A hybrid machine learning approach to network anomaly detection T Shon, J Moon Information Sciences 177 (18), 3799-3821, 2007 | 405 | 2007 |
A machine learning framework for network anomaly detection using SVM and GA T Shon, Y Kim, C Lee, J Moon Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005 | 167 | 2005 |
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions T Shon, W Choi The 1st International Conference on Network-Based Information Systems, 88-97, 2007 | 153 | 2007 |
A lightweight message authentication scheme for smart grid communications in power sector K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad Computers & Electrical Engineering 52, 114-124, 2016 | 111 | 2016 |
A lightweight NEMO protocol to support 6LoWPAN JH Kim, CS Hong, T Shon ETRI journal 30 (5), 685-695, 2008 | 92 | 2008 |
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture H Yoo, T Shon Future generation computer systems 61, 128-136, 2016 | 56 | 2016 |
SVM approach with a genetic algorithm for network intrusion detection T Shon, J Seo, J Moon International Symposium on Computer and Information Sciences, 224-233, 2005 | 48 | 2005 |
Toward advanced mobile cloud computing for the internet of things: Current issues and future direction T Shon, J Cho, K Han, H Choi Mobile Networks and Applications 19 (3), 404-413, 2014 | 42 | 2014 |
An improved and robust biometrics-based three factor authentication scheme for multiserver environments SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher The Journal of Supercomputing 74 (8), 3504-3520, 2018 | 41 | 2018 |
Novel approach for detecting network anomalies for substation automation based on IEC 61850 H Yoo, T Shon Multimedia Tools and Applications 74 (1), 303-318, 2015 | 39 | 2015 |
Untraceable mobile node authentication in WSN K Han, K Kim, T Shon Sensors 10 (5), 4410-4429, 2010 | 39 | 2010 |
Asynchronous inter-network interference avoidance for wireless body area networks EJ Kim, S Youm, T Shon, CH Kang The Journal of Supercomputing 65 (2), 562-579, 2013 | 37 | 2013 |
Efficient mobile sensor authentication in smart home and WPAN K Han, T Shon, K Kim IEEE Transactions on Consumer Electronics 56 (2), 591-596, 2010 | 36 | 2010 |
Applying genetic algorithm for classifying anomalous TCP/IP packets T Shon, X Kovah, J Moon Neurocomputing 69 (16-18), 2429-2433, 2006 | 36 | 2006 |
A robust and efficient privacy aware handover authentication scheme for wireless networks SA Chaudhry, MS Farash, H Naqvi, SKH Islam, T Shon Wireless Personal Communications 93 (2), 311-335, 2017 | 33 | 2017 |
A multiserver biometric authentication scheme for tmis using elliptic curve cryptography SA Chaudhry, MT Khan, MK Khan, T Shon Journal of medical systems 40 (11), 1-13, 2016 | 33 | 2016 |
Mobility header compression method and system for internet protocol-based low power wireless network TS Shon, SG Kim, HH Choi, JH Kim, CS Hong US Patent 8,213,403, 2012 | 33 | 2012 |
Method and apparatus for forming security channel in short range communication T Shon, Y Park, J In US Patent 8,477,948, 2013 | 31 | 2013 |
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems SA Chaudhry, T Shon, F Al-Turjman, MH Alsharif Computer Communications 153, 527-537, 2020 | 29 | 2020 |
R-URC: RF4CE-based universal remote control framework using smartphone B Koo, T Ahn, JS In, Y Park, T Shon 2010 International Conference on Computational Science and Its Applications …, 2010 | 27 | 2010 |