Jeong, Han-Gil
77  Ergebnisse:
Personensuche X
?
1

Dataflow-based Control Process Identification for ICS Datas..:

, In: Proceedings of the 15th Workshop on Cyber Security Experimentation and Test,
Choi, Seungoh ; Shin, Hyeok-Ki ; Lee, Woomyo.. - p. 54-58 , 2022
 
?
2

Residual size is not enough for anomaly detection : impr..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Yun, Jeong-Han ; Kim, Jonguk ; Hwang, Won-Seok... - p. 87-96 , 2022
 
?
3

Contributors:

, In: The Neurobiology, Physiology, and Psychology of Pain,
Acuña, Mario A. ; Aiyer, Rohit ; Albu, Sergiu... - p. xv-xix , 2022
 
?
4

Two ICS Security Datasets and Anomaly Detection Contest on ..:

, In: Cyber Security Experimentation and Test Workshop,
Shin, Hyeok-Ki ; Lee, Woomyo ; Yun, Jeong-Han. - p. 36-40 , 2021
 
?
5

Probabilistic Attack Sequence Generation and Execution Base..:

, In: Cyber Security Experimentation and Test Workshop,
 
?
6

POSTER: Expanding a Programmable CPS Testbed for Network At..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Choi, Seungoh ; Yun, Jeong-Han ; Min, Byung-Gil. - p. 928-930 , 2020
 
?
7

Co-occurrence Based Security Event Analysis and Visualizati..:

, In: Communications in Computer and Information Science; HCI International 2020 - Posters,
Kim, HyungKwan ; Choi, Seungoh ; Yun, Jeong-Han.. - p. 540-548 , 2020
 
?
8

Layered Information Structure for Hierarchical Security Man..:

, In: Communications in Computer and Information Science; HCI International 2019 - Posters,
Choi, Seungoh ; Kim, Yesol ; Yun, Jeong-Han.. - p. 197-204 , 2019
 
?
9

Data-Driven Field Mapping of Security Logs for Integrated M..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII,
Choi, Seungoh ; Kim, Yesol ; Yun, Jeong-Han.. - p. 253-268 , 2019
 
?
10

Vendor-Independent Monitoring on Programmable Logic Control..:

, In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
Choi, Jongwon ; Kim, HyungKwan ; Choi, Seungoh... - p. 682-684 , 2019
 
?
11

User analysis and visualization from a semantic blog system:

, In: Proceedings of the first international workshop on Intelligent visual interfaces for text analysis,
Son, Jeong-Woo ; Han, Yong-Jin ; Noh, Tae-Gil.. - p. 13-16 , 2010
 
?
12

List of Contributors:

, In: Neuropathology of Drug Addictions and Substance Misuse,
Abbas, Ghulam ; Adamowicz, Piotr ; Adan, Ana... - p. xxv-xxxiii , 2016
 
?
13

"Do you know existing accuracy metrics overrate time-series..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Hwang, Won-Seok ; Yun, Jeong-Han ; Kim, Jonguk. - p. 403-412 , 2022
 
?
14

Robust Bluetooth Call Streaming with Frame-Overlapped Trans..:

, In: 2023 IEEE International Conference on Consumer Electronics (ICCE),
Lee, Sanghoon ; Kim, Hyunwook ; Moon, Han-gil - p. 01-02 , 2023
 
?
15

Target Speaker Extraction with Ultra-Short Reference Speech..:

, In: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Yang, Lei ; Liu, Wei ; Tan, Lufen.. - p. 1-5 , 2023
 
1-15