Follow
Seonghyeon Gong
Title
Cited by
Cited by
Year
Blockchain-based secure device management framework for an internet of things network in a smart city
S Gong, E Tcydenova, J Jo, Y Lee, JH Park
Sustainability 11 (14), 3889, 2019
482019
A reliability comparison method for OSINT validity analysis
S Gong, J Cho, C Lee
IEEE Transactions on Industrial Informatics 14 (12), 5428-5435, 2018
362018
Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance
S Gong, C Lee
Electronics 9 (3), 521, 2020
352020
Cyber threat intelligence framework for incident response in an energy cloud platform
S Gong, C Lee
Electronics 10 (3), 239, 2021
272021
Secure secondary authentication framework for efficient mutual authentication on a 5G data network
S Gong, A El Azzaoui, J Cha, JH Park
Applied Sciences 10 (2), 727, 2020
132020
Met hod of hijacking a user account using a password manager vulnerability
GH Nam, BJ Seok, SH Gong, Y Kim, CH Lee
Journal of Di gital Forensics 12 (1), 1-4, 2018
52018
안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구
남기훈, 공성현, 석병진, 이창훈
정보보호학회논문지 28 (1), 111-122, 2018
5*2018
A Study on High-Speed Outlier Detection Method of Network Abnormal Behavior Data Using Heterogeneous Multiple Classifiers
J Cho, S Gong, K Choi
Applied Sciences 12 (3), 1011, 2022
22022
Efficient Data Noise-Reduction for Cyber Threat Intelligence System
S Gong, C Lee
Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019, 591-597, 2021
12021
Dynamic Data Abstraction-Based Anomaly Detection for Industrial Control Systems
J Cho, S Gong
Electronics 13 (1), 158, 2023
2023
DDoS Security Considerations When proposing a protocol for CoAP
S Jo, S Gong, B Seok, C Lee
Proceedings of the Korea Information Processing Society Conference, 204-207, 2019
2019
패스워드 매니저 취약점을 이용한 사용자 계정 탈취 방법
남기훈, 석병진, 공성현, 김역, 이창훈
디지털포렌식연구 12 (1), 9-18, 2018
2018
A Study on Dataset Construction Technique for Intrusion Detection based on Pattern Recognition
SH Gong, MJ Cho, J Cho, C Lee
Proceedings of the Korea Information Processing Society Conference, 343-345, 2017
2017
인증 암호화 기술 분석
SH Gong, CH Lee
Communications of the Korean Institute of Information Scientists and …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–14