Design and implementation of cybersecurity testbed for industrial IoT systems S Lee, S Lee, H Yoo, S Kwon, T Shon The Journal of Supercomputing 74, 4506-4520, 2018 | 54 | 2018 |
Improved deleted file recovery technique for Ext2/3 filesystem S Lee, T Shon The Journal of Supercomputing 70 (1), 20-30, 2014 | 28 | 2014 |
ExtSFR: scalable file recovery framework based on an Ext file system S Lee, W Jo, S Eo, T Shon Multimedia Tools and Applications 79 (23), 16093-16111, 2020 | 20 | 2020 |
A study on memory dump analysis based on digital forensic tools J Seo, S Lee, T Shon Peer-to-Peer Networking and Applications 8, 694-703, 2015 | 17 | 2015 |
Security architecture model for smart grid communication systems H Lim, J Ko, S Lee, J Kim, M Kim, T Shon 2013 International Conference on IT Convergence and Security (ICITCS), 1-4, 2013 | 14 | 2013 |
Packet diversity-based anomaly detection system with OCSVM and representative model S Lee, H Yoo, J Seo, T Shon 2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016 | 12 | 2016 |
Towards a novel quantification approach based on smart grid network vulnerability score J Ko, S Lee, T Shon International Journal of Energy Research 40 (3), 298-312, 2016 | 11 | 2016 |
A phase of deleted file recovery for digital forensics research in Tizen S Eo, W Jo, S Lee, T Shon 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-3, 2015 | 9 | 2015 |
Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation S Eo, W Jo, S Lee, T Shon Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016 | 6 | 2016 |
Security threat evaluation for smartgrid control system J Ko, S Lee, T Shon Journal of the Korea Institute of Information Security & Cryptology 23 (5 …, 2013 | 6 | 2013 |
Physical memory collection and analysis in smart grid embedded system S Lee, T Shon Mobile Networks and Applications 19, 382-391, 2014 | 4 | 2014 |
AVQS: attack route-based vulnerability quantification scheme for smart grid J Ko, H Lim, S Lee, T Shon The Scientific World Journal 2014, 2014 | 4 | 2014 |
A novel network modeling and evaluation approach for security vulnerability quantification in substation automation systems J Ko, S Lee, Y Lim, S Ju, T Shon IEICE TRANSACTIONS on Information and Systems 96 (9), 2021-2025, 2013 | 4 | 2013 |
모바일 포렌식 증거능력 확보 방안 연구 어수웅, 조우연, 이석준, 손태식 정보보호학회논문지 26 (1), 135-152, 2016 | 3 | 2016 |
Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force Y Park, S Lee, J Kim, T Shon 2014 International Conference on IT Convergence and Security (ICITCS), 1-4, 2014 | 1 | 2014 |