关注
Seonghoon Jeong
Seonghoon Jeong
Postdoctoral Researcher, Institute of Cybersecurity & Privacy, Korea University
在 korea.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame
H Lee, SH Jeong, HK Kim
Privacy, Security and Trust (PST), 2017 15th Annual Conference on, 2017
2872017
Cybersecurity for autonomous vehicles: Review of attacks and defense
K Kim, JS Kim, S Jeong, JH Park, HK Kim
Computers & Security 103, 102150, 2021
1562021
Multimodal game bot detection using user behavioral characteristics
AR Kang, SH Jeong, A Mohaisen, HK Kim
SpringerPlus 5, 1-19, 2016
382016
Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks
S Jeong, B Jeon, B Chung, HK Kim
Vehicular Communications, 100338, 2021
362021
Automated reverse engineering and attack for CAN using OBD-II
TU Kang, HM Song, S Jeong, HK Kim
2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 1-7, 2018
282018
Analysis of game bot's behavioral characteristics in social interaction networks of MMORPG
SH Jeong, AR Kang, HK Kim
ACM SIGCOMM Computer Communication Review 45 (4), 99-100, 2015
252015
A longitudinal analysis of. i2p leakage in the public DNS infrastructure
SH Jeong, AR Kang, J Kim, HK Kim, A Mohaisen
Proceedings of the 2016 ACM SIGCOMM Conference, 557-558, 2016
102016
CAN Dataset for intrusion detection (OTIDS)
H Lee, SH Jeong, HK Kim
CAN-intrusion-dataset, 2018
72018
Automotive Ethernet Intrusion Dataset
S Jeong, B Jeon, B Chung, HK Kim
IEEE DataPort, 2021
42021
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service
AR Kang, SH Jeong, SY Ko, K Ren, A Mohaisen
2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies …, 2016
42016
결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사
정성훈, 김하나, 신영상, 이태진, 김휘강
Journal of The Korea Institute of Information Security & Cryptology 25 (6 …, 2015
32015
MUVIDS: False MAVLink Injection Attack Detection in Communication for Unmanned Vehicles
S Jeong, E Park, KU Seo, JD Yoo, HK Kim
Third International Workshop on Automotive and Autonomous Vehicle Security …, 2021
22021
Generative adversarial network model and training method to generate message id sequence on unmanned moving objects
HK Kim, J Do YOO, S Jeong, P Eunji, KU Seo, RYU Minsoo
US Patent App. 17/532,226, 2022
12022
Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House System
Y Noh, S Jeong, HK Kim
IEEE Transactions on Games 14 (3), 423-434, 2021
12021
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux
S Jeong, M Ryu, H Kang, HK Kim
The 13th ACM Conference on Data and Application Security and Privacy …, 2023
2023
X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network
S Jeong, S Lee, H Lee, HK Kim
arXiv preprint arXiv:2303.12278, 2023
2023
SDN-based intrusion response method for in-vehicle network, and system using same
HK Kim, SH Jeong, SW Park, WP Lim
US Patent App. 17/631,836, 2022
2022
Anomaly detection model using message id sequence on unmanned moving objects
HK Kim, J Do YOO, S Jeong, P Eunji, KU Seo, RYU Minsoo
US Patent App. 17/532,272, 2022
2022
The Big Data Analysis Framework of Information Security Policy based on Security Incidents
SH Jeong, HK Kim, J Woo
한국컴퓨터정보학회논문지 22 (10), 73--81, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–19