Yun, Jeong-Han
31236  results:
Search for persons X
?
1

Residual size is not enough for anomaly detection : impr..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Yun, Jeong-Han ; Kim, Jonguk ; Hwang, Won-Seok... - p. 87-96 , 2022
 
?
2

Dataflow-based Control Process Identification for ICS Datas..:

, In: Proceedings of the 15th Workshop on Cyber Security Experimentation and Test,
Choi, Seungoh ; Shin, Hyeok-Ki ; Lee, Woomyo.. - p. 54-58 , 2022
 
?
3

"Do you know existing accuracy metrics overrate time-series..:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
Hwang, Won-Seok ; Yun, Jeong-Han ; Kim, Jonguk. - p. 403-412 , 2022
 
?
4

Two ICS Security Datasets and Anomaly Detection Contest on ..:

, In: Cyber Security Experimentation and Test Workshop,
Shin, Hyeok-Ki ; Lee, Woomyo ; Yun, Jeong-Han. - p. 36-40 , 2021
 
?
5

Probabilistic Attack Sequence Generation and Execution Base..:

, In: Cyber Security Experimentation and Test Workshop,
 
?
6

Revitalizing Self-Organizing Map: Anomaly Detection Using F..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
Kim, Young Geun ; Yun, Jeong-Han ; Han, Siho.. - p. 382-397 , 2021
 
?
7

Anomaly Detection for Industrial Control Systems Using Sequ..:

, In: Computer Security; Lecture Notes in Computer Science,
 
?
8

POSTER: Expanding a Programmable CPS Testbed for Network At..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Choi, Seungoh ; Yun, Jeong-Han ; Min, Byung-Gil. - p. 928-930 , 2020
 
?
9

Co-occurrence Based Security Event Analysis and Visualizati..:

, In: Communications in Computer and Information Science; HCI International 2020 - Posters,
Kim, HyungKwan ; Choi, Seungoh ; Yun, Jeong-Han.. - p. 540-548 , 2020
 
?
10

Time-Series Aware Precision and Recall for Anomaly Detectio..:

, In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management,
Hwang, Won-Seok ; Yun, Jeong-Han ; Kim, Jonguk. - p. 2241-2244 , 2019
 
?
11

Vendor-Independent Monitoring on Programmable Logic Control..:

, In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
Choi, Jongwon ; Kim, HyungKwan ; Choi, Seungoh... - p. 682-684 , 2019
 
?
12

Layered Information Structure for Hierarchical Security Man..:

, In: Communications in Computer and Information Science; HCI International 2019 - Posters,
Choi, Seungoh ; Kim, Yesol ; Yun, Jeong-Han.. - p. 197-204 , 2019
 
?
13

Data-Driven Field Mapping of Security Logs for Integrated M..:

, In: IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XIII,
Choi, Seungoh ; Kim, Yesol ; Yun, Jeong-Han.. - p. 253-268 , 2019
 
?
14

A Comparison of ICS Datasets for Security Research Based on..:

, In: Critical Information Infrastructures Security; Lecture Notes in Computer Science,
Choi, Seungoh ; Yun, Jeong-Han ; Kim, Sin-Kyu - p. 154-166 , 2018
 
?
15

Statistical Similarity of Critical Infrastructure Network T..:

, In: Research in Attacks, Intrusions, and Defenses; Lecture Notes in Computer Science,
Yun, Jeong-Han ; Hwang, Yoonho ; Lee, Woomyo.. - p. 577-599 , 2018
 
1-15