Jung-Taek Seo

Orcid: 0000-0003-0971-8548

According to our database1, Jung-Taek Seo authored at least 82 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.
Sensors, February, 2024

A Synthetic Time-Series Generation Using a Variational Recurrent Autoencoder with an Attention Mechanism in an Industrial Control System.
Sensors, 2024

2023
Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression.
Sensors, December, 2023

Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology.
IEEE Access, 2023

OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime.
Proceedings of the Information Security Applications - 24th International Conference, 2023

AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0.
Proceedings of the Information Security Applications - 24th International Conference, 2023

SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis.
Proceedings of the Information Security Applications - 24th International Conference, 2023

2022
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions.
Sensors, 2022

An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs.
Sensors, 2022

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation.
KSII Trans. Internet Inf. Syst., 2022

A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system.
Digit. Investig., 2022

Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach.
IEEE Access, 2022

2020
Privacy Enhanced Location Sharing for Mobile Online Social Networks.
IEEE Trans. Sustain. Comput., 2020

Auditing on Smart-Grid With Dynamic Traffic Flows: An Algorithmic Approach.
IEEE Trans. Smart Grid, 2020

Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process.
Mob. Inf. Syst., 2020

Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid.
KSII Trans. Internet Inf. Syst., 2020

Proposed On-site Document Sharing System using FIDO.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Detection and Analysis Technique for Manipulation Attacks on PLC Control Logic.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Research on PEB-LDR Data Analysis Technique for DLL Injection Detection on ICS Engineering Workstation.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Study on Anomaly Detection Technique in an Industrial Control System Based on Machine Learning.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

A Study on the Digital Forensic Method for Decentralized Web Service.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X).
CoRR, 2019

Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs).
IEEE Access, 2019

2018
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants.
J. Supercomput., 2018

An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.
Sensors, 2018

Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things.
Sensors, 2018

A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services.
J. Sensors, 2018

Secure Multicast using Proxy Re-Encryption in an IoT Environment.
KSII Trans. Internet Inf. Syst., 2018

Ransomware prevention technique using key backup.
Concurr. Comput. Pract. Exp., 2018

A Lightweight and Transparent Compensation Mechanism for Fog-Cloud Storage Framework.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2017
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability.
Wirel. Commun. Mob. Comput., 2017

Price Modification Attack and Protection Scheme in Smart Grid.
IEEE Trans. Smart Grid, 2017

A Dependable Localization Algorithm for Survivable Belt-Type Sensor Networks.
Sensors, 2017

A new maximum fault-tolerance barrier-coverage problem in hybrid sensor network and its polynomial time exact algorithm.
Ad Hoc Networks, 2017

Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid.
IEEE Access, 2017

2016
Towards the advanced security architecture for Microgrid systems and applications.
J. Supercomput., 2016

Optimal packet scan against malicious attacks in smart grids.
Theor. Comput. Sci., 2016

Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

A Hybrid Trust Management Framework for Vehicular Social Networks.
Proceedings of the Computational Social Networks - 5th International Conference, 2016

Analysis on Attack Scenarios and Countermeasures for Self-driving Car and Its Infrastructures.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Catastrophic cascading failures in power networks.
Theor. Comput. Sci., 2015

A granular approach for user-centric network analysis to identify digital evidence.
Peer-to-Peer Netw. Appl., 2015

A study on memory dump analysis based on digital forensic tools.
Peer-to-Peer Netw. Appl., 2015

A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments.
Multim. Tools Appl., 2015

Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs.
Int. J. Distributed Sens. Networks, 2015

Privacy aware incentive mechanism to collect mobile data while preventing duplication.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Rate alteration attacks in smart grid.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
A novel approach to detection of mobile rogue access points.
Secur. Commun. Networks, 2014

Replacing Cryptographic Keys in AMI Mesh Networks with Small Latency.
Mob. Networks Appl., 2014

Cascading Critical Nodes Detection with Load Redistribution in Complex Systems.
Proceedings of the Combinatorial Optimization and Applications, 2014

2013
Reset Tree-Based Optical Fault Detection.
Sensors, 2013

A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
Mob. Networks Appl., 2013

Whitelisting for Critical IT-Based Infrastructure.
IEICE Trans. Commun., 2013

2012
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

On Trigger Detection against Reactive Jamming Attacks: A Localized Solution.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

2011
A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2007
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

An Attack Classification Mechanism Based on Multiple Support Vector Machines.
Proceedings of the Computational Science and Its Applications, 2007

2006
Hybrid Modeling for Large-Scale Worm Propagation Simulations.
Proceedings of the Intelligence and Security Informatics, 2006

Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

SVM Approach with a Genetic Algorithm for Network Intrusion Detection.
Proceedings of the Computer and Information Sciences, 2005

An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction.
Proceedings of the Information Networking, 2005

An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification.
Proceedings of the Computational Science and Its Applications, 2005

SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

A New DDoS Detection Model Using Multiple SVMs and TRA.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

PPF Model with CTNT to Defend Web Server from DDoS Attack.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A New Approach to Detect DDoS Attacks using Support Vector Machine.
Proceedings of the New Trends in Computer Networks, 2005

2004
Patch Management System for Multi-platform Environment.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Adaptation Enhanced Mechanism for Web Survivability.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

A High-Level Policy Description Language for the Network ACL.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Design a High-Level Language for Large Network Security Management.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Vulnerability Analysis and Evaluation within an Intranet.
Proceedings of the Intelligence and Security Informatics, 2004

An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing.
Proceedings of the Computer and Information Sciences, 2004

Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments.
Proceedings of the Grid and Cooperative Computing, 2004

Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop.
Proceedings of the Grid and Cooperative Computing, 2004

Alerts Correlation System to Enhance the Performance of the Network-Based Intrusion Detection System.
Proceedings of the Grid and Cooperative Computing, 2004

Adaptive Architecture for Web Server Survivability.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003


  Loading...