Malware-detection method with a convolutional recurrent neural network using opcode sequences S Jeon, J Moon Information Sciences 535, 1-15, 2020 | 72 | 2020 |
Recurrent gans password cracker for iot password security enhancement S Nam, S Jeon, H Kim, J Moon Sensors 20 (11), 3106, 2020 | 31 | 2020 |
Generating optimized guessing candidates toward better password cracking from multi-dictionaries using relativistic GAN S Nam, S Jeon, J Moon Applied Sciences 10 (20), 7306, 2020 | 12 | 2020 |
Proposal and assessment of a de-identification strategy to enhance anonymity of the observational medical outcomes partnership common data model (OMOP-CDM) in a public cloud … S Jeon, J Seo, S Kim, J Lee, JH Kim, JW Sohn, J Moon, HJ Joo Journal of medical Internet research 22 (11), e19597, 2020 | 11 | 2020 |
A new password cracking model with generative adversarial networks S Nam, S Jeon, J Moon Information Security Applications: 20th International Conference, WISA 2019 …, 2020 | 10 | 2020 |
Dr. PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search S Jeon, J Moon Neural Computing and Applications 34 (13), 10731-10750, 2022 | 3 | 2022 |
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review IH Ji, JH Lee, MJ Kang, WJ Park, SH Jeon, JT Seo Sensors 24 (3), 898, 2024 | 2 | 2024 |
GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control Systems IS Song, S Jeon, D Kim, MG Lee, JT Seo Applied Sciences 14 (2), 768, 2024 | 2 | 2024 |
A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing G Choi, S Jeon, J Cho, J Moon IEEE Access 11, 2048-2057, 2023 | 2 | 2023 |
A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting S Jeon, C Shin, E Ko, J Moon Applied Sciences 11 (19), 9072, 2021 | 1 | 2021 |
A Deep Neural Network Model Based on a Mutation Operator SH Jeon, JS Moon KIPS Transactions on Software and Data Engineering 6 (12), 573-580, 2017 | 1* | 2017 |
Data-Driven ICS Network Simulation for Synthetic Data Generation M Kim, S Jeon, J Cho, S Gong Electronics 13 (10), 1920, 2024 | | 2024 |
Guide to Developing Case-based Attack Scenarios and Establishing Defense Strategies for Cybersecurity Exercise in ICS Environment D Kim, S Jeon, K Kim, J Kang, S Lee, JT Seo | | 2024 |
Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression JH Lee, IH Ji, SH Jeon, JT Seo Sensors 23 (24), 2023 | | 2023 |
Design the IoT Botnet Defense Process for Cybersecurity in Smart City D Kim, S Jeon, J Shin, JT Seo Intelligent Automation & Soft Computing 37 (3), 2023 | | 2023 |
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime D Kim, S Jeon, J Shin, JT Seo International Conference on Information Security Applications, 201-212, 2023 | | 2023 |
AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0 I Ji, S Jeon, JT Seo International Conference on Information Security Applications, 91-104, 2023 | | 2023 |
SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis S Jeon, JT Seo International Conference on Information Security Applications, 282-293, 2023 | | 2023 |
A Synthetic Time-Series Generation using Variational Recurrent Autoencoder with Attention Mechanism in Industrial Control System S Jeon, JT Seo Sensors 24 (1), 2023 | | 2023 |
A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment S Jeon, C Shin, E Ko, J Moon Computer Methods and Programs in Biomedicine 226, 107159, 2022 | | 2022 |