발행물

전체 논문

104

1

Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment
Kim, Kwangsoo, Kang, Jaesik, Lee, Seungwoon, Seo, Jung Taek, Jeon, Seungho, Kim, Donghyun
JOURNAL OF SUPERCOMPUTING, 202410

2

A threat modeling framework for IoT-Based botnet attacks
Seo, Jung Taek, Jeon, Seungho, Jin, Hojun, Jeon, GyuHyun, Aneka Choi, Hee Won
Heliyon, 202410

3

Mutation-Based Multivariate Time-Series Anomaly Generation on Latent Space with an Attention-Based Variational Recurrent Neural Network for Robust Anomaly Detection in an Industrial Control System
Koo, Kijong, Moon, Daesung, Seo, Jung Taek, Jeon, Seungho
APPLIED SCIENCES-BASEL, 202409

4

Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence
Seo, Jung Taek, Jeon, Seungho, Ji, Il Hwan, Lee, Ju Hyeon
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 202409

5

IWTW: A Framework for IoWT Cyber Threat Analysis
Seo, Jung Taek, Jeon, Seungho, Jeon, GyuHyun, Jin, Hojun, Lee, Ju Hyeon
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 202409

6

Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review
Seo, Jung Taek, Jeon, Seung Ho, Ji, Il Hwan, Lee, Ju Hyeon, Kang, Min Ji, Park, Woo Jin
SENSORS, 202402

7

AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0
Seo, Jung Taek, Jeon, Seungho, Ji, Ilhwan
INFORMATION SECURITY APPLICATIONS, WISA 2023, 202401

8

OCR Meets the DarkWeb: Identifying the Content Type Regarding Illegal and Cybercrime
Shin, Jiho, Seo, Jung Taek, Jeon, Seungho, Kim, Donghyun
INFORMATION SECURITY APPLICATIONS, WISA 2023, 202401

9

SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis
Seo, Jung Taek, Jeon, Seungho
INFORMATION SECURITY APPLICATIONS, WISA 2023, 202401

10

A Synthetic Time-Series Generation Using a Variational Recurrent Autoencoder with an Attention Mechanism in an Industrial Control System
Seo, Jung Taek, Jeon, Seungho
SENSORS, 202401