Follow
Seungho Jeon
Seungho Jeon
Other namesSeung Ho Jeon, 전 승호
Verified email at gachon.ac.kr - Homepage
Title
Cited by
Cited by
Year
Malware-detection method with a convolutional recurrent neural network using opcode sequences
S Jeon, J Moon
Information Sciences 535, 1-15, 2020
722020
Recurrent gans password cracker for iot password security enhancement
S Nam, S Jeon, H Kim, J Moon
Sensors 20 (11), 3106, 2020
312020
Generating optimized guessing candidates toward better password cracking from multi-dictionaries using relativistic GAN
S Nam, S Jeon, J Moon
Applied Sciences 10 (20), 7306, 2020
122020
Proposal and assessment of a de-identification strategy to enhance anonymity of the observational medical outcomes partnership common data model (OMOP-CDM) in a public cloud …
S Jeon, J Seo, S Kim, J Lee, JH Kim, JW Sohn, J Moon, HJ Joo
Journal of medical Internet research 22 (11), e19597, 2020
112020
A new password cracking model with generative adversarial networks
S Nam, S Jeon, J Moon
Information Security Applications: 20th International Conference, WISA 2019 …, 2020
102020
Dr. PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search
S Jeon, J Moon
Neural Computing and Applications 34 (13), 10731-10750, 2022
32022
Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review
IH Ji, JH Lee, MJ Kang, WJ Park, SH Jeon, JT Seo
Sensors 24 (3), 898, 2024
22024
GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control Systems
IS Song, S Jeon, D Kim, MG Lee, JT Seo
Applied Sciences 14 (2), 768, 2024
22024
A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing
G Choi, S Jeon, J Cho, J Moon
IEEE Access 11, 2048-2057, 2023
22023
A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting
S Jeon, C Shin, E Ko, J Moon
Applied Sciences 11 (19), 9072, 2021
12021
A Deep Neural Network Model Based on a Mutation Operator
SH Jeon, JS Moon
KIPS Transactions on Software and Data Engineering 6 (12), 573-580, 2017
1*2017
Data-Driven ICS Network Simulation for Synthetic Data Generation
M Kim, S Jeon, J Cho, S Gong
Electronics 13 (10), 1920, 2024
2024
Guide to Developing Case-based Attack Scenarios and Establishing Defense Strategies for Cybersecurity Exercise in ICS Environment
D Kim, S Jeon, K Kim, J Kang, S Lee, JT Seo
2024
Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression
JH Lee, IH Ji, SH Jeon, JT Seo
Sensors 23 (24), 2023
2023
Design the IoT Botnet Defense Process for Cybersecurity in Smart City
D Kim, S Jeon, J Shin, JT Seo
Intelligent Automation & Soft Computing 37 (3), 2023
2023
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime
D Kim, S Jeon, J Shin, JT Seo
International Conference on Information Security Applications, 201-212, 2023
2023
AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0
I Ji, S Jeon, JT Seo
International Conference on Information Security Applications, 91-104, 2023
2023
SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis
S Jeon, JT Seo
International Conference on Information Security Applications, 282-293, 2023
2023
A Synthetic Time-Series Generation using Variational Recurrent Autoencoder with Attention Mechanism in Industrial Control System
S Jeon, JT Seo
Sensors 24 (1), 2023
2023
A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment
S Jeon, C Shin, E Ko, J Moon
Computer Methods and Programs in Biomedicine 226, 107159, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20