A study on the covert channel detection of TCP/IP header using support vector machine T Sohn, JT Seo, J Moon Information and Communications Security: 5th International Conference, ICICS …, 2003 | 120 | 2003 |
An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system I You, S Kwon, G Choudhary, V Sharma, JT Seo Sensors 18 (6), 1888, 2018 | 81 | 2018 |
An efficient dynamic solution for the detection and prevention of black hole attack in VANETs A Malik, MZ Khan, M Faisal, F Khan, JT Seo Sensors 22 (5), 1897, 2022 | 61 | 2022 |
An approach to mitigate wormhole attack in wireless ad hoc networks G Lee, J Seo, D Kim 2008 international conference on information security and assurance (ISA …, 2008 | 53 | 2008 |
SVM approach with a genetic algorithm for network intrusion detection T Shon, J Seo, J Moon International Symposium on Computer and Information Sciences, 224-233, 2005 | 52 | 2005 |
A hybrid trust management framework for vehicular social networks R Hussain, W Nawaz, JY Lee, J Son, JT Seo Computational Social Networks: 5th International Conference, CSoNet 2016, Ho …, 2016 | 47 | 2016 |
Ransomware prevention technique using key backup K Lee, K Yim, JT Seo Concurrency and Computation: Practice and Experience 30 (3), e4337, 2018 | 42 | 2018 |
Development of cyber-attack scenarios for nuclear power plants using scenario graphs W Ahn, M Chung, BG Min, J Seo International Journal of Distributed Sensor Networks 11 (9), 836258, 2015 | 39 | 2015 |
Price modification attack and protection scheme in smart grid S Mishra, X Li, T Pan, A Kuhnle, MT Thai, J Seo IEEE Transactions on Smart Grid 8 (4), 1864-1875, 2016 | 38 | 2016 |
Rate alteration attacks in smart grid S Mishra, X Li, A Kuhnle, MT Thai, J Seo 2015 IEEE Conference on Computer Communications (INFOCOM), 2353-2361, 2015 | 38 | 2015 |
A new DDoS detection model using multiple SVMs and TRA J Seo, C Lee, T Shon, KH Cho, J Moon Embedded and Ubiquitous Computing–EUC 2005 Workshops: EUC 2005 Workshops …, 2005 | 38 | 2005 |
Analyzing and evaluating critical cyber security challenges faced by vendor organizations in software development: SLR based approach AW Khan, S Zaib, F Khan, I Tarimer, JT Seo, J Shin IEEE access 10, 65044-65054, 2022 | 31 | 2022 |
Catastrophic cascading failures in power networks J Seo, S Mishra, X Li, MT Thai Theoretical Computer Science 607, 306-319, 2015 | 31 | 2015 |
An approach for spam e-mail detection with support vector machine and n-gram indexing J Moon, T Shon, J Seo, J Kim, J Seo Computer and Information Sciences-ISCIS 2004: 19th International Symposium …, 2004 | 30 | 2004 |
PBF: a new privacy‐aware billing framework for online electric vehicles with bidirectional auditability R Hussain, J Son, D Kim, M Nogueira, H Oh, AO Tokuta, J Seo Wireless Communications and Mobile Computing 2017 (1), 5676030, 2017 | 28 | 2017 |
Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions PV Mohan, S Dixit, A Gyaneshwar, U Chadha, K Srinivasan, JT Seo Sensors 22 (6), 2194, 2022 | 27 | 2022 |
Privacy enhanced location sharing for mobile online social networks J Son, D Kim, MZA Bhuiyan, R Tashakkori, J Seo, DH Lee IEEE Transactions on Sustainable Computing 5 (2), 279-290, 2018 | 25 | 2018 |
A novel transparent and auditable fog-assisted cloud storage with compensation mechanism D Kim, J Son, D Seo, Y Kim, H Kim, JT Seo Tsinghua Science and Technology 25 (1), 28-43, 2019 | 23 | 2019 |
Threat from being social: Vulnerability analysis of social network coupled smart grid T Pan, S Mishra, LN Nguyen, G Lee, J Kang, J Seo, MT Thai IEEE Access 5, 16774-16783, 2017 | 22 | 2017 |
PICAndro: Packet InspeCtion‐Based Android Malware Detection V Sihag, G Choudhary, M Vardhan, P Singh, JT Seo Security and Communication Networks 2021 (1), 9099476, 2021 | 20 | 2021 |