Drone secure communication protocol for future sensitive applications in military zone Y Ko, J Kim, DG Duguma, PV Astillo, I You, G Pau Sensors 21 (6), 2057, 2021 | 108 | 2021 |
Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices S Rahmadika, PV Astillo, G Choudhary, DG Duguma, V Sharma, I You IEEE Journal of Biomedical and Health Informatics 27 (2), 710-721, 2022 | 62 | 2022 |
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System PV Astillo, DG Duguma, H Park, J Kim, B Kim, I You Future Generation Computer Systems 128, 395-405, 2022 | 49 | 2022 |
TrMAps: Trust management in specification-based misbehavior detection system for IMD-enabled artificial pancreas system PV Astillo, G Choudhary, DG Duguma, J Kim, I You IEEE Journal of Biomedical and Health Informatics 25 (10), 3763-3775, 2021 | 20 | 2021 |
A formally verified security scheme for inter-gNB-DU handover in 5G vehicle-to-everything J Kim, DG Duguma, PV Astillo, HY Park, B Kim, I You, V Sharma IEEE Access 9, 119100-119117, 2021 | 17 | 2021 |
A lightweight D2D security protocol with request-forecasting for next-generation mobile networks DG Duguma, J Kim, S Lee, NS Jho, V Sharma, I You Connection Science 34 (1), 362-386, 2022 | 10 | 2022 |
5G wireless P2MP backhaul security protocol: An adaptive approach J Kim, G Choudhary, J Heo, DG Duguma, I You EURASIP Journal on Wireless Communications and Networking 2019 (1), 265, 2019 | 10 | 2019 |
Scrutinizing the vulnerability of ephemeral Diffie–Hellman over COSE (EDHOC) for IoT environment using formal approaches J Kim, DG Duguma, S Lee, B Kim, JD Lim, I You Mobile Information Systems 2021 (1), 7314508, 2021 | 7 | 2021 |
Fingerprint defender: defense against browser-based user tracking D Moad, V Sihag, G Choudhary, DG Duguma, I You International Symposium on Mobile Internet Security, 236-247, 2021 | 4 | 2021 |
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols DG Duguma, I You, YE Gebremariam, J Kim Sensors 21 (24), 8383, 2021 | 3 | 2021 |
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System DG Duguma, PV Astillo, YE Gebremariam, B Kim, I You International Symposium on Mobile Internet Security, 30-43, 2021 | 2 | 2021 |
5G and beyond telco cloud: architecture and cybersecurity challenges YE Gebremariam, DG Duguma, HY Park, YN Kim, B Kim, I You 2021 World Automation Congress (WAC), 1-6, 2021 | 2 | 2021 |
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. H Park, TG Kim, DG Duguma, J Kim, I You, W Susilo Computer Systems Science & Engineering 45 (2), 2023 | 1 | 2023 |
lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments H Park, J Kim, S Lee, DG Duguma, I You Journal of Internet Technology 22 (5), 1069-1081, 2021 | 1 | 2021 |
A Formal Security Verification on He and Zeadally's Authentication Protocol for IMD-Enabled Ambient Assisted Living System DG Duguma, J Kim, B Kim, I You Proceedings of the 2020 ACM International Conference on Intelligent …, 2020 | 1 | 2020 |
Comments on" Securing implantable cardiac medical devices" Use of radio frequency energy harvesting J Kim, S Lee, DG Duguma, B Kim, I You Proceedings of the 2020 ACM International Conference on Intelligent …, 2020 | 1 | 2020 |
Aggregate authentication for massive Internet of Things in 5G networks A Syalim, B Anggorojati, J Baek, D Gerbi, I You Mobile Internet Security: 4th International Symposium, MobiSec 2019 …, 2020 | 1 | 2020 |
Poster: Specification-based Misbehavior Detection and Deep Learning-based Anomaly Detection System to Enhance Insulin Pump Security PV Astillo, YE Gebremariam, DG Duguma, B Kim, I You | | |