Wooyeon Jo
Cited by
Cited by
APAD: Autoencoder-based payload anomaly detection for industrial IoE
SJ Kim, WY Jo, T Shon
Applied Soft Computing 88, 106017, 2020
Packet preprocessing in CNN-based network intrusion detection system
W Jo, S Kim, C Lee, T Shon
Electronics 9 (7), 1151, 2020
Digital forensic practices and methodologies for AI speaker ecosystems
W Jo, Y Shin, H Kim, D Yoo, D Kim, C Kang, J Jin, J Oh, B Na, T Shon
Digital Investigation 29, S80-S93, 2019
Certificate injection-based encrypted traffic forensics in AI speaker ecosystem
Y Shin, H Kim, S Kim, D Yoo, W Jo, T Shon
Forensic Science International: Digital Investigation 33, 301010, 2020
ExtSFR: scalable file recovery framework based on an Ext file system
S Lee, W Jo, S Eo, T Shon
Multimedia Tools and Applications 79 (23), 16093-16111, 2020
AI-enabled device digital forensics for smart cities
S Kim, W Jo, J Lee, T Shon
The Journal of Supercomputing, 1-16, 2022
Digital forensic analysis of intelligent and smart IoT devices
M Kim, Y Shin, W Jo, T Shon
The Journal of Supercomputing 79 (1), 973-997, 2023
A novel vulnerability analysis approach to generate fuzzing test case in industrial control systems
SJ Kim, WY Jo, T Shon
2016 IEEE Information Technology, Networking, Electronic and Automation …, 2016
Digital forensic case studies for in-vehicle infotainment systems using Android Auto and Apple CarPlay
Y Shin, S Kim, W Jo, T Shon
Sensors 22 (19), 7196, 2022
Gadgets of gadgets in industrial control systems: Return oriented programming attacks on PLCs
A Ayub, N Zubair, H Yoo, W Jo, I Ahmed
2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023
Automatic whitelist generation system for ethernet based in-vehicle network
W Jo, SJ Kim, H Kim, Y Shin, T Shon
Computers in Industry 142, 103735, 2022
Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems
H Kim, S Kim, W Jo, KH Kim, T Shon
IEEE Access 9, 75542-75552, 2021
Visualization for internet of things: power system and financial network cases
M Kim, W Jo, J Kim, T Shon
Multimedia Tools and Applications 78 (3), 3241-3265, 2019
A phase of deleted file recovery for digital forensics research in Tizen
S Eo, W Jo, S Lee, T Shon
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-3, 2015
Digital forensic analysis to improve user privacy on Android
H Kim, Y Shin, S Kim, W Jo, M Kim, T Shon
Sensors 22 (11), 3971, 2022
Ext4 and XFS file system forensic framework based on TSK
H Kim, S Kim, Y Shin, W Jo, S Lee, T Shon
Electronics 10 (18), 2310, 2021
Digital forensic approach for file recovery in Unix systems: Research of data recovery on Unix file system
WY Jo, H Chang, T Shon
2016 IEEE Information Technology, Networking, Electronic and Automation …, 2016
Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation
S Eo, W Jo, S Lee, T Shon
Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016
How are industrial control systems insecure by design? A deeper insight into real-world programmable logic controllers
A Ayub, W Jo, SA Qasim, I Ahmed
IEEE Security & Privacy 21 (4), 10-19, 2023
A novel security framework for industrial iot based on isa 100.11 a
H Kim, S Kim, S Kwon, W Jo, T Shon
Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20