Taeshik Shon

Orcid: 0000-0003-1177-6405

According to our database1, Taeshik Shon authored at least 149 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards a practical usage for the Sleuth Kit supporting file system add-ons.
Forensic Sci. Int. Digit. Investig., 2024

2023
Digital forensic approaches for metaverse ecosystems.
Forensic Sci. Int. Digit. Investig., October, 2023

Digital forensic analysis of intelligent and smart IoT devices.
J. Supercomput., 2023

2022
Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing.
J. Supercomput., 2022

AI-enabled device digital forensics for smart cities.
J. Supercomput., 2022

Digital Forensic Case Studies for In-Vehicle Infotainment Systems Using Android Auto and Apple CarPlay.
Sensors, 2022

Digital Forensic Analysis to Improve User Privacy on Android.
Sensors, 2022

Automatic whitelist generation system for ethernet based in-vehicle network.
Comput. Ind., 2022

2021
Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems.
IEEE Access, 2021

Data Deletion and Recovery of Androd Plaforms.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

Security Analysis of Smart Watch and Band Devices.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Smart seed selection-based effective black box fuzzing for IIoT protocol.
J. Supercomput., 2020

ExtSFR: scalable file recovery framework based on an Ext file system.
Multim. Tools Appl., 2020

Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance.
Multim. Tools Appl., 2020

Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem.
Digit. Investig., 2020

Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems.
Comput. Commun., 2020

APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE.
Appl. Soft Comput., 2020

IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System.
IEEE Access, 2020

2019
Visualization for internet of things: power system and financial network cases.
Multim. Tools Appl., 2019

Digital Forensic Practices and Methodologies for AI Speaker Ecosystems.
Digit. Investig., 2019

An improved anonymous authentication scheme for distributed mobile cloud computing services.
Clust. Comput., 2019

RNN-based Anomaly Detection in DNP3 Transport Layer.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Design and implementation of cybersecurity testbed for industrial IoT systems.
J. Supercomput., 2018

Field classification-based novel fuzzing case generation for ICS protocols.
J. Supercomput., 2018

Digital forensic science approach by file recovery research.
J. Supercomput., 2018

An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
J. Supercomput., 2018

Toward Security Enhanced Provisioning in Industrial IoT Systems.
Sensors, 2018

Game theory-based Security Vulnerability Quantification for Social Internet of Things.
Future Gener. Comput. Syst., 2018

A Novel Security Framework for Industrial IoT Based on ISA 100.11a.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2018

2017
Design and Implementation of Fuzzing Framework Based on IoT Applications.
Wirel. Pers. Commun., 2017

Two Tier Search Scheme Using Micro UAV Swarm.
Wirel. Pers. Commun., 2017

A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2017

Recovery Measure against Disabling Reassembly Attack to DNP3 Communication.
IEICE Trans. Inf. Syst., 2017

A privacy preserving authentication scheme for roaming in ubiquitous networks.
Clust. Comput., 2017

2016
Neighbor stability-based VANET clustering for urban vehicular environments.
J. Supercomput., 2016

Exploring an area by groups of UAVs in the presence of a refueling base.
J. Supercomput., 2016

A novel security architecture of electronic vehicle system for smart grid communication.
J. Supercomput., 2016

Unified Medium Access Control Architecture for Resource-Constrained Machine-to-Machine Devices.
ACM Trans. Embed. Comput. Syst., 2016

Data Aggregation Gateway Framework for CoAP Group Communications.
Symmetry, 2016

Data investigation based on XFS file system metadata.
Multim. Tools Appl., 2016

Network protocol fuzz testing for information systems and applications: a survey and taxonomy.
Multim. Tools Appl., 2016

User privacy-enhanced security architecture for home area network of Smartgrid.
Multim. Tools Appl., 2016

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2016

Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture.
Future Gener. Comput. Syst., 2016

A lightweight message authentication scheme for Smart Grid communications in power sector.
Comput. Electr. Eng., 2016

A Hybrid EV Authentication Approach in Smart Grid Based Distributed Network.
Ad Hoc Sens. Wirel. Networks, 2016

Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Inferring State Machine Using Hybrid Teacher.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Packet Diversity-Based Anomaly Detection System with OCSVM and Representative Model.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Case Studies for Analyzing DLMS/COSEM-Based Smart Meter Vulnerabilities in Korea.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

2015
A study on memory dump analysis based on digital forensic tools.
Peer-to-Peer Netw. Appl., 2015

Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850.
Multim. Tools Appl., 2015

Multi-hop-based opportunistic concurrent directional transmission in 60 GHz WPANs.
Multim. Tools Appl., 2015

An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration.
Multim. Tools Appl., 2015

Authentication of mobile applications through various local distributors.
Multim. Tools Appl., 2015

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Syst., 2015

Security and privacy information technologies and applications for wireless pervasive computing environments.
Inf. Sci., 2015

A hybrid service discovery approach to mitigate overhead concentration on resource directory.
Proceedings of the 2015 International Conference on Information Networking, 2015

Improving packet header compression with adaptive sliding window size.
Proceedings of the 2015 International Conference on Information Networking, 2015

Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

A Phase of Deleted File Recovery for Digital Forensics Research in Tizen.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2014
Secure and reliable electronic record management system using digital forensic technologies.
J. Supercomput., 2014

Improved deleted file recovery technique for Ext2/3 filesystem.
J. Supercomput., 2014

A novel approach to detection of mobile rogue access points.
Secur. Commun. Networks, 2014

Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks.
Secur. Commun. Networks, 2014

An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment.
Peer-to-Peer Netw. Appl., 2014

Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction.
Mob. Networks Appl., 2014

Physical Memory Collection and Analysis in Smart Grid Embedded System.
Mob. Networks Appl., 2014

High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions.
Int. J. Distributed Sens. Networks, 2014

An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles.
Int. J. Distributed Sens. Networks, 2014

Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

Scenario-Based Attack Route on Industrial Control System.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

2013
Editorial of special section on advanced in high performance, algorithm, and framework for future computing.
J. Supercomput., 2013

A novel approach to visualize web anomaly attacks in pervasive computing environment.
J. Supercomput., 2013

Asynchronous inter-network interference avoidance for wireless body area networks.
J. Supercomput., 2013

Information delivery scheme of micro UAVs having limited communication range during tracking the moving target.
J. Supercomput., 2013

Dynamic learning model update of hybrid-classifiers for intrusion detection.
J. Supercomput., 2013

Design and implementation of a wireless sensor network architecture using smart mobile devices.
Telecommun. Syst., 2013

A security model for IPTV with one-time password and Conditional Access System for smart mobile platform.
Telecommun. Syst., 2013

A novel secure key paring protocol for RF4CE ubiquitous smart home systems.
Pers. Ubiquitous Comput., 2013

Editorial for Special Issue on "New Technologies and Applications for Wireless Communications & Mobile Cloud Computing".
Mob. Networks Appl., 2013

A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
Mob. Networks Appl., 2013

Adaptive anomaly control for alleviating the exclusive channel occupation in wireless networks.
Int. J. Commun. Syst., 2013

Two-factor authentication system based on extended OTP mechanism.
Int. J. Comput. Math., 2013

A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems.
IEICE Trans. Inf. Syst., 2013

Integrated multicast routing algorithms considering traffic engineering for broadband IPTV services.
EURASIP J. Wirel. Commun. Netw., 2013

Joint routing and scheduling in multi-channel capillary machine-to-machine networks.
EURASIP J. Wirel. Commun. Netw., 2013

Special Issue on Advanced Information Security for Secure and Trust Computing.
Comput. Math. Appl., 2013

Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing.
Comput. Electr. Eng., 2013

Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing.
Comput. Electr. Eng., 2013

Stable pairwise time synchronization in the application layer for capillary machine-to-machine networks.
Comput. Electr. Eng., 2013

Security Architecture Model for Smart Grid Communication Systems.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device.
Secur. Commun. Networks, 2012

Special issue on next generation communication and network security.
Secur. Commun. Networks, 2012

Guest editorial: Theme issue on smartphone applications and services for pervasive computing.
Pers. Ubiquitous Comput., 2012

Secure and efficient public key management in next generation mobile networks.
Pers. Ubiquitous Comput., 2012

A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Math. Comput. Model., 2012

Latency bounded and energy efficient MAC for wireless sensor networks.
IET Commun., 2012

An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Trans. Inf. Syst., 2012

Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

2011
Editorial: Special Issue on "Advanced Technologies and Practices in Recent Wireless Sensor Networks".
Wirel. Pers. Commun., 2011

An efficient and scalable re-authentication protocol over wireless sensor network.
IEEE Trans. Consumer Electron., 2011

Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks.
Sensors, 2011

Providing security vertical handoff in SARAH for heterogeneous networks.
J. Netw. Comput. Appl., 2011

A novel low-power RF4CE-based communication framework for multimedia system control.
Int. J. Commun. Syst., 2011

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011

Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Commun., 2011

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment.
IEICE Trans. Commun., 2011

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security.
IEICE Trans. Commun., 2011

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies.
IEICE Trans. Inf. Syst., 2011

A Secure and Robust Connectivity Architecture for Smart Devices and Applications.
EURASIP J. Wirel. Commun. Netw., 2011

A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wirel. Commun. Netw., 2011

An Approach for Efficient Hybrid Reliable Transport in IEEE 802.15.4-based Wireless Sensor Network.
Ad Hoc Sens. Wirel. Networks, 2011

A Network Data Abstraction Method for Data Set Verification.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2010
Efficient mobile sensor authentication in smart home and WPAN.
IEEE Trans. Consumer Electron., 2010

Untraceable Mobile Node Authentication in WSN.
Sensors, 2010

Design and Implementation of Hybrid MAC-Based Robust Architecture for Wireless Sensor Network.
IEICE Trans. Commun., 2010

Implementation of a WSN-Based Structural Health Monitoring Architecture Using 3D and AR Mode.
IEICE Trans. Commun., 2010

Novel Approaches to Enhance Mobile WiMAX Security.
EURASIP J. Wirel. Commun. Netw., 2010

Design of secure key agreement protocol for pairing in RF4CE.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

R-URC: RF4CE-Based Universal Remote Control Framework Using Smartphone.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home.
Proceedings of the CISIS 2010, 2010

Efficient sensor node authentication via 3GPP mobile communication networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks.
Proceedings of the NBiS 2009, 2009

WIVA: WSN Monitoring Framework Based on 3D Visualization and Augmented Reality in Mobile Devices.
Proceedings of the Ambient Assistive Health and Wellness Management in the Heart of the City, 2009

2008
Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

2007
A hybrid machine learning approach to network anomaly detection.
Inf. Sci., 2007

Designing a Novel Unlicensed Nomadic Access Relay Station in IEEE 802.16-Based Wireless Access Networks.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

2006
Applying genetic algorithm for classifying anomalous TCP/IP packets.
Neurocomputing, 2006

Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

SVM Approach with a Genetic Algorithm for Network Intrusion Detection.
Proceedings of the Computer and Information Sciences, 2005

SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A New DDoS Detection Model Using Multiple SVMs and TRA.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

PPF Model with CTNT to Defend Web Server from DDoS Attack.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A New Approach to Detect DDoS Attacks using Support Vector Machine.
Proceedings of the New Trends in Computer Networks, 2005

2004
Patch Management System for Multi-platform Environment.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing.
Proceedings of the Computer and Information Sciences, 2004

Effciency Evaluation for Key Distribution Models in Satellite Terminals.
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004

Simple Key Agreement and Its Efficiency Analysis for Grid Computing Environments.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Support Vector Machine Based ICMP Covert Channel Attack Detection.
Proceedings of the Computer Network Security, 2003

Covert Channel Detection in the ICMP Payload Using Support Vector Machine.
Proceedings of the Computer and Information Sciences, 2003

A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003


  Loading...