Seguir
Seonghyeon Gong
Título
Citado por
Citado por
Ano
Blockchain-based secure device management framework for an internet of things network in a smart city
S Gong, E Tcydenova, J Jo, Y Lee, JH Park
Sustainability 11 (14), 3889, 2019
482019
A reliability comparison method for OSINT validity analysis
S Gong, J Cho, C Lee
IEEE Transactions on Industrial Informatics 14 (12), 5428-5435, 2018
362018
Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance
S Gong, C Lee
Electronics 9 (3), 521, 2020
352020
Cyber threat intelligence framework for incident response in an energy cloud platform
S Gong, C Lee
Electronics 10 (3), 239, 2021
272021
Secure secondary authentication framework for efficient mutual authentication on a 5G data network
S Gong, A El Azzaoui, J Cha, JH Park
Applied Sciences 10 (2), 727, 2020
132020
Met hod of hijacking a user account using a password manager vulnerability
GH Nam, BJ Seok, SH Gong, Y Kim, CH Lee
Journal of Di gital Forensics 12 (1), 1-4, 2018
52018
안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구
남기훈, 공성현, 석병진, 이창훈
정보보호학회논문지 28 (1), 111-122, 2018
5*2018
A Study on High-Speed Outlier Detection Method of Network Abnormal Behavior Data Using Heterogeneous Multiple Classifiers
J Cho, S Gong, K Choi
Applied Sciences 12 (3), 1011, 2022
22022
Efficient Data Noise-Reduction for Cyber Threat Intelligence System
S Gong, C Lee
Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019, 591-597, 2021
12021
Dynamic Data Abstraction-Based Anomaly Detection for Industrial Control Systems
J Cho, S Gong
Electronics 13 (1), 158, 2023
2023
DDoS Security Considerations When proposing a protocol for CoAP
S Jo, S Gong, B Seok, C Lee
Proceedings of the Korea Information Processing Society Conference, 204-207, 2019
2019
패스워드 매니저 취약점을 이용한 사용자 계정 탈취 방법
남기훈, 석병진, 공성현, 김역, 이창훈
디지털포렌식연구 12 (1), 9-18, 2018
2018
A Study on Dataset Construction Technique for Intrusion Detection based on Pattern Recognition
SH Gong, MJ Cho, J Cho, C Lee
Proceedings of the Korea Information Processing Society Conference, 343-345, 2017
2017
인증 암호화 기술 분석
SH Gong, CH Lee
Communications of the Korean Institute of Information Scientists and …, 2017
2017
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–14