A protection technique for screen image-based authentication protocols utilizing the SetCursorPos function I Oh, K Lee, K Yim Information Security Applications: 18th International Conference, WISA 2017 …, 2018 | 10 | 2018 |
Efficient CAN dataset collection method for accurate security threat analysis on vehicle internal network Y Koh, S Kim, Y Kim, I Oh, K Yim International Conference on Innovative Mobile and Internet Services in …, 2022 | 9 | 2022 |
A novel message-preserving scheme with format-preserving encryption for connected cars in multi-access edge computing I Oh, T Kim, K Yim, SY Lee Sensors 19 (18), 3869, 2019 | 9 | 2019 |
Design and implementation of a novel testbed for automotive security analysis Y An, J Park, I Oh, M Kim, K Yim Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2021 | 6 | 2021 |
CANTool an in-vehicle network data analyzer MR Islam, I Oh, K Yim 2022 International Conference on Information Technology Systems and …, 2022 | 5 | 2022 |
Vulnerability analysis on the image-based authentication through the PS/2 interface I Oh, K Lee, SY Lee, K Do, H Ahn, K Yim Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2019 | 5 | 2019 |
A study on a secure USB mechanism that prevents the exposure of authentication information for smart human care services K Lee, I Oh, Y Lee, H Lee, K Yim, J Seo Journal of Sensors 2018 (1), 2089626, 2018 | 5 | 2018 |
A concept of IDS for CAN protocol based on statics theory MR Islam, I Oh, M Batzorig, S Kim, K Yim Advances on Broad-Band Wireless Computing, Communication and Applications …, 2022 | 4 | 2022 |
Security assessment of the image-based authentication using screen-capture tools I Oh, Y Lee, H Lee, K Lee, K Yim Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2018 | 4 | 2018 |
Security of 6G enabled vehicle-to-everything communication in emerging federated learning and blockchain technologies M Kim, I Oh, K Yim, M Sahlabadi, Z Shukur IEEE Access, 2023 | 3 | 2023 |
Universal intrusion detection system on in-vehicle network MR Islam, I Oh, K Yim International Conference on Innovative Mobile and Internet Services in …, 2023 | 3 | 2023 |
Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method I Oh, M Batzorig, B Duulga, K Yim International Conference on Broadband and Wireless Computing, Communication …, 2022 | 3 | 2022 |
Cyber attack scenarios in cooperative automated driving I Oh, E Jeong, J Park, T Jeong, J Park, K Yim Advances on Broad-Band Wireless Computing, Communication and Applications …, 2021 | 3 | 2021 |
Study on BAD USB Detection Technique based on User Cognition S Nam, I Oh, K Lee, K Yim Proceedings of the Korean Society of Computer Information Conference, 93-94, 2016 | 3 | 2016 |
Analysis on account hijacking and remote DoS vulnerability in the CODESYS-based PLC runtime E Jeong, J Park, I Oh, M Kim, K Yim Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2021 | 2 | 2021 |
Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System Y Kamronbek, IM Rezanur, I Oh, K Yim International Conference on Broadband and Wireless Computing, Communication …, 2023 | 1 | 2023 |
A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network M Batzorig, Y Koh, I Oh, K Yim International Conference on Network-Based Information Systems, 130-141, 2023 | 1 | 2023 |
Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol MR Islam, I Oh, M Batzorig, M Kim, K Yim International Conference on Innovative Mobile and Internet Services in …, 2022 | 1 | 2022 |
OTA Vulnerability on User Equipment in Cloud Services M Kim, J Park, E Jeong, I Oh, K Yim, J Park 2018 International Conference on Information Technology Systems and …, 2018 | 1 | 2018 |
Enhancing Road Safety with In-Vehicle Network Abnormal Driving Behavior Detection MR Islam, K Yusupov, M Batzorig, I Oh, K Yim International Conference on Innovative Mobile and Internet Services in …, 2024 | | 2024 |