Taeshik Shon
Taeshik Shon
Professor of Computer Engineering, Ajou University
Verified email at ajou.ac.kr - Homepage
Cited by
Cited by
A hybrid machine learning approach to network anomaly detection
T Shon, J Moon
Information Sciences 177 (18), 3799-3821, 2007
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions
T Shon, W Choi
The 1st International Conference on Network-Based Information Systems, 88-97, 2007
A lightweight message authentication scheme for smart grid communications in power sector
K Mahmood, SA Chaudhry, H Naqvi, T Shon, HF Ahmad
Computers & Electrical Engineering 52, 114-124, 2016
A lightweight NEMO protocol to support 6LoWPAN
JH Kim, CS Hong, T Shon
ETRI journal 30 (5), 685-695, 2008
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
H Yoo, T Shon
Future generation computer systems 61, 128-136, 2016
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
SA Chaudhry, T Shon, F Al-Turjman, MH Alsharif
Computer Communications 153, 527-537, 2020
SVM approach with a genetic algorithm for network intrusion detection
T Shon, J Seo, J Moon
International Symposium on Computer and Information Sciences, 224-233, 2005
An improved and robust biometrics-based three factor authentication scheme for multiserver environments
SA Chaudhry, H Naqvi, MS Farash, T Shon, M Sher
The Journal of Supercomputing 74 (8), 3504-3520, 2018
Novel approach for detecting network anomalies for substation automation based on IEC 61850
H Yoo, T Shon
Multimedia Tools and Applications 74 (1), 303-318, 2015
Toward advanced mobile cloud computing for the internet of things: Current issues and future direction
T Shon, J Cho, K Han, H Choi
Mobile Networks and Applications 19 (3), 404-413, 2014
Untraceable mobile node authentication in WSN
K Han, K Kim, T Shon
Sensors 10 (5), 4410-4429, 2010
Efficient mobile sensor authentication in smart home and WPAN
K Han, T Shon, K Kim
IEEE Transactions on Consumer Electronics 56 (2), 591-596, 2010
Asynchronous inter-network interference avoidance for wireless body area networks
EJ Kim, S Youm, T Shon, CH Kang
The Journal of Supercomputing 65 (2), 562-579, 2013
Mobility header compression method and system for internet protocol-based low power wireless network
TS Shon, SG Kim, HH Choi, JH Kim, CS Hong
US Patent 8,213,403, 2012
An improved anonymous authentication scheme for distributed mobile cloud computing services
SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon
Cluster Computing 22 (1), 1595-1609, 2019
A robust and efficient privacy aware handover authentication scheme for wireless networks
SA Chaudhry, MS Farash, H Naqvi, SKH Islam, T Shon
Wireless Personal Communications 93 (2), 311-335, 2017
A multiserver biometric authentication scheme for tmis using elliptic curve cryptography
SA Chaudhry, MT Khan, MK Khan, T Shon
Journal of medical systems 40 (11), 1-13, 2016
Applying genetic algorithm for classifying anomalous TCP/IP packets
T Shon, X Kovah, J Moon
Neurocomputing 69 (16-18), 2429-2433, 2006
Open source intelligence base cyber threat inspection framework for critical infrastructures
S Lee, T Shon
2016 Future Technologies Conference (FTC), 1030-1033, 2016
The system can't perform the operation now. Try again later.
Articles 1–20