Design and implementation of cybersecurity testbed for industrial IoT systems S Lee, S Lee, H Yoo, S Kwon, T Shon The Journal of Supercomputing 74 (9), 4506-4520, 2018 | 54 | 2018 |
Open source intelligence base cyber threat inspection framework for critical infrastructures S Lee, T Shon 2016 Future Technologies Conference (FTC), 1030-1033, 2016 | 45 | 2016 |
Game theory-based security vulnerability quantification for social internet of things S Lee, S Kim, K Choi, T Shon Future Generation Computer Systems 82, 752-760, 2018 | 42 | 2018 |
Study on analysis of security vulnerabilities and countermeasures in ISO/IEC 15118 based electric vehicle charging technology S Lee, Y Park, H Lim, T Shon 2014 International conference on IT convergence and security (ICITCS), 1-4, 2014 | 41 | 2014 |
User privacy-enhanced security architecture for home area network of Smartgrid S Lee, J Kim, T Shon Multimedia Tools and Applications 75 (20), 12749-12764, 2016 | 28 | 2016 |
Logical architecture of HAN-centric Smartgrid model S Lee, H Lim, W Go, H Park, T Shon 2015 International Conference on Platform Technology and Service, 41-42, 2015 | 3 | 2015 |
Cyber Security Framework for Critical Infrastructure S Kwon, S Lee, J Jang, T Shon Journal of The Korea Institute of information Security & Cryptology 27 (2 …, 2017 | 2 | 2017 |
디지털 포렌식 기반의 전자기록물 이관 절차 및 도구 개발에 관한 연구 이석철, 유형욱, 손태식 정보보호학회논문지 24 (3), 571-580, 2014 | 2 | 2014 |
Research on Development of Digital Forensics based Digital Records Migration Procedure and Tool S Lee, H Yoo, T Shon Journal of the Korea Institute of Information Security & Cryptology 24 (3 …, 2014 | 2 | 2014 |
Cloud Computing Security Trends S Lee, T Shon Proceedings of the Korea Information Processing Society Conference, 1111-1114, 2012 | 2 | 2012 |
Method and apparatus for generating one class model based on data frequency TS Shon, SJ Lee, SC Lee, HU Yoo US Patent App. 15/687,773, 2018 | 1 | 2018 |
기반시설 사이버보안 프레임워크 도출방안 권성문, 이석철, 장지웅, 손태식 정보보호학회논문지 27 (2), 241-250, 2017 | 1 | 2017 |
Integrated Security Framework for Industrial IoT-based Control System 이석철 아주대학교 일반대학원, 2018 | | 2018 |
Attack Tree 를 활용한 Game Theory 기반 보안 취약점 정량화 기법 이석철, 이상하, 손태식 정보보호학회논문지 27 (2), 259-266, 2017 | | 2017 |
Game Theory-Based Vulnerability Quantification Method Using Attack Tree S Lee, SH Lee, T Shon Journal of the Korea Institute of Information Security & Cryptology 27 (2 …, 2017 | | 2017 |
Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard HJ Kim, S Lee, SJ Kim, T Shon 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-4, 2015 | | 2015 |
HCI 기반 스마트그리드 제어시스템의 인증 기술 동향 이석철, 권성문, 김성진, 손태식 정보보호학회지 25 (3), 5-10, 2015 | | 2015 |