Jeong-Han Yun
According to our database1,
Jeong-Han Yun
authored at least 36 papers
between 2006 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
Residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
2021
Int. J. Sens. Networks, 2021
Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
2020
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020
Co-occurrence Based Security Event Analysis and Visualization for Cyber Physical Systems.
Proceedings of the HCI International 2020 - Posters - 22nd International Conference, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
Layered Information Structure for Hierarchical Security Management of Critical Infrastructure Using Network Security Appliances.
Proceedings of the HCI International 2019 - Posters - 21st International Conference, 2019
Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Generating Abnormal Industrial Control Network Traffic for Intrusion Detection System Testing.
Proceedings of the Critical Infrastructure Protection XII, 2018
Proceedings of the Critical Information Infrastructures Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the Human Interface and the Management of Information: Information, Knowledge and Interaction Design, 2017
Proceedings of the Critical Information Infrastructures Security, 2017
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017
2016
Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection.
CoRR, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
2015
Proceedings of the Critical Infrastructure Protection IX, 2015
2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Critical Information Infrastructures Security, 2014
2013
ACM Trans. Embed. Comput. Syst., 2013
2010
IEICE Trans. Inf. Syst., 2010
2009
Proceedings of the 7th ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2009), 2009
2006
J. Inf. Process. Syst., 2006
Automatic Generation of Hardware/Software Interface with Product-Specific Debugging Tools.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006