Follow
Kookheui Kwon
Kookheui Kwon
Unknown affiliation
Verified email at kinac.re.kr
Title
Cited by
Cited by
Year
SoK: A Systematic Review of Insider Threat Detection.
A Kim, J Oh, J Ryu, J Lee, K Kwon, K Lee
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10 (4), 46-67, 2019
312019
Cyber security controls in nuclear power plant by technical assessment methodology
D Jung, J Shin, C Lee, K Kwon, JT Seo
IEEE Access 11, 15229-15241, 2023
132023
Consider the consequences: A risk assessment approach for industrial control systems
A Kim, J Oh, K Kwon, K Lee
Security and Communication Networks 2022, 1-19, 2022
72022
A Study on the Application of Technical Assessment Methodology (TAM) for CyberSecurity in Nuclear Power Plant
D Jung, J Shin, C Lee, K Kwon, JT Seo
Proceedings of the 2020 ACM International Conference on Intelligent …, 2020
32020
Analysis of the application method of cyber security control to develop regulatory requirement for digital assets in NPP
I Kim, Y Byun, K Kwon
Journal of the Korea Institute of Information Security & Cryptology 29 (5 …, 2019
22019
A Study on Vulnerability Assessment for the Digital Assets in NPP Based on Analytical Methods
I Kim, K Kwon
Journal of the Korea Institute of Information Security & Cryptology 28 (6 …, 2018
22018
PRA-based vital digital assets identification for nuclear cyber security
M Hwang, K Kwon
22017
Cyber security for direct critical digital assets life-cycle
K Kwon, S Kim, I Kim
Korean Nucl. Soc., Daejeon, South Korea, Tech. Rep, 2018
12018
발전시설 사이버보안 평가 방법론 TAM (Technical Assessment Methodology) 분석
정다운, 신지호, 이채창, 권국희, 서정택
정보보호학회지 30 (5), 45-54, 2020
2020
Applying Code Obfuscation to Vital Digital Assets at the Nuclear Facilities
S Kim, S Kim, Y Byun, K Kwon
Proceedings of the Korea Information Processing Society Conference, 120-122, 2020
2020
Analysing Current state of Identifying Critical digital assets And Cyber security control for Nuclear Facility
S Kim, IH Shin, KH Kwon
Proceedings of the Korean Institute of Information and Commucation Sciences …, 2015
2015
Trends on US Cyber Security Event Notifications and its Implications
Y Byun, IH Shin, KH Kwon, SW Kim
한국정보처리학회 학술대회논문집 22 (1), 449-451, 2015
2015
Long-term clinical outcomes of drug-eluting stent implantation for diffuse long lesions: Korean multicenter angioplasty team registry (KOMATE) data.
DY Kim, YW Yoon, YH Cho, BK Hong, HM Kwon, SJ Oh, KH Kwon, ...
AMERICAN JOURNAL OF CARDIOLOGY 99 (8), 59F-59F, 2007
2007
Effect of nicorandil as an adjunct cardioprotective agent on percutaneous coronary intervention in acute myocardial infarction: attenuation of cardiac remodeling after …
KH Kwon, SH Park, BK Lee, BO Kim, CW Goh, YS Byun, JH Jung, SH Lee
EUROPEAN HEART JOURNAL 27, 643-643, 2006
2006
STPA-SafeSec Evaluation based on IEC 31010 Standard
J Kim, A Kim, K Kwon
A Comparative Study on Nuclear Power Plant Cyber Security Assessment Models Based on Risk Assessment Standard Guideline
K Kwon, A Kim, S Lee
Typical Characteristics of Vulnerability for the Safety Controller used in NPP
I Kim, S Kim, K Kwon
The system can't perform the operation now. Try again later.
Articles 1–17