Jung-Taek Seo
Orcid: 0000-0003-0971-8548
According to our database1,
Jung-Taek Seo
authored at least 82 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.
Sensors, February, 2024
A Synthetic Time-Series Generation Using a Variational Recurrent Autoencoder with an Attention Mechanism in an Industrial Control System.
Sensors, 2024
2023
Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression.
Sensors, December, 2023
IEEE Access, 2023
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
2022
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions.
Sensors, 2022
An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs.
Sensors, 2022
KSII Trans. Internet Inf. Syst., 2022
A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system.
Digit. Investig., 2022
Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach.
IEEE Access, 2022
2020
IEEE Trans. Sustain. Comput., 2020
IEEE Trans. Smart Grid, 2020
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process.
Mob. Inf. Syst., 2020
KSII Trans. Internet Inf. Syst., 2020
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020
2019
An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X).
CoRR, 2019
Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs).
IEEE Access, 2019
2018
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants.
J. Supercomput., 2018
An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.
Sensors, 2018
Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things.
Sensors, 2018
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services.
J. Sensors, 2018
KSII Trans. Internet Inf. Syst., 2018
A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018
2017
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
Wirel. Commun. Mob. Comput., 2017
IEEE Trans. Smart Grid, 2017
Sensors, 2017
A new maximum fault-tolerance barrier-coverage problem in hybrid sensor network and its polynomial time exact algorithm.
Ad Hoc Networks, 2017
Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid.
IEEE Access, 2017
2016
J. Supercomput., 2016
Theor. Comput. Sci., 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
Proceedings of the Computational Social Networks - 5th International Conference, 2016
Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
Peer-to-Peer Netw. Appl., 2015
Peer-to-Peer Netw. Appl., 2015
A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments.
Multim. Tools Appl., 2015
Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs.
Int. J. Distributed Sens. Networks, 2015
Privacy aware incentive mechanism to collect mobile data while preventing duplication.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Secur. Commun. Networks, 2014
Mob. Networks Appl., 2014
Proceedings of the Combinatorial Optimization and Applications, 2014
2013
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
Mob. Networks Appl., 2013
2012
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
Proceedings of the Information Security Applications - 13th International Workshop, 2012
2011
A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
2007
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
Proceedings of the Computational Science and Its Applications, 2007
2006
Proceedings of the Intelligence and Security Informatics, 2006
Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006
2005
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
Proceedings of the Computer and Information Sciences, 2005
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction.
Proceedings of the Information Networking, 2005
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the New Trends in Computer Networks, 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004
Proceedings of the Intelligence and Security Informatics, 2004
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing.
Proceedings of the Computer and Information Sciences, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Alerts Correlation System to Enhance the Performance of the Network-Based Intrusion Detection System.
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Advances in Information Systems, Third International Conference, 2004
2003
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003