Follow
SeokJun Lee
SeokJun Lee
Verified email at kennesaw.edu
Title
Cited by
Cited by
Year
Design and implementation of cybersecurity testbed for industrial IoT systems
S Lee, S Lee, H Yoo, S Kwon, T Shon
The Journal of Supercomputing 74, 4506-4520, 2018
562018
Improved deleted file recovery technique for Ext2/3 filesystem
S Lee, T Shon
The Journal of Supercomputing 70 (1), 20-30, 2014
282014
ExtSFR: scalable file recovery framework based on an Ext file system
S Lee, W Jo, S Eo, T Shon
Multimedia Tools and Applications 79 (23), 16093-16111, 2020
232020
A study on memory dump analysis based on digital forensic tools
J Seo, S Lee, T Shon
Peer-to-Peer Networking and Applications 8, 694-703, 2015
172015
Security architecture model for smart grid communication systems
H Lim, J Ko, S Lee, J Kim, M Kim, T Shon
2013 International Conference on IT Convergence and Security (ICITCS), 1-4, 2013
142013
Packet diversity-based anomaly detection system with OCSVM and representative model
S Lee, H Yoo, J Seo, T Shon
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
112016
Towards a novel quantification approach based on smart grid network vulnerability score
J Ko, S Lee, T Shon
International Journal of Energy Research 40 (3), 298-312, 2016
112016
A phase of deleted file recovery for digital forensics research in Tizen
S Eo, W Jo, S Lee, T Shon
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-3, 2015
102015
Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation
S Eo, W Jo, S Lee, T Shon
Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016
62016
Security threat evaluation for smartgrid control system
J Ko, S Lee, T Shon
Journal of the Korea Institute of Information Security & Cryptology 23 (5 …, 2013
62013
Physical memory collection and analysis in smart grid embedded system
S Lee, T Shon
Mobile Networks and Applications 19, 382-391, 2014
42014
AVQS: Attack Route‐Based Vulnerability Quantification Scheme for Smart Grid
J Ko, H Lim, S Lee, T Shon
The Scientific World Journal 2014 (1), 713012, 2014
42014
A novel network modeling and evaluation approach for security vulnerability quantification in substation automation systems
J Ko, S Lee, Y Lim, S Ju, T Shon
IEICE TRANSACTIONS on Information and Systems 96 (9), 2021-2025, 2013
42013
모바일 포렌식 증거능력 확보 방안 연구
어수웅, 조우연, 이석준, 손태식
정보보호학회논문지 26 (1), 135-152, 2016
32016
Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force
Y Park, S Lee, J Kim, T Shon
2014 International Conference on IT Convergence and Security (ICITCS), 1-4, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–15