Jeong-Han Yun
Jeong-Han Yun
The Affiliated Institute of ETRI
Verified email at
Cited by
Cited by
Whitelist-based network switch
KIM Heemin, YUN Jeong-Han, K Kim, W Kim, SEO Jungtaek
US Patent 9,369,434, 2016
Burst-based anomaly detection on the DNP3 protocol
JH Yun, SH Jeon, KH Kim, WN Kim
International Journal of Control and Automation 6 (2), 313-324, 2013
Whitelist-based anomaly detection for industrial control system security
H Yoo, JH Yun, T Shon
The Journal of Korean Institute of Communications and Information Sciences …, 2013
Anomaly detection for industrial control systems using sequence-to-sequence neural networks
J Kim, JH Yun, HC Kim
Computer Security, 3-18, 2019
Physical one-way data transfer system design for control system network
KH Kim, Y Chang, H Kim, J Yun, W Kim
Journal of KISS, Information networking 40 (2), 126-130, 2013
A comparison of ICS datasets for security research based on attack paths
S Choi, JH Yun, SK Kim
International Conference on Critical Information Infrastructures Security …, 2018
Implementation of Programmable CPS Testbed for Anomaly Detection
HK Shin, W Lee, JH Yun, HC Kim
12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019
Refining schizophrenia via graph reachability in Esterel
JH Yun, CJ Kim, S Seo, T Han, KM Choe
2009 7th IEEE/ACM International Conference on Formal Methods and Models for …, 2009
Statistical similarity of critical infrastructure network traffic based on nearest neighbor distances
JH Yun, Y Hwang, W Lee, HK Ahn, SK Kim
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
A burst-based whitelist model for dnp3 communication in the scada system
JH Yun, SH Jeon, KH Kim, W Kim
The 7th International Conference on Information Security and Assurance (ISA …, 2013
Method for transmitting and receiving fake communication data and terminal performing the same
S Jeon, YUN Jeong-Han, W Kim, SEO Jungtaek, EK Park
US Patent 9,338,646, 2016
Traffic-locality-based creation of flow whitelists for SCADA networks
S Choi, Y Chang, JH Yun, W Kim
International Conference on Critical Infrastructure Protection, 87-102, 2015
{HAI} 1.0: HIL-based Augmented {ICS} Security Dataset
HK Shin, W Lee, JH Yun, HC Kim
13th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 20), 2020
Apparatus and method for protecting communication pattern of network traffic
S Jeon, YUN Jeong-Han, W Kim, SEO Jungtaek, CS Kim
US Patent 9,356,958, 2016
Reply-type based agent generation of legacy service on one-way data transfer system
KH Kim, Y Chang, HM Kim, JH Yun, WN Kim
Journal of the Korea Institute of Information Security & Cryptology 23 (2 …, 2013
Automatic Hardware/Software Interface Generation for Embedded System.
C Son, JH Yun, HG Kang, T Han
JIPS 2 (3), 137-142, 2006
Passive fingerprinting of scada in critical infrastructure network without deep packet inspection
S Jeon, JH Yun, S Choi, WN Kim
arXiv preprint arXiv:1608.07679, 2016
System and method for unidirectional data transmission
JM Baek, MS Choi, CH Kim, Y Chang, BG Min, WN Kim, MS Jang, JH Yun
US Patent 9,397,790, 2016
Over-approximated control flow graph construction on pure esterel
CJ Kim, JH Yun, S Kim, KM Choe, T Han
IEICE TRANSACTIONS on Information and Systems 93 (5), 985-993, 2010
Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling
WS Hwang, JH Yun, J Kim, HC Kim
Proceedings of the 28th ACM International Conference on Information and …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20