Sungmoon Kwon
Sungmoon Kwon
Korea Internet & Security Agency
Verified email at
Cited by
Cited by
IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system
S Kwon, H Yoo, T Shon
IEEE Access 8, 77572-77586, 2020
Design and implementation of cybersecurity testbed for industrial IoT systems
S Lee, S Lee, H Yoo, S Kwon, T Shon
The Journal of Supercomputing 74, 4506-4520, 2018
Towards 5G-based IoT security analysis against Vo5G eavesdropping
S Kwon, S Park, H Cho, Y Park, D Kim, K Yim
Computing 103, 425-447, 2021
Adversarial attack-based security vulnerability verification using deep learning library for multimedia video surveillance
JH Jeong, S Kwon, MP Hong, J Kwak, T Shon
Multimedia Tools and Applications 79, 16077-16091, 2020
5G security threat assessment in real networks
S Park, D Kim, Y Park, H Cho, D Kim, S Kwon
Sensors 21 (16), 5524, 2021
Session management for security systems in 5g standalone network
S Park, S Kwon, Y Park, D Kim, I You
IEEE Access 10, 73421-73436, 2022
RNN-based anomaly detection in DNP3 transport layer
S Kwon, H Yoo, T Shon
2019 IEEE international conference on communications, control, and computing …, 2019
Toward security enhanced provisioning in industrial IoT systems
S Kwon, J Jeong, T Shon
Sensors 18 (12), 4372, 2018
Cybersecurity framework for IIoT-based power system connected to microgrid
JW Jang, S Kwon, SJ Kim, J Seo, J Oh, K Lee
KSII Transactions on Internet and Information Systems (TIIS) 14 (5), 2221-2235, 2020
Digital forensic readiness for financial network
S Kwon, J Jeong, T Shon
2019 International conference on platform technology and service (PlatCon), 1-4, 2019
A novel security framework for industrial iot based on isa 100.11 a
H Kim, S Kim, S Kwon, W Jo, T Shon
Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th …, 2019
Recovery measure against disabling reassembly attack to DNP3 communication
S Kwon, H Yoo, T Shon
IEICE TRANSACTIONS on Information and Systems 100 (8), 1790-1797, 2017
제어시스템 DNP3 프로토콜 취약점과 보안 현황
S Kwon, T Shon
Review of KIISC 24 (1), 53-58, 2014
Security Threats Analysis and Security Requirement for Industrial Wireless Protocols: ISA 100.11 a and WirelessHART
JH Jeong, SM Kwon, TS Shon
Journal of the Korea Institute of Information Security & Cryptology 29 (5 …, 2019
Cyber Security Framework for Critical Infrastructure
S Kwon, S Lee, J Jang, T Shon
Journal of The Korea Institute of information Security & Cryptology 27 (2 …, 2017
Digital forensic consideration for financial IT security
K Park, S Kwon, S Kim, T Shon
2016 Future Technologies Conference (FTC), 1025-1029, 2016
Scenario-based attack route on industrial control system
SM Kwon, HU Yoo, T Shon, GW Lee
2014 International Conference on IT Convergence and Security (ICITCS), 1-3, 2014
DNP3 protocol security and attack detection method
S Kwon, H Yoo, S Lee, T Shon
Journal of Advanced Navigation Technology 18 (4), 353-358, 2014
Digital forensic artifact collection technique using application decompilation
D Yoo, Y Shin, SJ Kim, HJ Kim, SM Kwon, T Shon
2019 International Conference on Platform Technology and Service (PlatCon), 1-3, 2019
기반시설 사이버보안 프레임워크 도출방안
권성문, 이석철, 장지웅, 손태식
정보보호학회논문지 27 (2), 241-250, 2017
The system can't perform the operation now. Try again later.
Articles 1–20