Seungoh Choi

According to our database1, Seungoh Choi authored at least 17 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Dataflow-based Control Process Identification for ICS Dataset Development.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

2021
Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

2020
Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020

POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Data-Driven Field Mapping of Security Logs for Integrated Monitoring.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances.
Proceedings of the HCI International 2019 - Posters - 21st International Conference, 2019

Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
A Comparison of ICS Datasets for Security Research Based on Attack Paths.
Proceedings of the Critical Information Infrastructures Security, 2018

POSTER: CPS Security Testbed Development Using Controller-in-the-Middle.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Usable Security Management for Network Access Rules of Critical Infrastructure.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

One Step More: Automatic ICS Protocol Field Analysis.
Proceedings of the Critical Information Infrastructures Security, 2017

2016
Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection.
CoRR, 2016

2015
Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

2013
Threat of DoS by interest flooding attack in content-centric networking.
Proceedings of the International Conference on Information Networking 2013, 2013

A push-enabling scheme for live streaming system in content-centric networking.
Proceedings of the 2013 workshop on Student workhop, 2013


  Loading...