Drone secure communication protocol for future sensitive applications in military zone Y Ko, J Kim, DG Duguma, PV Astillo, I You, G Pau Sensors 21 (6), 2057, 2021 | 85 | 2021 |
Behavior and vulnerability assessment of drones-enabled industrial internet of things (iiot) V Sharma, G Choudhary, Y Ko, I You IEEE Access 6, 43368-43383, 2018 | 70 | 2018 |
An optimal security management framework for backhaul-aware 5G-vehicle to everything (V2X) V Sharma, J Kim, Y Ko, I You, JT Seo arXiv preprint arXiv:1909.07568, 2019 | 4 | 2019 |
Security management for backhaul-aware 5G-V2X V Sharma, Y Ko, J Kim, I You arXiv preprint arXiv:1811.08273, 2018 | 4 | 2018 |
SMDFbs: Specification-Based Misbehavior Detection for False Base Stations H Park, PVB Astillo, Y Ko, Y Park, T Kim, I You Sensors 23 (23), 9504, 2023 | 2 | 2023 |
A method for verifying drones in Industrial Internet of Things using Petri net modeling YHK Il Sun You, Vishal Sharma, Gaurav Choudhary US Patent 11,914,720, 2024 | 1* | 2024 |
미래전에 대비한 군수분야 UAV 환경을 위한 효율적인 보안 프로토콜 연구(ESPMU: an Efficient Security Protocol in the Military UAV Environment for the Future War) Y ko 순천향대학교, 2020 | | 2020 |
인터넷 공유기 펌웨어 업데이트 취약점 분석(Vulnerability analysis on Wireless Access Point Firmware Update) Y ko 순천향대학교, 2018 | | 2018 |
IoT가 내재된 가상물리시스템을 위한 규칙 명세 기반의 악의적인 행위 탐지 IS YOU, V SHARMA, YH KO | | 2018 |
무인 항공기 보안 프로토콜 시스템 및 그 방법 IS YOU, V SHARMA, YH KO | | 2018 |
페트리 넷 모델링을 이용한 산업용 사물 인터넷 시스템에 구비되는 드론의 검증방법 IS YOU, V SHARMA, YH KO | | 2018 |