Sangwon Hyun
Sangwon Hyun
Verified email at
Cited by
Cited by
Seluge: Secure and dos-resistant code dissemination in wireless sensor networks
S Hyun, P Ning, A Liu, W Du
2008 International Conference on Information Processing in Sensor Networks …, 2008
Analysis of autoencoders for network intrusion detection
Y Song, S Hyun, YG Cheong
Sensors 21 (13), 4294, 2021
SENTINEL: A secure and efficient authentication framework for unmanned aerial vehicles
G Cho, J Cho, S Hyun, H Kim
Applied Sciences 10 (9), 3149, 2020
Interface to network security functions for cloud-based security services
S Hyun, J Kim, H Kim, J Jeong, S Hares, L Dunbar, A Farrel
IEEE Communications Magazine 56 (1), 171-178, 2018
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
J Choi, J Yu, S Hyun, H Kim
Digital Investigation 28, S50-S59, 2019
Ibcs: Intent-based cloud services for security applications
J Kim, E Kim, J Yang, J Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ...
IEEE Communications Magazine 58 (4), 45-51, 2020
Threat modeling and analysis of voice assistant applications
G Cho, J Choi, H Kim, S Hyun, J Ryoo
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
Machine learning based intrusion detection systems for class imbalanced datasets
YG Cheong, K Park, H Kim, J Kim, S Hyun
Journal of the Korea Institute of Information Security & Cryptology 27 (6 …, 2017
Method and apparatus of data authentication
SC Seo, EA Kim, TH Kim, MW Jang, SW Hyun
US Patent 9,473,307, 2016
Design and Analysis of Push Notification‐Based Malware on Android
S Hyun, J Cho, G Cho, H Kim
Security and Communication Networks 2018 (1), 8510256, 2018
Mitigating wireless jamming attacks via channel migration
S Hyun, P Ning, A Liu
2011 31st International Conference on Distributed Computing Systems …, 2011
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
J Choi, J Cho, H Kim, S Hyun
Applied Sciences 10 (6), 1962, 2020
Kerberoid: A practical android app decompilation system with multiple decompilers
H Jang, B Jin, S Hyun, H Kim
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices.
J Cho, G Cho, S Hyun, H Kim
J. Internet Serv. Inf. Secur. 7 (4), 35-44, 2017
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes
S Hyun, K Sun, P Ning
Computer Communications 104, 191-203, 2017
Method of authenticating and verifying data packet transmission, and apparatuses for performing the same
SW Hyun, EA Kim, SC Seo, MW Jang
US Patent App. 14/470,051, 2015
An efficient code dissemination mechanism for building automation and industrial control networks
S Hyun, M Kim
Proceedings of the 5th International Conference on Ubiquitous Information …, 2011
Mutexion: Mutually exclusive compression system for mitigating compression side-channel attacks
T Moon, H Kim, S Hyun
ACM Transactions on the Web 16 (4), 1-20, 2022
Secure Code Dissemination in Wireless Sensor Networks.
S Hyun, P Ning
Encyclopedia of Cryptography and Security (2nd Ed.), 1099-1102, 2011
A systematic approach to building autoencoders for intrusion detection
Y Song, S Hyun, YG Cheong
Silicon Valley Cybersecurity Conference, 188-204, 2020
The system can't perform the operation now. Try again later.
Articles 1–20