Taeshik Shon
Taeshik Shon
Professor of Computer Engineering, Ajou University
Verified email at ajou.ac.kr - Homepage
Title
Cited by
Cited by
Year
A hybrid machine learning approach to network anomaly detection
T Shon, J Moon
Information Sciences 177 (18), 3799-3821, 2007
4482007
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
1852005
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
T Shon, W Choi
The 1st International Conference on Network-Based Information Systems, 88-97, 2007
1572007
A lightweight message authentication scheme for smart grid communications in power sector
K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad
Computers & Electrical Engineering 52, 114-124, 2016
1362016
A lightweight NEMO protocol to support 6LoWPAN
JH Kim, CS Hong, T Shon
ETRI journal 30 (5), 685-695, 2008
962008
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
H Yoo, T Shon
Future generation computer systems 61, 128-136, 2016
652016
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
SA Chaudhry, T Shon, F Al-Turjman, MH Alsharif
Computer Communications 153, 527-537, 2020
502020
SVM approach with a genetic algorithm for network intrusion detection
T Shon, J Seo, J Moon
International Symposium on Computer and Information Sciences, 224-233, 2005
482005
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74 (8), 3504-3520, 2018
472018
Novel approach for detecting network anomalies for substation automation based on IEC 61850
H Yoo, T Shon
Multimedia Tools and Applications 74 (1), 303-318, 2015
452015
Toward advanced mobile cloud computing for the internet of things: Current issues and future direction
T Shon, J Cho, K Han, H Choi
Mobile Networks and Applications 19 (3), 404-413, 2014
432014
Untraceable mobile node authentication in WSN
K Han, K Kim, T Shon
Sensors 10 (5), 4410-4429, 2010
432010
Efficient mobile sensor authentication in smart home and WPAN
K Han, T Shon, K Kim
IEEE Transactions on Consumer Electronics 56 (2), 591-596, 2010
412010
Asynchronous inter-network interference avoidance for wireless body area networks
EJ Kim, S Youm, T Shon, CH Kang
The Journal of Supercomputing 65 (2), 562-579, 2013
382013
Mobility header compression method and system for internet protocol-based low power wireless network
TS Shon, SG Kim, HH Choi, JH Kim, CS Hong
US Patent 8,213,403, 2012
382012
An improved anonymous authentication scheme for distributed mobile cloud computing services
SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon
Cluster Computing 22 (1), 1595-1609, 2019
372019
A robust and efficient privacy aware handover authentication scheme for wireless networks
SA Chaudhry, MS Farash, H Naqvi, SKH Islam, T Shon
Wireless Personal Communications 93 (2), 311-335, 2017
372017
A multiserver biometric authentication scheme for tmis using elliptic curve cryptography
SA Chaudhry, MT Khan, MK Khan, T Shon
Journal of medical systems 40 (11), 1-13, 2016
372016
Applying genetic algorithm for classifying anomalous TCP/IP packets
T Shon, X Kovah, J Moon
Neurocomputing 69 (16-18), 2429-2433, 2006
352006
Open source intelligence base cyber threat inspection framework for critical infrastructures
S Lee, T Shon
2016 Future Technologies Conference (FTC), 1030-1033, 2016
332016
The system can't perform the operation now. Try again later.
Articles 1–20