Search

Your search keyword '"Yim, Kangbin"' showing total 530 results

Search Constraints

Start Over You searched for: Author "Yim, Kangbin" Remove constraint Author: "Yim, Kangbin"
530 results on '"Yim, Kangbin"'

Search Results

12. Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method

13. Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle

14. Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C

15. Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D

17. Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol

18. Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network

19. SPEC: Frame Filtering for CAN Protocol on ECU

21. A Concept of IDS for CAN Protocol Based on Statics Theory

22. In-vehicle Network IDS Using Message Time Interval Infrastructure

25. Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey

26. A framework for mitigating zero-day attacks in IoT

28. Cyber Attack Scenarios in Cooperative Automated Driving

29. ICS Testbed Implementation Considering Dataset Collection Environment

30. Vestiges of Past Generation: Threats to 5G Core Network

31. Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime

32. Design and Implementation of a Novel Testbed for Automotive Security Analysis

36. Individually Separated Wireless Access Point to Protect User’s Private Information

38. A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities

39. Unintended Certificate Installation into Remote IoT Nodes

40. Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption

41. A Technical Survey on Methods for Detecting Rogue Access Points

42. Security Problems of 5G Voice Communication

Catalog

Books, media, physical & digital resources