P2P networking based internet of things (IoT) sensor node authentication by Blockchain S Hong Peer-to-Peer Networking and Applications 13 (2), 579-589, 2020 | 82 | 2020 |
Analysis of attack models via unified modeling language in wireless sensor networks: A survey study S Hong, S Lim 2010 IEEE International Conference on Wireless Communications, Networking …, 2010 | 32 | 2010 |
Unified modeling language based analysis of security attacks in wireless sensor networks: a survey SH Hong, SH Lim, JK Song KSII Transactions on Internet and Information Systems (TIIS) 5 (4), 805-821, 2011 | 27 | 2011 |
Build a secure smart city by using blockchain and digital twin Y Song, S Hong International Journal of Advanced Science and Convergence 3 (3), 9-13, 2021 | 25 | 2021 |
New Authentication Methods based on User’s Behavior Big Data Analysis on Cloud 홍성혁 융합정보논문지 6 (4), 31-36, 2016 | 25 | 2016 |
Research on IoT international strategic standard model S Hong Journal of the korea convergence society 8 (2), 21-26, 2017 | 23 | 2017 |
ICS malware Triton attack and countermeasures J Myung, S Hong International Journal of Emerging Multidisciplinary Research 3 (2), 13-17, 2019 | 19 | 2019 |
Analysis of the Vulnerability of the IoT by the Scenario S Hong, HJ Sin Journal of the Korea Convergence Society 8 (9), 1-7, 2017 | 18 | 2017 |
A novel secure and efficient hash function with extra padding against rainbow table attacks HJ Mun, S Hong, J Shin Cluster Computing 21, 1161-1173, 2018 | 15 | 2018 |
Developing a blockchain based accounting and tax information in the 4th Industrial Revolution 홍성혁, 서초롱 한국융합학회논문지 9 (3), 45-51, 2018 | 13 | 2018 |
Efficient and secure DNS cyber shelter on DDoS attacks S Hong Journal of Computer Virology and Hacking Techniques 11, 129-136, 2015 | 13 | 2015 |
Authentication Techniques in the Internet of Things Environment: A Survey. S Hong Int. J. Netw. Secur. 21 (3), 462-470, 2019 | 12 | 2019 |
A study on stock price prediction system based on text mining method using LSTM and stock market news. S Hong Journal of Digital Convergence 18 (7), 2020 | 11 | 2020 |
The Research on Blockchain-based Secure loT Authentication S Hong, S Park Journal of the Korea Convergence Society 8 (11), 57-62, 2017 | 11 | 2017 |
Research on wireless sensor networks security attack and countermeasures: Survey S Hong Journal of Convergence Society for SMB 4 (4), 1-6, 2014 | 11 | 2014 |
Analysis of DDoS attack and countermeasure: Survey S Hong Journal of digital convergence 12 (1), 423-429, 2014 | 11 | 2014 |
Queue-based Group Key Agreement Protocol. S Hong Int. J. Netw. Secur. 9 (2), 135-142, 2009 | 11 | 2009 |
Multi-factor authentication with randomly selected authentication methods with DID on a random terminal S Kim, HJ Mun, S Hong Applied Sciences 12 (5), 2301, 2022 | 10 | 2022 |
Secure and light IoT protocol (SLIP) for anti-hacking S Hong Journal of Computer Virology and Hacking Techniques 13 (4), 241-247, 2017 | 10 | 2017 |
Two-channel user authentication by using USB on Cloud S Hong Journal of Computer Virology and Hacking Techniques 12, 137-143, 2016 | 10 | 2016 |