Hyunguk Yoo
Cited by
Cited by
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
H Yoo, T Shon
Future generation computer systems 61, 128-136, 2016
Novel approach for detecting network anomalies for substation automation based on IEC 61850
H Yoo, T Shon
Multimedia Tools and Applications 74 (1), 303-318, 2015
Control logic injection attacks on industrial control systems
H Yoo, I Ahmed
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2019
CLIK on PLCs! Attacking control logic with decompilation and virtual PLC
S Kalle, N Ameen, H Yoo, I Ahmed
Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019
IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system
S Kwon, H Yoo, T Shon
IEEE Access 8, 77572-77586, 2020
Design and implementation of cybersecurity testbed for industrial IoT systems
S Lee, S Lee, H Yoo, S Kwon, T Shon
The Journal of Supercomputing 74 (9), 4506-4520, 2018
Denial of engineering operations attacks in industrial control systems
S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol
H Yoo, T Shon
2016 IEEE International conference on smart grid communications …, 2016
Whitelist-based anomaly detection for industrial control system security
H Yoo, JH Yun, T Shon
The Journal of Korean Institute of Communications and Information Sciences …, 2013
Overshadow PLC to detect remote control-logic injection attacks
H Yoo, S Kalle, J Smith, I Ahmed
International Conference on Detection of Intrusions and Malware, and …, 2019
Secure and reliable electronic record management system using digital forensic technologies
SA Majore, H Yoo, T Shon
The Journal of Supercomputing 70 (1), 149-165, 2014
Empirical study of PLC authentication protocols in industrial control systems
A Ayub, H Yoo, I Ahmed
2021 IEEE Security and Privacy Workshops (SPW), 383-397, 2021
RNN-based anomaly detection in DNP3 transport layer
S Kwon, H Yoo, T Shon
2019 IEEE International Conference on Communications, Control, and Computing …, 2019
Packet diversity-based anomaly detection system with OCSVM and representative model
S Lee, H Yoo, J Seo, T Shon
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
Recovery measure against disabling reassembly attack to DNP3 communication
S Kwon, H Yoo, T Shon
IEICE Transactions on Information and Systems 100 (8), 1790-1797, 2017
제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법
유형욱, 윤정한, 손태식
한국통신학회논문지 B 38, 646-647, 2013
Anomaly detection for IEC 61850 substation network
YH Lim, H Yoo, T Shon
Journal of the Korea Institute of Information Security & Cryptology 23 (5 …, 2013
Inferring state machine using hybrid teacher
H Yoo, T Shon
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
Scenario-based attack route on industrial control system
SM Kwon, HU Yoo, T Shon, GW Lee
2014 International Conference on IT Convergence and Security (ICITCS), 1-3, 2014
Next Generation Electronic Record Management System based on Digital Forensics
SA Majore, H Yoo, T Shon
International Journal of Security and Its Applications 7 (1), 189-194, 2013
The system can't perform the operation now. Try again later.
Articles 1–20