Blockchain-based secure device management framework for an internet of things network in a smart city S Gong, E Tcydenova, J Jo, Y Lee, JH Park Sustainability 11 (14), 3889, 2019 | 51 | 2019 |
Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance S Gong, C Lee Electronics 9 (3), 521, 2020 | 40 | 2020 |
A reliability comparison method for OSINT validity analysis S Gong, J Cho, C Lee IEEE Transactions on Industrial Informatics 14 (12), 5428-5435, 2018 | 38 | 2018 |
Cyber threat intelligence framework for incident response in an energy cloud platform S Gong, C Lee Electronics 10 (3), 239, 2021 | 32 | 2021 |
Secure secondary authentication framework for efficient mutual authentication on a 5G data network S Gong, A El Azzaoui, J Cha, JH Park Applied Sciences 10 (2), 727, 2020 | 13 | 2020 |
안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구 남기훈, 공성현, 석병진, 이창훈 정보보호학회논문지 28 (1), 111-122, 2018 | 6* | 2018 |
Met hod of hijacking a user account using a password manager vulnerability GH Nam, BJ Seok, SH Gong, Y Kim, CH Lee Journal of Di gital Forensics 12 (1), 1-4, 2018 | 5 | 2018 |
A Study on High-Speed Outlier Detection Method of Network Abnormal Behavior Data Using Heterogeneous Multiple Classifiers J Cho, S Gong, K Choi Applied Sciences 12 (3), 1011, 2022 | 3 | 2022 |
Efficient data noise-reduction for cyber threat intelligence system S Gong, C Lee Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019, 591-597, 2021 | 3 | 2021 |
Dynamic Data Abstraction-Based Anomaly Detection for Industrial Control Systems J Cho, S Gong Electronics 13 (1), 158, 2023 | 1 | 2023 |
A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks H Byun, J Kim, Y Jeong, B Seok, S Gong, C Lee Electronics 13 (13), 2433, 2024 | | 2024 |
Analysis of DLL Hijacking Vulnerability in System Executable Files for Administrator Privileges of Windows J Bae, S Gong, B Seok, C Lee Proceedings of the Korea Information Processing Society Conference, 170-173, 2019 | | 2019 |
DDoS Security Considerations When proposing a protocol for CoAP S Jo, S Gong, B Seok, C Lee Proceedings of the Korea Information Processing Society Conference, 204-207, 2019 | | 2019 |
패스워드 매니저 취약점을 이용한 사용자 계정 탈취 방법 남기훈, 석병진, 공성현, 김역, 이창훈 디지털포렌식연구 12 (1), 9-18, 2018 | | 2018 |
A Study on Dataset Construction Technique for Intrusion Detection based on Pattern Recognition SH Gong, MJ Cho, J Cho, C Lee Proceedings of the Korea Information Processing Society Conference, 343-345, 2017 | | 2017 |
인증 암호화 기술 분석 SH Gong, CH Lee Communications of the Korean Institute of Information Scientists and …, 2017 | | 2017 |