Journal (International)
-
H. Jin, GH. Jeon, HW. A. Choi, S. Jeon & JT. Seo,
"A Threat Modeling Framework for IoT-Based Botnet Attacks,"
Heliyon,
vol. 10,
iss. 7,
2024,
doi
-
IH. Ji, JH. Lee, S. Jeon & JT. Seo,
"Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence,"
Computer Modeling in Engineering & Sciences,
vol. 141,
iss. 2,
2024,
doi
-
G. Jeon, H. Jin, JH. Lee, S. Jeon & JT. Seo,
"IWTW: A Framework for IoWT Cyber Threat Analysis,"
Computer Modeling in Engineering & Sciences,
vol. 141,
iss. 2,
2024,
doi
-
S. Jeon, K. Koo, D. Moon & JT. Seo,
"Mutation-Based Multivariate Time-Series Anomaly Generation on Latent Space with an Attention-Based Variational Recurrent Neural Network for Robust Anomaly Detection in an Industrial Control System,"
Applied Sciences,
vol. 14,
iss. 17,
2024,
doi
-
D. Kim, S. Jeon, K. Kim, J. Kang, S. Lee & JT. Seo,
"Guide to Developing Case-based Attack Scenarios and Establishing Defense Strategies for Cybersecurity Exercise in ICS Environment,"
Journal of Supercomputing,
vol. 0,
iss. 0,
2024,
doi
-
M. Kim, S. Jeon, J. Cho & S. Gong,
"Data-Driven ICS Network Simulation for Synthetic Data Generation,"
Electronics,
vol. 13,
iss. 10,
2024,
doi
-
IH. Ji, JH. Lee, MJ. Kang, WJ. Park, SH. Jeon & JT. Seo,
"Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review,"
Sensors,
vol. 24,
iss. 3,
2024,
doi
-
I. Song, S. Jeon, D. Kim, MG. Lee & JT. Seo,
"GENICS: A Framework for Generating Attack Scenarios for Cybersecurity Exercises on Industrial Control Systems,"
Applied Sciences,
vol. 14,
iss. 2,
2024,
doi
-
S. Jeon, JT. Seo,
"A Synthetic Time-Series Generation using Variational Recurrent Autoencoder with Attention Mechanism in Industrial Control System,"
Sensors,
vol. 24,
iss. 1,
2023,
doi
-
G. Choi, S. Jeon, J. Cho & J. Moon,
"A Seed Scheduling Method With a Reinforcement Learning for a Coverage Guided Fuzzing,"
IEEE Access,
vol. 11,
2023,
doi
-
JH. Lee, IH. Ji, SH. Jeon & JT. Seo,
"Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression,"
Sensors,
vol. 23,
iss. 24,
2023,
doi
-
D. Kim, S. Jeon, J. Shin, JT. Seo,
"Design the IoT Botnet Defense Process for Cybersecurity in Smart City,"
Intelligent Automation & Soft Computing,
vol. 37,
iss. 3,
2023,
doi
-
S. Jeon, C. Shin, E. Ko, J. Moon,
"A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment,"
Computer Methods and Programs in Biomedicine,
vol. 226,
2022,
doi
-
S. Jeon & J. Moon,
"Dr. PathFinder: hybrid fuzzing with deep reinforcement concolic execution toward deeper path-first search,"
Neural Computing & Applications,
vol. 34,
iss. 13,
2022,
doi
-
S. Jeon, C. Shin, E. Ko & J. Moon,
"A Secure CDM-Based Data Analysis Platform (SCAP) in Multi-Centered Distributed Setting,"
Applied Sciences,
vol. 11,
iss. 19,
2021,
doi
-
S. Jeon & J. Moon,
"Malware-detection method with a convolutional recurrent neural network using opcode sequences,"
Information Sciences,
vol. 535,
2020,
doi
-
S. Jeon, J. Seo, S. Kim, J. Lee, JH. Kim, JW. Sohn, J. Moon, HJ. Joo,
"Proposal and assessment of a de-identification strategy to enhance anonymity of the observational medical outcomes partnership common data model (OMOP-CDM) in a public cloud-computing environment: anonymization of medical data using privacy models,"
Journal of Medical Internet Research,
vol. 22,
iss. 11,
2020,
doi
-
S. Nam, S. Jeon, H. Kim & J. Moon,
"Recurrent gans password cracker for iot password security enhancement,"
Sensors,
vol. 20,
iss. 11,
2020,
doi
-
S. Nam, S. Jeon & J. Moon,
"Generating optimized guessing candidates toward better password cracking from multi-dictionaries using relativistic GAN,"
Applied Sciences,
vol. 10,
iss. 20,
2020,
doi
Conference (International)
- S. Jeon & JT Seo, "SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis," WISA 2023 : Information Security Applications, 2023, doi
- I. Ji, S. Jeon & JT Seo, "AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0," WISA 2023 : Information Security Applications, 2023, doi
- D. Kim, S. Jeon, J. Shin & JT Seo, "OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime," WISA 2023 : Information Security Applications, 2023, doi
- S. Nam, S. Jeon & J. Moon, "A new password cracking model with generative adversarial networks," WISA 2019 : Information Security Applications, 2019, doi
Journal (Domestic)
-
고아름, 지일환, 진호준, 전승호 & 서정택,
"5G 환경에서의 네트워크 슬라이싱 연구 비교 분석,"
Journal of Platform Technology,
vol. 11,
iss. 5,
2023,
doi
-
전승호 & 문종섭,
"돌연변이 연산 기반 효율적 심층 신경망 모델,"
KIPS Transactions on Software and Data Engineering,
vol. 6,
iss. 12,
2017,
doi
Conference (Domestic)
- 지일환, 김동현, 전승호 & 서정택, "DNP 3.0 전력계통 대상 AI 기반 이상탐지 시스템 제안," ICT플랫폼학회 하계학술발표대회논문집, 2023
- 이주현, 전승호, 송인성 & 서정택, "ICS환경에서 기계학습 기반 공격 패킷 생성 방법론 연구," ICT플랫폼학회 하계학술발표대회논문집, 2023
- 이민규, 전승호 & 서정택, "데이터 스트림 분석을 이용한 PLC 원격 제어로직 삽입 공격 탐지 기법," ICT플랫폼학회 하계학술발표대회논문집, 2023
- 진호준, 전규현, 전승호 & 서정택, "IoT 대상 봇넷 공격 탐지 프로세스 설계," ICT플랫폼학회 하계학술발표대회논문집, 2023
Seungho Jeon @ Gachon University