Follow
Jeong-Han Yun
Jeong-Han Yun
The Affiliated Institute of ETRI
Verified email at nsr.re.kr
Title
Cited by
Cited by
Year
Whitelist-based network switch
KIM Heemin, YUN Jeong-Han, KH Kim, W Kim, SEO Jungtaek
US Patent 9,369,434, 2016
1172016
{HAI} 1.0:{HIL-based} Augmented {ICS} Security Dataset
HK Shin, W Lee, JH Yun, HC Kim
13Th USENIX workshop on cyber security experimentation and test (CSET 20), 2020
692020
Anomaly detection for industrial control systems using sequence-to-sequence neural networks
J Kim, JH Yun, HC Kim
Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020
672020
A comparison of ICS datasets for security research based on attack paths
S Choi, JH Yun, SK Kim
Critical Information Infrastructures Security: 13th International Conference …, 2019
472019
Time-series aware precision and recall for anomaly detection: considering variety of detection result and addressing ambiguous labeling
WS Hwang, JH Yun, J Kim, HC Kim
Proceedings of the 28th ACM International Conference on Information and …, 2019
432019
Burst-based anomaly detection on the DNP3 protocol
JH Yun, SH Jeon, KH Kim, WN Kim
International Journal of Control and Automation 6 (2), 313-324, 2013
352013
Probabilistic attack sequence generation and execution based on mitre att&ck for ics datasets
S Choi, JH Yun, BG Min
Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 41-48, 2021
302021
Implementation of Programmable CPS Testbed for Anomaly Detection
HK Shin, W Lee, JH Yun, HC Kim
12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019
302019
Whitelist-based anomaly detection for industrial control system security
H Yoo, JH Yun, T Shon
The Journal of Korean Institute of Communications and Information Sciences …, 2013
272013
CNN-based anomaly detection for packet payloads of industrial control system
JY Song, R Paul, JH Yun, HC Kim, YJ Choi
International Journal of Sensor Networks 36 (1), 36-49, 2021
222021
Expansion of {ICS} testbed for security validation based on {MITRE}{ATT&CK} techniques
S Choi, J Choi, JH Yun, BG Min, HC Kim
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
212020
Two ICS security datasets and anomaly detection contest on the HIL-based augmented ICS testbed
HK Shin, W Lee, JH Yun, BG Min
Proceedings of the 14th Cyber Security Experimentation and Test Workshop, 36-40, 2021
202021
Statistical similarity of critical infrastructure network traffic based on nearest neighbor distances
JH Yun, Y Hwang, W Lee, HK Ahn, SK Kim
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
172018
Physical one-way data transfer system design for control system network
KH Kim, Y Chang, H Kim, J Yun, W Kim
Journal of KISS, Information networking 40 (2), 126-130, 2013
132013
Do you know existing accuracy metrics overrate time-series anomaly detections?
WS Hwang, JH Yun, J Kim, BG Min
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, 403-412, 2022
102022
Traffic-locality-based creation of flow whitelists for SCADA networks
S Choi, Y Chang, JH Yun, W Kim
Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015
102015
One step more: automatic ICS protocol field analysis
Y Chang, S Choi, JH Yun, SK Kim
Critical Information Infrastructures Security: 12th International Conference …, 2018
92018
Passive fingerprinting of scada in critical infrastructure network without deep packet inspection
S Jeon, JH Yun, S Choi, WN Kim
arXiv preprint arXiv:1608.07679, 2016
92016
Refining schizophrenia via graph reachability in esterel
JH Yun, CJ Kim, S Seo, T Han, KM Choe
2009 7th IEEE/ACM International Conference on Formal Methods and Models for …, 2009
92009
Vendor-independent monitoring on programmable logic controller status for ICS security log management
J Choi, HK Kim, S Choi, JH Yun, BG Min, HC Kim
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–20