Taeshik Shon
Taeshik Shon
Professor of Computer Engineering, Ajou University
Verifierad e-postadress på ajou.ac.kr - Startsida
Citeras av
Citeras av
A hybrid machine learning approach to network anomaly detection
T Shon, J Moon
Information Sciences 177 (18), 3799-3821, 2007
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
T Shon, W Choi
The 1st International Conference on Network-Based Information Systems, 88-97, 2007
A lightweight message authentication scheme for smart grid communications in power sector
K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad
Computers & Electrical Engineering 52, 114-124, 2016
A lightweight NEMO protocol to support 6LoWPAN
JH Kim, CS Hong, T Shon
ETRI journal 30 (5), 685-695, 2008
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
H Yoo, T Shon
Future generation computer systems 61, 128-136, 2016
SVM approach with a genetic algorithm for network intrusion detection
T Shon, J Seo, J Moon
International Symposium on Computer and Information Sciences, 224-233, 2005
Toward advanced mobile cloud computing for the internet of things: Current issues and future direction
T Shon, J Cho, K Han, H Choi
Mobile Networks and Applications 19 (3), 404-413, 2014
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74 (8), 3504-3520, 2018
Novel approach for detecting network anomalies for substation automation based on IEC 61850
H Yoo, T Shon
Multimedia Tools and Applications 74 (1), 303-318, 2015
Untraceable mobile node authentication in WSN
K Han, K Kim, T Shon
Sensors 10 (5), 4410-4429, 2010
Asynchronous inter-network interference avoidance for wireless body area networks
EJ Kim, S Youm, T Shon, CH Kang
The Journal of Supercomputing 65 (2), 562-579, 2013
Efficient mobile sensor authentication in smart home and WPAN
K Han, T Shon, K Kim
IEEE Transactions on Consumer Electronics 56 (2), 591-596, 2010
Applying genetic algorithm for classifying anomalous TCP/IP packets
T Shon, X Kovah, J Moon
Neurocomputing 69 (16-18), 2429-2433, 2006
A robust and efficient privacy aware handover authentication scheme for wireless networks
SA Chaudhry, MS Farash, H Naqvi, SKH Islam, T Shon
Wireless Personal Communications 93 (2), 311-335, 2017
A multiserver biometric authentication scheme for tmis using elliptic curve cryptography
SA Chaudhry, MT Khan, MK Khan, T Shon
Journal of medical systems 40 (11), 1-13, 2016
Mobility header compression method and system for internet protocol-based low power wireless network
TS Shon, SG Kim, HH Choi, JH Kim, CS Hong
US Patent 8,213,403, 2012
Method and apparatus for forming security channel in short range communication
T Shon, Y Park, J In
US Patent 8,477,948, 2013
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
SA Chaudhry, T Shon, F Al-Turjman, MH Alsharif
Computer Communications 153, 527-537, 2020
R-URC: RF4CE-based universal remote control framework using smartphone
B Koo, T Ahn, JS In, Y Park, T Shon
2010 International Conference on Computational Science and Its Applications …, 2010
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20