APAD: Autoencoder-based payload anomaly detection for industrial IoE SJ Kim, WY Jo, T Shon Applied Soft Computing 88, 106017, 2020 | 80 | 2020 |
Packet preprocessing in CNN-based network intrusion detection system W Jo, S Kim, C Lee, T Shon Electronics 9 (7), 1151, 2020 | 56 | 2020 |
Digital forensic practices and methodologies for AI speaker ecosystems W Jo, Y Shin, H Kim, D Yoo, D Kim, C Kang, J Jin, J Oh, B Na, T Shon Digital Investigation 29, S80-S93, 2019 | 50 | 2019 |
Certificate injection-based encrypted traffic forensics in AI speaker ecosystem Y Shin, H Kim, S Kim, D Yoo, W Jo, T Shon Forensic Science International: Digital Investigation 33, 301010, 2020 | 21 | 2020 |
ExtSFR: scalable file recovery framework based on an Ext file system S Lee, W Jo, S Eo, T Shon Multimedia Tools and Applications 79 (23), 16093-16111, 2020 | 19 | 2020 |
AI-enabled device digital forensics for smart cities S Kim, W Jo, J Lee, T Shon The Journal of Supercomputing, 1-16, 2022 | 18 | 2022 |
A novel vulnerability analysis approach to generate fuzzing test case in industrial control systems SJ Kim, WY Jo, T Shon 2016 IEEE Information Technology, Networking, Electronic and Automation …, 2016 | 18 | 2016 |
Digital forensic analysis of intelligent and smart IoT devices M Kim, Y Shin, W Jo, T Shon The Journal of Supercomputing 79 (1), 973-997, 2023 | 15 | 2023 |
Digital forensic case studies for in-vehicle infotainment systems using Android Auto and Apple CarPlay Y Shin, S Kim, W Jo, T Shon Sensors 22 (19), 7196, 2022 | 11 | 2022 |
Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems H Kim, S Kim, W Jo, KH Kim, T Shon IEEE Access 9, 75542-75552, 2021 | 10 | 2021 |
Gadgets of gadgets in industrial control systems: Return oriented programming attacks on PLCs A Ayub, N Zubair, H Yoo, W Jo, I Ahmed 2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023 | 9 | 2023 |
Visualization for internet of things: power system and financial network cases M Kim, W Jo, J Kim, T Shon Multimedia Tools and Applications 78 (3), 3241-3265, 2019 | 9 | 2019 |
A phase of deleted file recovery for digital forensics research in Tizen S Eo, W Jo, S Lee, T Shon 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-3, 2015 | 9 | 2015 |
Automatic whitelist generation system for ethernet based in-vehicle network W Jo, SJ Kim, H Kim, Y Shin, T Shon Computers in Industry 142, 103735, 2022 | 8 | 2022 |
Digital forensic approach for file recovery in Unix systems: Research of data recovery on Unix file system WY Jo, H Chang, T Shon 2016 IEEE Information Technology, Networking, Electronic and Automation …, 2016 | 7 | 2016 |
Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation S Eo, W Jo, S Lee, T Shon Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016 | 6 | 2016 |
Digital Forensic Analysis to Improve User Privacy on Android H Kim, Y Shin, S Kim, W Jo, M Kim, T Shon Sensors 22 (11), 3971, 2022 | 5 | 2022 |
Ext4 and XFS file system forensic framework based on TSK H Kim, S Kim, Y Shin, W Jo, S Lee, T Shon Electronics 10 (18), 2310, 2021 | 5 | 2021 |
Digital forensic science approach by file recovery research WY Jo, H Chang, T Shon The Journal of Supercomputing 74, 3704-3725, 2018 | 5 | 2018 |
A novel security framework for industrial iot based on isa 100.11 a H Kim, S Kim, S Kwon, W Jo, T Shon Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th …, 2019 | 4 | 2019 |