Taeshik Shon
Taeshik Shon
Professor of Computer Engineering, Ajou University
Verified email at - Homepage
Cited by
Cited by
A hybrid machine learning approach to network anomaly detection
T Shon, J Moon
Information Sciences 177 (18), 3799-3821, 2007
A lightweight message authentication scheme for smart grid communications in power sector
K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad
Computers & Electrical Engineering 52, 114-124, 2016
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
T Shon, W Choi
The 1st International Conference on Network-Based Information Systems, 88-97, 2007
A lightweight NEMO protocol to support 6LoWPAN
JH Kim, CS Hong, T Shon
ETRI journal 30 (5), 685-695, 2008
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
H Yoo, T Shon
Future generation computer systems 61, 128-136, 2016
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
SA Chaudhry, T Shon, F Al-Turjman, MH Alsharif
Computer Communications 153, 527-537, 2020
APAD: Autoencoder-based payload anomaly detection for industrial IoE
SJ Kim, WY Jo, T Shon
Applied Soft Computing 88, 106017, 2020
An improved anonymous authentication scheme for distributed mobile cloud computing services
SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon
Cluster Computing 22, 1595-1609, 2019
Novel approach for detecting network anomalies for substation automation based on IEC 61850
H Yoo, T Shon
Multimedia Tools and Applications 74, 303-318, 2015
IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system
S Kwon, H Yoo, T Shon
IEEE Access 8, 77572-77586, 2020
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74, 3504-3520, 2018
Packet preprocessing in CNN-based network intrusion detection system
W Jo, S Kim, C Lee, T Shon
Electronics 9 (7), 1151, 2020
Design and implementation of cybersecurity testbed for industrial IoT systems
S Lee, S Lee, H Yoo, S Kwon, T Shon
The Journal of Supercomputing 74, 4506-4520, 2018
Digital forensic practices and methodologies for AI speaker ecosystems
W Jo, Y Shin, H Kim, D Yoo, D Kim, C Kang, J Jin, J Oh, B Na, T Shon
Digital Investigation 29, S80-S93, 2019
Toward advanced mobile cloud computing for the internet of things: Current issues and future direction
T Shon, J Cho, K Han, H Choi
Mobile Networks and Applications 19, 404-413, 2014
Mobility header compression method and system for internet protocol-based low power wireless network
TS Shon, SG Kim, HH Choi, JH Kim, CS Hong
US Patent 8,213,403, 2012
A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication
K Han, CY Yeun, T Shon, J Park, K Kim
International Journal of Communication Systems 24 (4), 461-472, 2011
A multiserver biometric authentication scheme for tmis using elliptic curve cryptography
SA Chaudhry, MT Khan, MK Khan, T Shon
Journal of medical systems 40, 1-13, 2016
Untraceable mobile node authentication in WSN
K Han, K Kim, T Shon
Sensors 10 (5), 4410-4429, 2010
The system can't perform the operation now. Try again later.
Articles 1–20