Samuel Woo

Orcid: 0000-0001-8991-0817

According to our database1, Samuel Woo authored at least 17 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Real Time Perfect Bit Modification Attack on In-Vehicle CAN.
IEEE Trans. Veh. Technol., December, 2023

Security Bootstrapping for Securing Data Plane and Control Plane in Named Data Networking.
IEEE Trans. Netw. Serv. Manag., September, 2023

2022
Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN.
Secur. Commun. Networks, 2022

Practical Data Acquisition and Analysis Method for Automobile Event Data Recorders Forensics.
J. Internet Serv. Inf. Secur., 2022

2021
Triple ID Flexible MAC for Can Security Improvement.
IEEE Access, 2021

Secure Data Management using Distributed Storages for Stronger Cybersecurity in Cloud Service.
Proceedings of the 2021 World Automation Congress, 2021

2020
Practical Sender Authentication Scheme for In-Vehicle CAN With Efficient Key Management.
IEEE Access, 2020

Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis.
IEEE Access, 2020

2019
Enhanced Android App-Repackaging Attack on In-Vehicle Network.
Wirel. Commun. Mob. Comput., 2019

Practical Methodology for In-Vehicle CAN Security Evaluation.
J. Internet Serv. Inf. Secur., 2019

CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN.
IEEE Access, 2019

2018
Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks.
IEEE Trans. Veh. Technol., 2018

Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat.
Symmetry, 2018

2017
Vulnerabilities of Android OS-Based Telematics System.
Wirel. Pers. Commun., 2017

2016
A Practical Security Architecture for In-Vehicle CAN-FD.
IEEE Trans. Intell. Transp. Syst., 2016

BadVoice: Soundless voice-control replay attack on modern smartphones.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

2015
A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN.
IEEE Trans. Intell. Transp. Syst., 2015


  Loading...