ASADAL: a tool system for co-development of software and test environment based on product line engineering K Kim, H Kim, M Ahn, M Seo, Y Chang, KC Kang Proceedings of the 28th international conference on Software engineering …, 2006 | 35 | 2006 |
Physical one-way data transfer system design for control system network KH Kim, Y Chang, H Kim, JH Yun, W Kim Journal of KISS, Information networking 40 (2), 126-130, 2013 | 13 | 2013 |
Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks S Choi, Y Chang, JH Yun, W Kim International Conference on Critical Infrastructure Protection, 87-102, 2015 | 10 | 2015 |
One Step More: Automatic ICS Protocol Field Analysis Y Chang, S Choi, JH Yun, SK Kim International Conference on Critical Information Infrastructures Security …, 2017 | 9 | 2017 |
System and method for unidirectional data transmission JM Baek, MS Choi, CH Kim, Y Chang, BG Min, WN Kim, MS Jang, JH Yun US Patent 9,397,790, 2016 | 8 | 2016 |
제어망 특성을 반영한 물리적 일방향 자료전달 시스템 설계 김경호, 장엽, 김희민, 윤정한, 김우년 정보과학회논문지: 정보통신 40 (2), 126-130, 2013 | 8 | 2013 |
Security Validation for Data Diode with Reverse Channel JH Yun, Y Chang, KH Kim, W Kim International Conference on Critical Information Infrastructures Security …, 2016 | 6 | 2016 |
Reply-type based agent generation of legacy service on one-way data transfer system KH Kim, Y Chang, HM Kim, JH Yun, WN Kim Journal of the Korea Institute of Information Security & Cryptology 23 (2 …, 2013 | 5 | 2013 |
Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network KH Kim, JH Yun, Y Chang, W Kim International Workshop on Information Security Applications, 358-369, 2014 | 2 | 2014 |
Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System S Choi, Y Chang, JH Yun, W Kim International Workshop on Information Security Applications, 345-357, 2014 | 2 | 2014 |
일방향 자료전달 시스템의 레거시 서비스 지원을 위한 응답구조 기반 에이전트 자동 생성 김경호, 장엽, 김희민, 윤정한, 김우년 정보보호학회논문지 23 (2), 299-305, 2013 | 2 | 2013 |
Impact Analysis of PLC Performance When Applying Cyber Security Solutions Using Active Information Gathering Y Chang, T Kim, W Kim International Conference on Critical Information Infrastructures Security …, 2021 | 1 | 2021 |
PLC 로그의 사고조사 활용 가능성에 관한 연구 장엽, 김태연, 김우년 정보보호학회논문지 30 (4), 745-756, 2020 | | 2020 |
Impact Analysis of Unauthorized Client Connection Vulnerability on IEC 61850 MS Jang, J Yun, Y Chang, B Min, W Kim International Information Institute (Tokyo). Information 16 (8), 5603, 2013 | | 2013 |