SungJin Kim
SungJin Kim
Samsung SDS
Verified email at
Cited by
Cited by
APAD: Autoencoder-based payload anomaly detection for industrial IoE
SJ Kim, WY Jo, T Shon
Applied Soft Computing 88, 106017, 2020
Packet preprocessing in CNN-based network intrusion detection system
W Jo, S Kim, C Lee, T Shon
Electronics 9 (7), 1151, 2020
Game theory-based security vulnerability quantification for social internet of things
S Lee, S Kim, K Choi, T Shon
Future Generation Computer Systems 82, 752-760, 2018
Field classification-based novel fuzzing case generation for ICS protocols
SJ Kim, T Shon
The Journal of Supercomputing 74, 4434-4450, 2018
A novel vulnerability analysis approach to generate fuzzing test case in industrial control systems
SJ Kim, WY Jo, T Shon
2016 IEEE Information Technology, Networking, Electronic and Automation …, 2016
Smart seed selection-based effective black box fuzzing for IIoT protocol
SJ Kim, J Cho, C Lee, T Shon
The Journal of Supercomputing 76, 10140-10154, 2020
Automatic whitelist generation system for ethernet based in-vehicle network
W Jo, SJ Kim, H Kim, Y Shin, T Shon
Computers in Industry 142, 103735, 2022
Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems
H Kim, S Kim, W Jo, KH Kim, T Shon
IEEE Access 9, 75542-75552, 2021
Cybersecurity framework for IIoT-based power system connected to microgrid
JW Jang, S Kwon, SJ Kim, J Seo, J Oh, K Lee
KSII Transactions on Internet and Information Systems (TIIS) 14 (5), 2221-2235, 2020
Data aggregation gateway framework for CoAP group communications
M Cha, JH Kwon, SJ Kim, T Shon, EJ Kim
Symmetry 8 (12), 138, 2016
A novel security framework for industrial iot based on isa 100.11 a
H Kim, S Kim, S Kwon, W Jo, T Shon
Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th …, 2019
Cybersecurity architecture for reliable smart factory
HJ Kim, SJ Kim, Y Kim, S Kim, TS Shon
Journal of the Korea Institute of Information Security & Cryptology 29 (3 …, 2019
Survey on security techniques for AMI metering system
SJ Kim, HS Chng, T Shon
2014 International SoC Design Conference (ISOCC), 192-193, 2014
Randomness Based Fuzzing Test Case Evaluation for Vulnerability Analysis of Industrial Control System
SJ Kim, T Shon
Journal of The Korea Institute of Information Security & Cryptology 28 (1 …, 2018
Digital forensic consideration for financial IT security
K Park, S Kwon, S Kim, T Shon
2016 Future Technologies Conference (FTC), 1025-1029, 2016
Digital forensic artifact collection technique using application decompilation
D Yoo, Y Shin, SJ Kim, HJ Kim, SM Kwon, T Shon
2019 International Conference on Platform Technology and Service (PlatCon), 1-3, 2019
빅데이터 분석 기술 (Hadoop/Hive) 기반 네트워크 정상행위 규정 방법
김성진, 김강석
정보보호학회논문지 27 (5), 1117-1127, 2017
Two-Phase Industrial Control System Anomaly Detection Using Communication Patterns and Deep Learning
S Kim, W Jo, H Kim, S Choi, DI Jung, H Choi, T Shon
Electronics 13 (8), 1520, 2024
Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard
HJ Kim, S Lee, SJ Kim, T Shon
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-4, 2015
The system can't perform the operation now. Try again later.
Articles 1–19