Follow
Yeop Chang
Yeop Chang
NSR
Verified email at nsr.re.kr
Title
Cited by
Cited by
Year
ASADAL: a tool system for co-development of software and test environment based on product line engineering
K Kim, H Kim, M Ahn, M Seo, Y Chang, KC Kang
Proceedings of the 28th international conference on Software engineering …, 2006
352006
Physical one-way data transfer system design for control system network
KH Kim, Y Chang, H Kim, JH Yun, W Kim
Journal of KISS, Information networking 40 (2), 126-130, 2013
132013
Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks
S Choi, Y Chang, JH Yun, W Kim
International Conference on Critical Infrastructure Protection, 87-102, 2015
102015
One Step More: Automatic ICS Protocol Field Analysis
Y Chang, S Choi, JH Yun, SK Kim
International Conference on Critical Information Infrastructures Security …, 2017
92017
System and method for unidirectional data transmission
JM Baek, MS Choi, CH Kim, Y Chang, BG Min, WN Kim, MS Jang, JH Yun
US Patent 9,397,790, 2016
82016
제어망 특성을 반영한 물리적 일방향 자료전달 시스템 설계
김경호, 장엽, 김희민, 윤정한, 김우년
정보과학회논문지: 정보통신 40 (2), 126-130, 2013
82013
Security Validation for Data Diode with Reverse Channel
JH Yun, Y Chang, KH Kim, W Kim
International Conference on Critical Information Infrastructures Security …, 2016
62016
Reply-type based agent generation of legacy service on one-way data transfer system
KH Kim, Y Chang, HM Kim, JH Yun, WN Kim
Journal of the Korea Institute of Information Security & Cryptology 23 (2 …, 2013
52013
Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network
KH Kim, JH Yun, Y Chang, W Kim
International Workshop on Information Security Applications, 358-369, 2014
22014
Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System
S Choi, Y Chang, JH Yun, W Kim
International Workshop on Information Security Applications, 345-357, 2014
22014
일방향 자료전달 시스템의 레거시 서비스 지원을 위한 응답구조 기반 에이전트 자동 생성
김경호, 장엽, 김희민, 윤정한, 김우년
정보보호학회논문지 23 (2), 299-305, 2013
22013
Impact Analysis of PLC Performance When Applying Cyber Security Solutions Using Active Information Gathering
Y Chang, T Kim, W Kim
International Conference on Critical Information Infrastructures Security …, 2021
12021
PLC 로그의 사고조사 활용 가능성에 관한 연구
장엽, 김태연, 김우년
정보보호학회논문지 30 (4), 745-756, 2020
2020
Impact Analysis of Unauthorized Client Connection Vulnerability on IEC 61850
MS Jang, J Yun, Y Chang, B Min, W Kim
International Information Institute (Tokyo). Information 16 (8), 5603, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–14