A hybrid machine learning approach to network anomaly detection T Shon, J Moon Information Sciences 177 (18), 3799-3821, 2007 | 562 | 2007 |
A lightweight message authentication scheme for smart grid communications in power sector K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad Computers & Electrical Engineering 52, 114-124, 2016 | 217 | 2016 |
A machine learning framework for network anomaly detection using SVM and GA T Shon, Y Kim, C Lee, J Moon Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005 | 212 | 2005 |
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions T Shon, W Choi The 1st International Conference on Network-Based Information Systems, 88-97, 2007 | 167 | 2007 |
A lightweight NEMO protocol to support 6LoWPAN JH Kim, CS Hong, T Shon ETRI journal 30 (5), 685-695, 2008 | 98 | 2008 |
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture H Yoo, T Shon Future generation computer systems 61, 128-136, 2016 | 91 | 2016 |
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems SA Chaudhry, T Shon, F Al-Turjman, MH Alsharif Computer Communications 153, 527-537, 2020 | 90 | 2020 |
APAD: Autoencoder-based payload anomaly detection for industrial IoE SJ Kim, WY Jo, T Shon Applied Soft Computing 88, 106017, 2020 | 80 | 2020 |
Novel approach for detecting network anomalies for substation automation based on IEC 61850 H Yoo, T Shon Multimedia Tools and Applications 74, 303-318, 2015 | 75 | 2015 |
An improved anonymous authentication scheme for distributed mobile cloud computing services SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon Cluster Computing 22, 1595-1609, 2019 | 72 | 2019 |
IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system S Kwon, H Yoo, T Shon IEEE Access 8, 77572-77586, 2020 | 60 | 2020 |
An improved and robust biometrics-based three factor authentication scheme for multiserver environments SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher The Journal of Supercomputing 74, 3504-3520, 2018 | 59 | 2018 |
Packet preprocessing in CNN-based network intrusion detection system W Jo, S Kim, C Lee, T Shon Electronics 9 (7), 1151, 2020 | 55 | 2020 |
Design and implementation of cybersecurity testbed for industrial IoT systems S Lee, S Lee, H Yoo, S Kwon, T Shon The Journal of Supercomputing 74, 4506-4520, 2018 | 54 | 2018 |
Toward advanced mobile cloud computing for the internet of things: Current issues and future direction T Shon, J Cho, K Han, H Choi Mobile Networks and Applications 19, 404-413, 2014 | 52 | 2014 |
Mobility header compression method and system for internet protocol-based low power wireless network TS Shon, SG Kim, HH Choi, JH Kim, CS Hong US Patent 8,213,403, 2012 | 52 | 2012 |
A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication K Han, CY Yeun, T Shon, J Park, K Kim International Journal of Communication Systems 24 (4), 461-472, 2011 | 51 | 2011 |
A multiserver biometric authentication scheme for tmis using elliptic curve cryptography SA Chaudhry, MT Khan, MK Khan, T Shon Journal of medical systems 40, 1-13, 2016 | 50 | 2016 |
Untraceable mobile node authentication in WSN K Han, K Kim, T Shon Sensors 10 (5), 4410-4429, 2010 | 50 | 2010 |
SVM approach with a genetic algorithm for network intrusion detection T Shon, J Seo, J Moon International Symposium on Computer and Information Sciences, 224-233, 2005 | 50 | 2005 |