Rocking drones with intentional sound noise on gyroscopic sensors Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim 24th USENIX security symposium (USENIX Security 15), 881-896, 2015 | 453 | 2015 |
Security analysis of FHSS-type drone controller H Shin, K Choi, Y Park, J Choi, Y Kim International workshop on information security applications, 240-253, 2015 | 64 | 2015 |
Dissecting customized protocols: automatic analysis for customized protocols based on IEEE 802.15. 4 K Choi, Y Son, J Noh, H Shin, J Choi, Y Kim Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 20 | 2016 |
Burnfit: Analyzing and exploiting wearable devices D Kim, S Park, K Choi, Y Kim Information Security Applications: 16th International Workshop, WISA 2015 …, 2016 | 16 | 2016 |
Emotions and motivation in learning and performance. JM Spector, MD Merrill, J. Elen, & MJ Bishop (Eds.), Handbook of research on educational communications and technology (pp … C Kim, R Pekrun New York: Springer, 2014 | 7* | 2014 |
Information security applications H Kim, M Yung, HW Lee Springer, 2014 | 5 | 2014 |
Frying PAN: Dissecting Customized Protocol for Personal Area Network K Choi, Y Son, J Lee, S Kim, Y Kim International Workshop on Information Security Applications, 300-312, 2015 | 1 | 2015 |
Original Text Y Park, J Noh, K Choi, J Choi, Y Kim | | |