A comparative study of time series anomaly detection models for industrial control systems B Kim, MA Alawami, E Kim, S Oh, J Park, H Kim Sensors 23 (3), 1310, 2023 | 26 | 2023 |
Wrong siren! a location spoofing attack on indoor positioning systems: The starbucks case study J Cho, J Yu, S Oh, J Ryoo, JS Song, H Kim IEEE communications magazine 55 (3), 132-137, 2017 | 25 | 2017 |
A flexible architecture for orchestrating network security functions to support high-level security policies S Oh, E Kim, J Jeong, H Ko, H Kim Proceedings of the 11th International Conference on Ubiquitous Information …, 2017 | 8 | 2017 |
AppSniffer: Towards robust mobile app fingerprinting against VPN S Oh, M Lee, H Lee, E Bertino, H Kim Proceedings of the ACM Web Conference 2023, 2318-2328, 2023 | 4 | 2023 |
Empirical analysis of SSL/TLS weaknesses in real websites: Who cares? S Oh, E Kim, H Kim Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 4 | 2017 |
Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks K Lee, S Oh, H Kim Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 2 | 2022 |
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models S Oh, K Lee, S Park, D Kim, H Kim arXiv preprint arXiv:2312.06227, 2023 | 1 | 2023 |