Hyunguk Yoo
Title
Cited by
Cited by
Year
Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
H Yoo, T Shon
Future generation computer systems 61, 128-136, 2016
652016
Novel approach for detecting network anomalies for substation automation based on IEC 61850
H Yoo, T Shon
Multimedia Tools and Applications 74 (1), 303-318, 2015
452015
Design and implementation of cybersecurity testbed for industrial IoT systems
S Lee, S Lee, H Yoo, S Kwon, T Shon
The Journal of Supercomputing 74 (9), 4506-4520, 2018
322018
Clik on plcs! attacking control logic with decompilation and virtual plc
S Kalle, N Ameen, H Yoo, I Ahmed
Binary Analysis Research (BAR) Workshop, Network and Distributed System …, 2019
262019
Whitelist-based anomaly detection for industrial control system security
H Yoo, JH Yun, T Shon
The Journal of Korean Institute of Communications and Information Sciences …, 2013
242013
Control logic injection attacks on industrial control systems
H Yoo, I Ahmed
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2019
222019
Denial of engineering operations attacks in industrial control systems
S Senthivel, S Dhungana, H Yoo, I Ahmed, V Roussev
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
222018
Grammar-based adaptive fuzzing: Evaluation on SCADA modbus protocol
H Yoo, T Shon
2016 IEEE International Conference on Smart Grid Communications …, 2016
212016
IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system
S Kwon, H Yoo, T Shon
IEEE Access 8, 77572-77586, 2020
172020
Secure and reliable electronic record management system using digital forensic technologies
SA Majore, H Yoo, T Shon
The Journal of Supercomputing 70 (1), 149-165, 2014
102014
RNN-based anomaly detection in DNP3 transport layer
S Kwon, H Yoo, T Shon
2019 IEEE International Conference on Communications, Control, and Computing …, 2019
92019
Overshadow plc to detect remote control-logic injection attacks
H Yoo, S Kalle, J Smith, I Ahmed
International Conference on Detection of Intrusions and Malware, and …, 2019
82019
Packet diversity-based anomaly detection system with OCSVM and representative model
S Lee, H Yoo, J Seo, T Shon
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
82016
제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법
유형욱, 윤정한, 손태식
한국통신학회논문지 B 38, 646-647, 2013
42013
Anomaly detection for IEC 61850 substation network
YH Lim, H Yoo, T Shon
Journal of the Korea Institute of Information Security & Cryptology 23 (5 …, 2013
42013
Recovery measure against disabling reassembly attack to DNP3 communication
S Kwon, H Yoo, T Shon
IEICE Transactions on Information and Systems 100 (8), 1790-1797, 2017
32017
Inferring state machine using hybrid teacher
H Yoo, T Shon
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
32016
Empirical Study of PLC Authentication Protocols in Industrial Control Systems
A Ayub, H Yoo, I Ahmed
Fifteenth IEEE Workshop on Offensive Technologies (WOOT), 2021
22021
Method and system for detecting vulnerabilities of communication protocol software
TS Shon, HU Yoo
US Patent 10,185,831, 2019
22019
Scenario-based attack route on industrial control system
SM Kwon, HU Yoo, T Shon, GW Lee
2014 International Conference on IT Convergence and Security (ICITCS), 1-3, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20