OTIDS: A Novel Intrusion Detection System for In-vehicle Network by using Remote Frame H Lee, SH Jeong, HK Kim Privacy, Security and Trust (PST), 2017 15th Annual Conference on, 2017 | 287 | 2017 |
Cybersecurity for autonomous vehicles: Review of attacks and defense K Kim, JS Kim, S Jeong, JH Park, HK Kim Computers & Security 103, 102150, 2021 | 156 | 2021 |
Multimodal game bot detection using user behavioral characteristics AR Kang, SH Jeong, A Mohaisen, HK Kim SpringerPlus 5, 1-19, 2016 | 38 | 2016 |
Convolutional neural network-based intrusion detection system for AVTP streams in automotive Ethernet-based networks S Jeong, B Jeon, B Chung, HK Kim Vehicular Communications, 100338, 2021 | 36 | 2021 |
Automated reverse engineering and attack for CAN using OBD-II TU Kang, HM Song, S Jeong, HK Kim 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 1-7, 2018 | 28 | 2018 |
Analysis of game bot's behavioral characteristics in social interaction networks of MMORPG SH Jeong, AR Kang, HK Kim ACM SIGCOMM Computer Communication Review 45 (4), 99-100, 2015 | 25 | 2015 |
A longitudinal analysis of. i2p leakage in the public DNS infrastructure SH Jeong, AR Kang, J Kim, HK Kim, A Mohaisen Proceedings of the 2016 ACM SIGCOMM Conference, 557-558, 2016 | 10 | 2016 |
CAN Dataset for intrusion detection (OTIDS) H Lee, SH Jeong, HK Kim CAN-intrusion-dataset, 2018 | 7 | 2018 |
Automotive Ethernet Intrusion Dataset S Jeong, B Jeon, B Chung, HK Kim IEEE DataPort, 2021 | 4 | 2021 |
Transparency in the New gTLD Era: Evaluating the DNS Centralized Zone Data Service AR Kang, SH Jeong, SY Ko, K Ren, A Mohaisen 2016 Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies …, 2016 | 4 | 2016 |
결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사 정성훈, 김하나, 신영상, 이태진, 김휘강 Journal of The Korea Institute of Information Security & Cryptology 25 (6 …, 2015 | 3 | 2015 |
MUVIDS: False MAVLink Injection Attack Detection in Communication for Unmanned Vehicles S Jeong, E Park, KU Seo, JD Yoo, HK Kim Third International Workshop on Automotive and Autonomous Vehicle Security …, 2021 | 2 | 2021 |
Generative adversarial network model and training method to generate message id sequence on unmanned moving objects HK Kim, J Do YOO, S Jeong, P Eunji, KU Seo, RYU Minsoo US Patent App. 17/532,226, 2022 | 1 | 2022 |
Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House System Y Noh, S Jeong, HK Kim IEEE Transactions on Games 14 (3), 423-434, 2021 | 1 | 2021 |
Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux S Jeong, M Ryu, H Kang, HK Kim The 13th ACM Conference on Data and Application Security and Privacy …, 2023 | | 2023 |
X-CANIDS: Signal-Aware Explainable Intrusion Detection System for Controller Area Network-Based In-Vehicle Network S Jeong, S Lee, H Lee, HK Kim arXiv preprint arXiv:2303.12278, 2023 | | 2023 |
SDN-based intrusion response method for in-vehicle network, and system using same HK Kim, SH Jeong, SW Park, WP Lim US Patent App. 17/631,836, 2022 | | 2022 |
Anomaly detection model using message id sequence on unmanned moving objects HK Kim, J Do YOO, S Jeong, P Eunji, KU Seo, RYU Minsoo US Patent App. 17/532,272, 2022 | | 2022 |
The Big Data Analysis Framework of Information Security Policy based on Security Incidents SH Jeong, HK Kim, J Woo 한국컴퓨터정보학회논문지 22 (10), 73--81, 2017 | | 2017 |