Taeshik Shon

According to our database1, Taeshik Shon authored at least 123 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Design and implementation of cybersecurity testbed for industrial IoT systems.
The Journal of Supercomputing, 2018

Field classification-based novel fuzzing case generation for ICS protocols.
The Journal of Supercomputing, 2018

Digital forensic science approach by file recovery research.
The Journal of Supercomputing, 2018

An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
The Journal of Supercomputing, 2018

Toward Security Enhanced Provisioning in Industrial IoT Systems.
Sensors, 2018

Game theory-based Security Vulnerability Quantification for Social Internet of Things.
Future Generation Comp. Syst., 2018

2017
Design and Implementation of Fuzzing Framework Based on IoT Applications.
Wireless Personal Communications, 2017

Two Tier Search Scheme Using Micro UAV Swarm.
Wireless Personal Communications, 2017

A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wireless Personal Communications, 2017

Recovery Measure against Disabling Reassembly Attack to DNP3 Communication.
IEICE Transactions, 2017

A privacy preserving authentication scheme for roaming in ubiquitous networks.
Cluster Computing, 2017

2016
Neighbor stability-based VANET clustering for urban vehicular environments.
The Journal of Supercomputing, 2016

Exploring an area by groups of UAVs in the presence of a refueling base.
The Journal of Supercomputing, 2016

A novel security architecture of electronic vehicle system for smart grid communication.
The Journal of Supercomputing, 2016

Unified Medium Access Control Architecture for Resource-Constrained Machine-to-Machine Devices.
ACM Trans. Embedded Comput. Syst., 2016

Data Aggregation Gateway Framework for CoAP Group Communications.
Symmetry, 2016

Data investigation based on XFS file system metadata.
Multimedia Tools Appl., 2016

Network protocol fuzz testing for information systems and applications: a survey and taxonomy.
Multimedia Tools Appl., 2016

User privacy-enhanced security architecture for home area network of Smartgrid.
Multimedia Tools Appl., 2016

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Systems, 2016

Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture.
Future Generation Comp. Syst., 2016

A lightweight message authentication scheme for Smart Grid communications in power sector.
Computers & Electrical Engineering, 2016

A Hybrid EV Authentication Approach in Smart Grid Based Distributed Network.
Ad Hoc & Sensor Wireless Networks, 2016

Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Inferring State Machine Using Hybrid Teacher.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Case Studies for Analyzing DLMS/COSEM-Based Smart Meter Vulnerabilities in Korea.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

2015
A study on memory dump analysis based on digital forensic tools.
Peer-to-Peer Networking and Applications, 2015

Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850.
Multimedia Tools Appl., 2015

Multi-hop-based opportunistic concurrent directional transmission in 60 GHz WPANs.
Multimedia Tools Appl., 2015

An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration.
Multimedia Tools Appl., 2015

Authentication of mobile applications through various local distributors.
Multimedia Tools Appl., 2015

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Systems, 2015

Security and privacy information technologies and applications for wireless pervasive computing environments.
Inf. Sci., 2015

A hybrid service discovery approach to mitigate overhead concentration on resource directory.
Proceedings of the 2015 International Conference on Information Networking, 2015

Improving packet header compression with adaptive sliding window size.
Proceedings of the 2015 International Conference on Information Networking, 2015

Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

A Phase of Deleted File Recovery for Digital Forensics Research in Tizen.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2014
Secure and reliable electronic record management system using digital forensic technologies.
The Journal of Supercomputing, 2014

Improved deleted file recovery technique for Ext2/3 filesystem.
The Journal of Supercomputing, 2014

A novel approach to detection of mobile rogue access points.
Security and Communication Networks, 2014

Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks.
Security and Communication Networks, 2014

An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment.
Peer-to-Peer Networking and Applications, 2014

Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction.
MONET, 2014

Physical Memory Collection and Analysis in Smart Grid Embedded System.
MONET, 2014

High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions.
IJDSN, 2014

An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles.
IJDSN, 2014

Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

Scenario-Based Attack Route on Industrial Control System.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2013
Editorial of special section on advanced in high performance, algorithm, and framework for future computing.
The Journal of Supercomputing, 2013

A novel approach to visualize web anomaly attacks in pervasive computing environment.
The Journal of Supercomputing, 2013

Asynchronous inter-network interference avoidance for wireless body area networks.
The Journal of Supercomputing, 2013

Information delivery scheme of micro UAVs having limited communication range during tracking the moving target.
The Journal of Supercomputing, 2013

Dynamic learning model update of hybrid-classifiers for intrusion detection.
The Journal of Supercomputing, 2013

Design and implementation of a wireless sensor network architecture using smart mobile devices.
Telecommunication Systems, 2013

A security model for IPTV with one-time password and Conditional Access System for smart mobile platform.
Telecommunication Systems, 2013

A novel secure key paring protocol for RF4CE ubiquitous smart home systems.
Personal and Ubiquitous Computing, 2013

Editorial for Special Issue on "New Technologies and Applications for Wireless Communications & Mobile Cloud Computing".
MONET, 2013

A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
MONET, 2013

Adaptive anomaly control for alleviating the exclusive channel occupation in wireless networks.
Int. J. Communication Systems, 2013

Two-factor authentication system based on extended OTP mechanism.
Int. J. Comput. Math., 2013

A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems.
IEICE Transactions, 2013

Integrated multicast routing algorithms considering traffic engineering for broadband IPTV services.
EURASIP J. Wireless Comm. and Networking, 2013

Joint routing and scheduling in multi-channel capillary machine-to-machine networks.
EURASIP J. Wireless Comm. and Networking, 2013

Special Issue on Advanced Information Security for Secure and Trust Computing.
Computers & Mathematics with Applications, 2013

Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing.
Computers & Electrical Engineering, 2013

Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing.
Computers & Electrical Engineering, 2013

Stable pairwise time synchronization in the application layer for capillary machine-to-machine networks.
Computers & Electrical Engineering, 2013

Security Architecture Model for Smart Grid Communication Systems.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device.
Security and Communication Networks, 2012

Special issue on next generation communication and network security.
Security and Communication Networks, 2012

Guest editorial: Theme issue on smartphone applications and services for pervasive computing.
Personal and Ubiquitous Computing, 2012

Secure and efficient public key management in next generation mobile networks.
Personal and Ubiquitous Computing, 2012

A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Mathematical and Computer Modelling, 2012

Latency bounded and energy efficient MAC for wireless sensor networks.
IET Communications, 2012

An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Transactions, 2012

Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2012

2011
Editorial: Special Issue on "Advanced Technologies and Practices in Recent Wireless Sensor Networks".
Wireless Personal Communications, 2011

An efficient and scalable re-authentication protocol over wireless sensor network.
IEEE Trans. Consumer Electronics, 2011

Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks.
Sensors, 2011

Providing security vertical handoff in SARAH for heterogeneous networks.
J. Network and Computer Applications, 2011

A novel low-power RF4CE-based communication framework for multimedia system control.
Int. J. Communication Systems, 2011

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Communication Systems, 2011

Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Communications, 2011

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment.
IEICE Transactions, 2011

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security.
IEICE Transactions, 2011

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies.
IEICE Transactions, 2011

A Secure and Robust Connectivity Architecture for Smart Devices and Applications.
EURASIP J. Wireless Comm. and Networking, 2011

A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wireless Comm. and Networking, 2011

An Approach for Efficient Hybrid Reliable Transport in IEEE 802.15.4-based Wireless Sensor Network.
Ad Hoc & Sensor Wireless Networks, 2011

A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2010
Efficient mobile sensor authentication in smart home and WPAN.
IEEE Trans. Consumer Electronics, 2010

Untraceable Mobile Node Authentication in WSN.
Sensors, 2010

Design and Implementation of Hybrid MAC-Based Robust Architecture for Wireless Sensor Network.
IEICE Transactions, 2010

Implementation of a WSN-Based Structural Health Monitoring Architecture Using 3D and AR Mode.
IEICE Transactions, 2010

Novel Approaches to Enhance Mobile WiMAX Security.
EURASIP J. Wireless Comm. and Networking, 2010

Design of secure key agreement protocol for pairing in RF4CE.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

R-URC: RF4CE-Based Universal Remote Control Framework Using Smartphone.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home.
Proceedings of the CISIS 2010, 2010

Efficient sensor node authentication via 3GPP mobile communication networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks.
TIIS, 2009

Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks.
Proceedings of the NBiS 2009, 2009

WIVA: WSN Monitoring Framework Based on 3D Visualization and Augmented Reality in Mobile Devices.
Proceedings of the Ambient Assistive Health and Wellness Management in the Heart of the City, 2009

2008
Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

2007
A hybrid machine learning approach to network anomaly detection.
Inf. Sci., 2007

An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

2006
Applying genetic algorithm for classifying anomalous TCP/IP packets.
Neurocomputing, 2006

Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

SVM Approach with a Genetic Algorithm for Network Intrusion Detection.
Proceedings of the Computer and Information Sciences, 2005

SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A New DDoS Detection Model Using Multiple SVMs and TRA.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

PPF Model with CTNT to Defend Web Server from DDoS Attack.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Patch Management System for Multi-platform Environment.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing.
Proceedings of the Computer and Information Sciences, 2004

Effciency Evaluation for Key Distribution Models in Satellite Terminals.
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004

Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Support Vector Machine Based ICMP Covert Channel Attack Detection.
Proceedings of the Computer Network Security, 2003

Covert Channel Detection in the ICMP Payload Using Support Vector Machine.
Proceedings of the Computer and Information Sciences, 2003

A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003


  Loading...