서정택 Jungtaek Seo
서정택 Jungtaek Seo
순천향대학교 정보보호학과 교수
Verified email at
Cited by
Cited by
A study on the covert channel detection of TCP/IP header using support vector machine
T Sohn, JT Seo, J Moon
Information and Communications Security: 5th International Conference, ICICS …, 2003
An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system
I You, S Kwon, G Choudhary, V Sharma, JT Seo
Sensors 18 (6), 1888, 2018
An approach to mitigate wormhole attack in wireless ad hoc networks
G Lee, J Seo, D Kim
2008 international conference on information security and assurance (ISA …, 2008
SVM approach with a genetic algorithm for network intrusion detection
T Shon, J Seo, J Moon
International Symposium on Computer and Information Sciences, 224-233, 2005
An efficient dynamic solution for the detection and prevention of black hole attack in VANETs
A Malik, MZ Khan, M Faisal, F Khan, JT Seo
Sensors 22 (5), 1897, 2022
A hybrid trust management framework for vehicular social networks
R Hussain, W Nawaz, JY Lee, J Son, JT Seo
Computational Social Networks: 5th International Conference, CSoNet 2016, Ho …, 2016
Ransomware prevention technique using key backup
K Lee, K Yim, JT Seo
Concurrency and Computation: Practice and Experience 30 (3), e4337, 2018
Development of cyber-attack scenarios for nuclear power plants using scenario graphs
W Ahn, M Chung, BG Min, J Seo
International Journal of Distributed Sensor Networks 11 (9), 836258, 2015
A new DDoS detection model using multiple SVMs and TRA
J Seo, C Lee, T Shon, KH Cho, J Moon
Embedded and Ubiquitous Computing–EUC 2005 Workshops: EUC 2005 Workshops …, 2005
Price modification attack and protection scheme in smart grid
S Mishra, X Li, T Pan, A Kuhnle, MT Thai, J Seo
IEEE Transactions on Smart Grid 8 (4), 1864-1875, 2016
Rate alteration attacks in smart grid
S Mishra, X Li, A Kuhnle, MT Thai, J Seo
2015 IEEE Conference on Computer Communications (INFOCOM), 2353-2361, 2015
Catastrophic cascading failures in power networks
J Seo, S Mishra, X Li, MT Thai
Theoretical Computer Science 607, 306-319, 2015
An approach for spam e-mail detection with support vector machine and n-gram indexing
J Moon, T Shon, J Seo, J Kim, J Seo
Computer and Information Sciences-ISCIS 2004: 19th International Symposium …, 2004
PBF: a new privacy‐aware billing framework for online electric vehicles with bidirectional auditability
R Hussain, J Son, D Kim, M Nogueira, H Oh, AO Tokuta, J Seo
Wireless Communications and Mobile Computing 2017 (1), 5676030, 2017
Privacy enhanced location sharing for mobile online social networks
J Son, D Kim, MZA Bhuiyan, R Tashakkori, J Seo, DH Lee
IEEE Transactions on Sustainable Computing 5 (2), 279-290, 2018
A novel transparent and auditable fog-assisted cloud storage with compensation mechanism
D Kim, J Son, D Seo, Y Kim, H Kim, JT Seo
Tsinghua Science and Technology 25 (1), 28-43, 2019
Analyzing and evaluating critical cyber security challenges faced by vendor organizations in software development: SLR based approach
AW Khan, S Zaib, F Khan, I Tarimer, JT Seo, J Shin
IEEE access 10, 65044-65054, 2022
Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions
PV Mohan, S Dixit, A Gyaneshwar, U Chadha, K Srinivasan, JT Seo
Sensors 22 (6), 2194, 2022
Threat from being social: Vulnerability analysis of social network coupled smart grid
T Pan, S Mishra, LN Nguyen, G Lee, J Kang, J Seo, MT Thai
IEEE Access 5, 16774-16783, 2017
A study on memory dump analysis based on digital forensic tools
J Seo, S Lee, T Shon
Peer-to-Peer Networking and Applications 8, 694-703, 2015
The system can't perform the operation now. Try again later.
Articles 1–20