Seungwon Shin
Orcid: 0000-0002-1077-5606
According to our database1,
Seungwon Shin
authored at least 113 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for Pretraining on the Cybersecurity Domain.
CoRR, 2024
2023
Comput. Secur., November, 2023
IEEE/ACM Trans. Netw., April, 2023
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs.
CoRR, 2023
Extended data plane architecture for in-network security services in software-defined networks.
Comput. Secur., 2023
Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Evolving Bots: The New Generation of Comment Bots and their Underlying Scam Campaigns in YouTube.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023
Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
<i>Verikube</i>: Automatic and Efficient Verification for Container Network Policies.
IEICE Trans. Inf. Syst., December, 2022
IEEE/ACM Trans. Netw., 2022
Reconfigurable regular expression matching architecture for real-time pattern update and payload inspection.
J. Netw. Comput. Appl., 2022
Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method.
IEICE Trans. Inf. Syst., 2022
A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports.
IEICE Trans. Inf. Syst., 2022
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text.
Comput. Secur., 2022
A Comprehensive Analysis of Today's Malware and Its Distribution Network: Common Adversary Strategies and Implications.
IEEE Access, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
MECaNIC: SmartNIC to Assist URLLC Processing in Multi-Access Edge Computing Platforms.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022
Meta-Path-based Fake News Detection Leveraging Multi-level Social Context Information.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic.
Proceedings of the Annual Computer Security Applications Conference, 2022
Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Secur. Commun. Networks, 2021
Mobius: Packet Re-processing Hardware Architecture for Rich Policy Handling on a Network Processor.
J. Netw. Syst. Manag., 2021
Hetero-SCAN: Towards Social Context Aware Fake News Detection via Heterogeneous Graph Neural Network.
CoRR, 2021
Formullar: An FPGA-based network testing tool for flexible and precise measurement of ultra-low latency networking systems.
Comput. Networks, 2021
Proceedings of Sixth International Congress on Information and Communication Technology, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE/ACM Trans. Netw., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Comput. Secur., 2020
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
2019
IEEE/ACM Trans. Netw., 2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019
MC-SDN: Supporting Mixed-Criticality Real-Time Communication Using Software-Defined Networking.
IEEE Internet Things J., 2019
Comput. Networks, 2019
Comput. Networks, 2019
Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services.
Proceedings of the World Wide Web Conference, 2019
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019
2018
Secur. Commun. Networks, 2018
A hybrid interface tracking - level set technique for multiphase flow with soluble surfactant.
J. Comput. Phys., 2018
Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV.
Proceedings of the Symposium on SDN Research, 2018
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
MC-SDN: Supporting Mixed-Criticality Scheduling on Switched-Ethernet Using Software-Defined Networking.
Proceedings of the 2018 IEEE Real-Time Systems Symposium, 2018
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the CIKM 2018 Workshops co-located with 27th ACM International Conference on Information and Knowledge Management (CIKM 2018), 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
2017
IEEE/ACM Trans. Netw., 2017
CoRR, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Bridging the architectural gap between NOS design principles in software-defined networks.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the 4th IAPR Asian Conference on Pattern Recognition, 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
The Smaller, the Shrewder: A Simple Malicious Application Can Kill an Entire SDN Environment.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
2014
A Solver for Massively Parallel Direct Numerical Simulation of Three-Dimensional Multiphase Flows.
CoRR, 2014
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Exploiting Application/System-Dependent Ambient Temperature for Accurate Microarchitectural Simulation.
IEEE Trans. Computers, 2013
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection.
Comput. Networks, 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of IEEE International Conference on Communications, 2013
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the first workshop on Hot topics in software defined networks, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?).
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
2011
The Local Front Reconstruction Method for direct simulation of two- and three-dimensional multiphase flows.
J. Comput. Phys., 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
2010
Exploiting application-dependent ambient temperature for accurate architectural simulation.
Proceedings of the 28th International Conference on Computer Design, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 27th International Conference on Computer Design, 2009
2007
J. Comput. Phys., 2007
2006
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
2002
Proceedings of the 14th International Conference on Digital Signal Processing, 2002