Semi-supervised based unknown attack detection in EDR environment
C Hwang, D Kim, T Lee - … on Internet and Information Systems (TIIS …, 2020 - koreascience.kr
Cyberattacks penetrate the server and perform various malicious acts such as stealing
confidential information, destroying systems, and exposing personal information. To achieve …
confidential information, destroying systems, and exposing personal information. To achieve …
Digital certificate-based port knocking for connected embedded systems
The Internet of Things (IoT) is more vulnerable to targeted cyber-attacks than an ordinary
Information Technology (IT) infrastructure, where these cyber-attacks operate on subsequent …
Information Technology (IT) infrastructure, where these cyber-attacks operate on subsequent …
Design of anomaly detection system based on Big Data in Internet of Things
SI Na, HJ Kim - J. Digit. Contents Soc, 2018 - dbpia.co.kr
Internet of Things (IoT) is producing various data as the smart environment comes. The IoT
data collection is used as important data to judge systems's status. Therefore, it is important …
data collection is used as important data to judge systems's status. Therefore, it is important …
Challenges and issues of the Internet of Things: factoring elements from the social, political and information systems
A Ali, W Hussian - International Conference on Internet of Things as a …, 2021 - Springer
The concept and applications of the Internet of Things or IoT are well-known to those dealing
with the technicalities and complexities of IoT. However, for most users, the understanding …
with the technicalities and complexities of IoT. However, for most users, the understanding …
[PDF][PDF] A countermeasure against spoofing and DoS attacks based on message sequence and temporary ID in CAN
S Ahn, H Kim, J Jeong, K Kim - 2016 Symposium on …, 2016 - koasas.kaist.ac.kr
The development of Information and Communications Technologies (ICT) has affected
various fields including the automotive industry. Therefore, vehicle network protocols such …
various fields including the automotive industry. Therefore, vehicle network protocols such …