Taeshik Shon
Orcid: 0000-0003-1177-6405
According to our database1,
Taeshik Shon
authored at least 149 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on ajou.ac.kr
On csauthors.net:
Bibliography
2024
Forensic Sci. Int. Digit. Investig., 2024
2023
Forensic Sci. Int. Digit. Investig., October, 2023
J. Supercomput., 2023
2022
Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturing.
J. Supercomput., 2022
Digital Forensic Case Studies for In-Vehicle Infotainment Systems Using Android Auto and Apple CarPlay.
Sensors, 2022
Comput. Ind., 2022
2021
Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems.
IEEE Access, 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
2020
J. Supercomput., 2020
Multim. Tools Appl., 2020
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance.
Multim. Tools Appl., 2020
Digit. Investig., 2020
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems.
Comput. Commun., 2020
Appl. Soft Comput., 2020
IEEE 1815.1-Based Power System Security With Bidirectional RNN-Based Network Anomalous Attack Detection for Cyber-Physical System.
IEEE Access, 2020
2019
Multim. Tools Appl., 2019
Digit. Investig., 2019
An improved anonymous authentication scheme for distributed mobile cloud computing services.
Clust. Comput., 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
J. Supercomput., 2018
J. Supercomput., 2018
An improved and robust biometrics-based three factor authentication scheme for multiserver environments.
J. Supercomput., 2018
Game theory-based Security Vulnerability Quantification for Social Internet of Things.
Future Gener. Comput. Syst., 2018
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2018
2017
Wirel. Pers. Commun., 2017
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2017
IEICE Trans. Inf. Syst., 2017
Clust. Comput., 2017
2016
J. Supercomput., 2016
J. Supercomput., 2016
A novel security architecture of electronic vehicle system for smart grid communication.
J. Supercomput., 2016
Unified Medium Access Control Architecture for Resource-Constrained Machine-to-Machine Devices.
ACM Trans. Embed. Comput. Syst., 2016
Network protocol fuzz testing for information systems and applications: a survey and taxonomy.
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
J. Medical Syst., 2016
Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture.
Future Gener. Comput. Syst., 2016
A lightweight message authentication scheme for Smart Grid communications in power sector.
Comput. Electr. Eng., 2016
Ad Hoc Sens. Wirel. Networks, 2016
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
2015
Peer-to-Peer Netw. Appl., 2015
Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850.
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration.
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems.
J. Medical Syst., 2015
Security and privacy information technologies and applications for wireless pervasive computing environments.
Inf. Sci., 2015
A hybrid service discovery approach to mitigate overhead concentration on resource directory.
Proceedings of the 2015 International Conference on Information Networking, 2015
Proceedings of the 2015 International Conference on Information Networking, 2015
Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
2014
Secure and reliable electronic record management system using digital forensic technologies.
J. Supercomput., 2014
J. Supercomput., 2014
Secur. Commun. Networks, 2014
Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks.
Secur. Commun. Networks, 2014
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment.
Peer-to-Peer Netw. Appl., 2014
Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction.
Mob. Networks Appl., 2014
Mob. Networks Appl., 2014
High Performance and Low Power Hardware Implementation for Cryptographic Hash Functions.
Int. J. Distributed Sens. Networks, 2014
An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles.
Int. J. Distributed Sens. Networks, 2014
Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014
Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014
2013
Editorial of special section on advanced in high performance, algorithm, and framework for future computing.
J. Supercomput., 2013
A novel approach to visualize web anomaly attacks in pervasive computing environment.
J. Supercomput., 2013
J. Supercomput., 2013
Information delivery scheme of micro UAVs having limited communication range during tracking the moving target.
J. Supercomput., 2013
J. Supercomput., 2013
Design and implementation of a wireless sensor network architecture using smart mobile devices.
Telecommun. Syst., 2013
A security model for IPTV with one-time password and Conditional Access System for smart mobile platform.
Telecommun. Syst., 2013
Pers. Ubiquitous Comput., 2013
Editorial for Special Issue on "New Technologies and Applications for Wireless Communications & Mobile Cloud Computing".
Mob. Networks Appl., 2013
A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed.
Mob. Networks Appl., 2013
Adaptive anomaly control for alleviating the exclusive channel occupation in wireless networks.
Int. J. Commun. Syst., 2013
Int. J. Comput. Math., 2013
A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems.
IEICE Trans. Inf. Syst., 2013
Integrated multicast routing algorithms considering traffic engineering for broadband IPTV services.
EURASIP J. Wirel. Commun. Netw., 2013
EURASIP J. Wirel. Commun. Netw., 2013
Comput. Math. Appl., 2013
Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing.
Comput. Electr. Eng., 2013
Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing.
Comput. Electr. Eng., 2013
Stable pairwise time synchronization in the application layer for capillary machine-to-machine networks.
Comput. Electr. Eng., 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
2012
Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device.
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
Guest editorial: Theme issue on smartphone applications and services for pervasive computing.
Pers. Ubiquitous Comput., 2012
Pers. Ubiquitous Comput., 2012
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Math. Comput. Model., 2012
IET Commun., 2012
An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments.
IEICE Trans. Inf. Syst., 2012
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012
2011
Editorial: Special Issue on "Advanced Technologies and Practices in Recent Wireless Sensor Networks".
Wirel. Pers. Commun., 2011
IEEE Trans. Consumer Electron., 2011
Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks.
Sensors, 2011
J. Netw. Comput. Appl., 2011
Int. J. Commun. Syst., 2011
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Commun. Syst., 2011
Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Commun., 2011
Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment.
IEICE Trans. Commun., 2011
Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security.
IEICE Trans. Commun., 2011
IEICE Trans. Inf. Syst., 2011
EURASIP J. Wirel. Commun. Netw., 2011
A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wirel. Commun. Netw., 2011
An Approach for Efficient Hybrid Reliable Transport in IEEE 802.15.4-based Wireless Sensor Network.
Ad Hoc Sens. Wirel. Networks, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
A Suggestion for Cloud Environments New Layer Contemplating and Its Security Factors.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
2010
IEEE Trans. Consumer Electron., 2010
Design and Implementation of Hybrid MAC-Based Robust Architecture for Wireless Sensor Network.
IEICE Trans. Commun., 2010
Implementation of a WSN-Based Structural Health Monitoring Architecture Using 3D and AR Mode.
IEICE Trans. Commun., 2010
EURASIP J. Wirel. Commun. Netw., 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010
Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home.
Proceedings of the CISIS 2010, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009
Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks.
Proceedings of the NBiS 2009, 2009
WIVA: WSN Monitoring Framework Based on 3D Visualization and Augmented Reality in Mobile Devices.
Proceedings of the Ambient Assistive Health and Wellness Management in the Heart of the City, 2009
2008
Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
2007
Designing a Novel Unlicensed Nomadic Access Relay Station in IEEE 802.16-Based Wireless Access Networks.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007
Proceedings of the Network-Based Information Systems, First International Conference, 2007
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
2006
Neurocomputing, 2006
Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006
2005
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005
Proceedings of the Computer and Information Sciences, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the New Trends in Computer Networks, 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
An Approach for Spam E-mail Detection with Support Vector Machine and n-Gram Indexing.
Proceedings of the Computer and Information Sciences, 2004
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004
Proceedings of the Grid and Cooperative Computing, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer and Information Sciences, 2003
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Safe Patch Distribution Architecture in Intranet Environments.
Proceedings of the International Conference on Security and Management, 2003