at least 36 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Dataflow-based Control Process Identification for ICS Dataset Development.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

Residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

"Do you know existing accuracy metrics overrate time-series anomaly detections?".
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
CNN-based anomaly detection for packet payloads of industrial control system.
Int. J. Sens. Networks, 2021

Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
HAI 1.0: HIL-based Augmented ICS Security Dataset.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020

POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Implementation of Programmable CPS Testbed for Anomaly Detection.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Data-Driven Field Mapping of Security Logs for Integrated Monitoring.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances.
Proceedings of the HCI International 2019 - Posters - 21st International Conference, 2019

Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Generating Abnormal Industrial Control Network Traffic for Intrusion Detection System Testing.
Proceedings of the Critical Infrastructure Protection XII, 2018

A Comparison of ICS Datasets for Security Research Based on Attack Paths.
Proceedings of the Critical Information Infrastructures Security, 2018

POSTER: CPS Security Testbed Development Using Controller-in-the-Middle.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Usable Security Management for Network Access Rules of Critical Infrastructure.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Data Visualization for Network Access Rules of Critical Infrastructure.
Proceedings of the Human Interface and the Management of Information: Information, Knowledge and Interaction Design, 2017

One Step More: Automatic ICS Protocol Field Analysis.
Proceedings of the Critical Information Infrastructures Security, 2017

Structured whitelist generation in SCADA network using PrefixSpan algorithm.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection.
CoRR, 2016

Security Validation for Data Diode with Reverse Channel.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Detection of harmful schizophrenic statements in esterel.
ACM Trans. Embed. Comput. Syst., 2013

2010
Over-Approximated Control Flow Graph Construction on Pure Esterel.
IEICE Trans. Inf. Syst., 2010

2009
Refining schizophrenia via graph reachability in Esterel.
Proceedings of the 7th ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2009), 2009

2006
Automatic Hardware/Software Interface Generation for Embedded System.
J. Inf. Process. Syst., 2006

Automatic Generation of Hardware/Software Interface with Product-Specific Debugging Tools.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006


  Loading...