Towards 5G-based IoT security analysis against Vo5G eavesdropping S Kwon, S Park, HJ Cho, Y Park, D Kim, K Yim Computing 103 (3), 425-447, 2021 | 35 | 2021 |
5G security threat assessment in real networks S Park, D Kim, Y Park, H Cho, D Kim, S Kwon Sensors 21 (16), 5524, 2021 | 31 | 2021 |
Session management for security systems in 5g standalone network S Park, S Kwon, Y Park, D Kim, I You IEEE Access 10, 73421-73436, 2022 | 21 | 2022 |
Security problems of 5G voice communication S Park, HJ Cho, Y Park, B Choi, D Kim, K Yim International Conference on Information Security Applications, 403-415, 2020 | 13 | 2020 |
Machine learning based signaling ddos detection system for 5g stand alone core network S Park, B Cho, D Kim, I You Applied Sciences 12 (23), 12456, 2022 | 11 | 2022 |
SIP amplification attack analysis and detection in VoLTE service network E Ko, S Park, S Kim, K Son, H Kim 2016 International Conference on Information Networking (ICOIN), 334-336, 2016 | 10 | 2016 |
Security threats and countermeasure frame using a session control mechanism on volte S Park, S Kim, K Son, H Kim 2015 10th International Conference on Broadband and Wireless Computing …, 2015 | 10 | 2015 |
Threats and countermeasures on a 4G mobile network S Park, S Kim, J Oh, M Noh, C Im 2014 Eighth International Conference on Innovative Mobile and Internet …, 2014 | 10 | 2014 |
Analyzing RRC Replay Attack and Securing Base Station with Practical Method S Park, I You, H Park, D Kim Proceedings of the 17th International Conference on Availability …, 2022 | 6 | 2022 |
Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment S Park, S Kim, K Son, H Kim, J Park, K Yim International Journal of Web and Grid Services 13 (1), 3-24, 2017 | 5 | 2017 |
Vestiges of past generation: threats to 5G core network S Park, B Choi, Y Park, D Kim, E Jeong, K Yim Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2021 | 3 | 2021 |
Analysis against security issues of voice over 5G HJ Cho, S Park, Y Park, B Choi, D Kim, K Yim IEICE TRANSACTIONS on Information and Systems 104 (11), 1850-1856, 2021 | 2 | 2021 |
Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection Technology SM Park, HC Bae, YT Cha, HK Kim Advances in Computer Science and Ubiquitous Computing: CSA-CUTE2016 8, 74-80, 2017 | 2 | 2017 |
5G 네트워크 기술 진화에 따른 새로운 5G 보안 도전과제와 해외 보안 아키텍처 연구 동향 HK Kim, B Choi, E Ko, S Park Review of KIISC 29 (5), 7-20, 2019 | 1 | 2019 |
A Study on Network Anomaly Detection Using Fast Persistent Contrastive Divergence J Jeong, S Park, J Lim, J Kang, D Shin, D Shin Symmetry 16 (9), 1220, 2024 | | 2024 |
How to diagnose SS7 Protocol Vulnerability in Roaming Networks S Park Research Briefs on Information and Communication Technology Evolution 9, 189-199, 2023 | | 2023 |
Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis S Park, M Lee, S Na, J Lim International Conference on Mobile Internet Security, 260-270, 2023 | | 2023 |
Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities D Kim, I You, S Park, S Kwon International Symposium on Mobile Internet Security, 63-81, 2022 | | 2022 |
5G 단독모드 기기 보안 인증 현황 권성문, 박성민, 김도원 정보보호학회지 31 (6), 37-40, 2021 | | 2021 |
Real-Time Malicious Script Blocking Technology at the Host-Level SH Oh, HC Bae, S Park, HK Kim International Conference on Broadband and Wireless Computing, Communication …, 2016 | | 2016 |