Byung-Gil Min

According to our database1, Byung-Gil Min authored at least 12 papers between 2019 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Dataflow-based Control Process Identification for ICS Dataset Development.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

Residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

"Do you know existing accuracy metrics overrate time-series anomaly detections?".
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

2020
Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020

POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Marine radionuclide transport modelling: Recent developments, problems and challenges.
Environ. Model. Softw., 2019

Data-Driven Field Mapping of Security Logs for Integrated Monitoring.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances.
Proceedings of the HCI International 2019 - Posters - 21st International Conference, 2019

Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019


  Loading...