关注
Seongmin Park
Seongmin Park
KISA
在 kisa.or.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Towards 5G-based IoT security analysis against Vo5G eavesdropping
S Kwon, S Park, HJ Cho, Y Park, D Kim, K Yim
Computing 103 (3), 425-447, 2021
352021
5G security threat assessment in real networks
S Park, D Kim, Y Park, H Cho, D Kim, S Kwon
Sensors 21 (16), 5524, 2021
312021
Session management for security systems in 5g standalone network
S Park, S Kwon, Y Park, D Kim, I You
IEEE Access 10, 73421-73436, 2022
212022
Security problems of 5G voice communication
S Park, HJ Cho, Y Park, B Choi, D Kim, K Yim
International Conference on Information Security Applications, 403-415, 2020
132020
Machine learning based signaling ddos detection system for 5g stand alone core network
S Park, B Cho, D Kim, I You
Applied Sciences 12 (23), 12456, 2022
112022
SIP amplification attack analysis and detection in VoLTE service network
E Ko, S Park, S Kim, K Son, H Kim
2016 International Conference on Information Networking (ICOIN), 334-336, 2016
102016
Security threats and countermeasure frame using a session control mechanism on volte
S Park, S Kim, K Son, H Kim
2015 10th International Conference on Broadband and Wireless Computing …, 2015
102015
Threats and countermeasures on a 4G mobile network
S Park, S Kim, J Oh, M Noh, C Im
2014 Eighth International Conference on Innovative Mobile and Internet …, 2014
102014
Analyzing RRC Replay Attack and Securing Base Station with Practical Method
S Park, I You, H Park, D Kim
Proceedings of the 17th International Conference on Availability …, 2022
62022
Real threats using GTP protocol and countermeasures on a 4G mobile grid computing environment
S Park, S Kim, K Son, H Kim, J Park, K Yim
International Journal of Web and Grid Services 13 (1), 3-24, 2017
52017
Vestiges of past generation: threats to 5G core network
S Park, B Choi, Y Park, D Kim, E Jeong, K Yim
Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings …, 2021
32021
Analysis against security issues of voice over 5G
HJ Cho, S Park, Y Park, B Choi, D Kim, K Yim
IEICE TRANSACTIONS on Information and Systems 104 (11), 1850-1856, 2021
22021
Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection Technology
SM Park, HC Bae, YT Cha, HK Kim
Advances in Computer Science and Ubiquitous Computing: CSA-CUTE2016 8, 74-80, 2017
22017
5G 네트워크 기술 진화에 따른 새로운 5G 보안 도전과제와 해외 보안 아키텍처 연구 동향
HK Kim, B Choi, E Ko, S Park
Review of KIISC 29 (5), 7-20, 2019
12019
A Study on Network Anomaly Detection Using Fast Persistent Contrastive Divergence
J Jeong, S Park, J Lim, J Kang, D Shin, D Shin
Symmetry 16 (9), 1220, 2024
2024
How to diagnose SS7 Protocol Vulnerability in Roaming Networks
S Park
Research Briefs on Information and Communication Technology Evolution 9, 189-199, 2023
2023
Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis
S Park, M Lee, S Na, J Lim
International Conference on Mobile Internet Security, 260-270, 2023
2023
Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities
D Kim, I You, S Park, S Kwon
International Symposium on Mobile Internet Security, 63-81, 2022
2022
5G 단독모드 기기 보안 인증 현황
권성문, 박성민, 김도원
정보보호학회지 31 (6), 37-40, 2021
2021
Real-Time Malicious Script Blocking Technology at the Host-Level
SH Oh, HC Bae, S Park, HK Kim
International Conference on Broadband and Wireless Computing, Communication …, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–20