A comparative study of time series anomaly detection models for industrial control systems B Kim, MA Alawami, E Kim, S Oh, J Park, H Kim Sensors 23 (3), 1310, 2023 | 69 | 2023 |
Ibcs: Intent-based cloud services for security applications J Kim, E Kim, J Yang, J Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ... IEEE Communications Magazine 58 (4), 45-51, 2020 | 40 | 2020 |
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules E Kim, K Kim, D Shin, B Jin, H Kim Proceedings of the 13th International Conference on Future Internet …, 2018 | 31 | 2018 |
A framework for detecting MAC and IP spoofing attacks with network characteristics J Yu, E Kim, H Kim, J Huh 2016 International conference on software security and assurance (ICSSA), 49-53, 2016 | 30 | 2016 |
A flexible architecture for orchestrating network security functions to support high-level security policies S Oh, E Kim, J Jeong, H Ko, H Kim Proceedings of the 11th International Conference on Ubiquitous Information …, 2017 | 8 | 2017 |
Sharing cyber threat intelligence: Does it really help? B Jin, E Kim, H Lee, E Bertino, D Kim, H Kim Proceedings of the 31st Annual Network and Distributed System Security …, 2024 | 7 | 2024 |
Can we create a cross-domain federated identity for the industrial Internet of Things without Google? E Kim, YS Cho, B Kim, W Ji, SH Kim, SS Woo, H Kim IEEE Internet of Things Magazine 3 (4), 82-87, 2020 | 7 | 2020 |
Design of a framework to detect device spoofing attacks using network characteristics J Yu, E Kim, H Kim, JH Huh IEEE Consumer Electronics Magazine 9 (2), 34-40, 2020 | 7 | 2020 |
Empirical analysis of SSL/TLS weaknesses in real websites: Who cares? S Oh, E Kim, H Kim Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 5 | 2017 |
A Framework for managing user-defined security policies to support network security functions E Kim, K Kim, S Lee, JP Jeong, H Kim Proceedings of the 12th International Conference on Ubiquitous Information …, 2018 | 4 | 2018 |