关注
Seonghyeon Gong
Seonghyeon Gong
Post. Doc. of Korea University.
在 korea.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Blockchain-based secure device management framework for an internet of things network in a smart city
S Gong, E Tcydenova, J Jo, Y Lee, JH Park
Sustainability 11 (14), 3889, 2019
512019
Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance
S Gong, C Lee
Electronics 9 (3), 521, 2020
402020
A reliability comparison method for OSINT validity analysis
S Gong, J Cho, C Lee
IEEE Transactions on Industrial Informatics 14 (12), 5428-5435, 2018
382018
Cyber threat intelligence framework for incident response in an energy cloud platform
S Gong, C Lee
Electronics 10 (3), 239, 2021
322021
Secure secondary authentication framework for efficient mutual authentication on a 5G data network
S Gong, A El Azzaoui, J Cha, JH Park
Applied Sciences 10 (2), 727, 2020
132020
안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구
남기훈, 공성현, 석병진, 이창훈
정보보호학회논문지 28 (1), 111-122, 2018
6*2018
Met hod of hijacking a user account using a password manager vulnerability
GH Nam, BJ Seok, SH Gong, Y Kim, CH Lee
Journal of Di gital Forensics 12 (1), 1-4, 2018
52018
A Study on High-Speed Outlier Detection Method of Network Abnormal Behavior Data Using Heterogeneous Multiple Classifiers
J Cho, S Gong, K Choi
Applied Sciences 12 (3), 1011, 2022
32022
Efficient data noise-reduction for cyber threat intelligence system
S Gong, C Lee
Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019, 591-597, 2021
32021
Dynamic Data Abstraction-Based Anomaly Detection for Industrial Control Systems
J Cho, S Gong
Electronics 13 (1), 158, 2023
12023
A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
H Byun, J Kim, Y Jeong, B Seok, S Gong, C Lee
Electronics 13 (13), 2433, 2024
2024
Analysis of DLL Hijacking Vulnerability in System Executable Files for Administrator Privileges of Windows
J Bae, S Gong, B Seok, C Lee
Proceedings of the Korea Information Processing Society Conference, 170-173, 2019
2019
DDoS Security Considerations When proposing a protocol for CoAP
S Jo, S Gong, B Seok, C Lee
Proceedings of the Korea Information Processing Society Conference, 204-207, 2019
2019
패스워드 매니저 취약점을 이용한 사용자 계정 탈취 방법
남기훈, 석병진, 공성현, 김역, 이창훈
디지털포렌식연구 12 (1), 9-18, 2018
2018
A Study on Dataset Construction Technique for Intrusion Detection based on Pattern Recognition
SH Gong, MJ Cho, J Cho, C Lee
Proceedings of the Korea Information Processing Society Conference, 343-345, 2017
2017
인증 암호화 기술 분석
SH Gong, CH Lee
Communications of the Korean Institute of Information Scientists and …, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–16