Sangwon Hyun
Sangwon Hyun
Verified email at
Cited by
Cited by
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
S Hyun, P Ning, A Liu, W Du
2008 International Conference on Information Processing in Sensor Networks …, 2008
Network node and method of operating the network node
E Kim, S Seo, M Jang, S Hyun
US Patent 9,774,708, 2017
Interface to network security functions for cloud-based security services
S Hyun, J Kim, H Kim, J Jeong, S Hares, L Dunbar, A Farrel
IEEE Communications Magazine 56 (1), 171-178, 2018
Method and apparatus of data authentication
SC Seo, EA Kim, TH Kim, MW Jang, SW Hyun
US Patent 9,473,307, 2016
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
J Choi, J Yu, S Hyun, H Kim
Digital Investigation 28, S50-S59, 2019
Mitigating wireless jamming attacks via channel migration
S Hyun, P Ning, A Liu
2011 31st International Conference on Distributed Computing Systems …, 2011
SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
International Workshop on Information Security Applications, 197-209, 2018
Design and Analysis of Push Notification-Based Malware on Android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018, 2018
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes
S Hyun, K Sun, P Ning
Computer Communications 104, 191-203, 2017
An efficient code dissemination mechanism for building automation and industrial control networks
S Hyun, M Kim
Proceedings of the 5th International Conference on Ubiquitous Information …, 2011
Kerberoid: A practical android app decompilation system with multiple decompilers
H Jang, B Jin, S Hyun, H Kim
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J Cho, G Cho, S Hyun, H Kim
J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017
Secure Code Dissemination in Wireless Sensor Networks.
S Hyun, P Ning
Encyclopedia of Cryptography and Security (2nd Ed.), 1099-1102, 2011
Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 1962, 2020
클래스 불균형 데이터에 적합한 기계 학습 기반 침입 탐지 시스템
정윤경, 박기남, 김현주, 김종현, 현상원
정보보호학회논문지 27 (6), 1385-1395, 2017
Method of authenticating and verifying data packet transmission, and apparatuses for performing the same
SW Hyun, EA Kim, SC Seo, MW Jang
US Patent App. 14/470,051, 2015
Method and apparatus for content verification
SC Seo, EA Kim, TH Kim, MW Jang, SW Hyun
US Patent App. 14/276,261, 2015
IBCS: Intent-Based Cloud Services for Security Applications
JT Kim, E Kim, J Yang, JP Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ...
IEEE Communications Magazine 58 (4), 45-51, 2020
Secure and DoS-Resilient Fragment Authentication in CCN-Based Vehicular Networks
S Hyun, H Kim
Wireless Communications and Mobile Computing 2018, 12, 2018
The system can't perform the operation now. Try again later.
Articles 1–20