530 results on '"Yim, Kangbin"'
Search Results
2. Enhancing Road Safety with In-Vehicle Network Abnormal Driving Behavior Detection
3. Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System
4. Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System
5. LPMSAEF: Lightweight process mining-based software architecture evaluation framework for security and performance analysis
6. Artifact Extraction Methods for In-Vehicle Infotainment System
7. A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network
8. Universal Intrusion Detection System on In-Vehicle Network
9. A Lightweight Intrusion Detection System on In-Vehicle Network Using Polynomial Features
10. Fuzz Testing and Safe Framework Development for Vehicle Security Analysis
11. The Comparison of Machine Learning Methods for Email Spam Detection
12. Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method
13. Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle
14. Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C
15. Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D
16. A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network
17. Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol
18. Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network
19. SPEC: Frame Filtering for CAN Protocol on ECU
20. Vulnerability Analysis of a Secure USB Memory: Based on a Commercial Product D
21. A Concept of IDS for CAN Protocol Based on Statics Theory
22. In-vehicle Network IDS Using Message Time Interval Infrastructure
23. Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle
24. Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method
25. Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey
26. A framework for mitigating zero-day attacks in IoT
27. Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT
28. Cyber Attack Scenarios in Cooperative Automated Driving
29. ICS Testbed Implementation Considering Dataset Collection Environment
30. Vestiges of Past Generation: Threats to 5G Core Network
31. Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime
32. Design and Implementation of a Novel Testbed for Automotive Security Analysis
33. Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol
34. Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network
35. Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies
36. Individually Separated Wireless Access Point to Protect User’s Private Information
37. A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment
38. A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities
39. Unintended Certificate Installation into Remote IoT Nodes
40. Novel Encryption Method of GPS Information in Image File Using Format-Preserving Encryption
41. A Technical Survey on Methods for Detecting Rogue Access Points
42. Security Problems of 5G Voice Communication
43. A Concept of IDS for CAN Protocol Based on Statics Theory
44. SPEC: Frame Filtering for CAN Protocol on ECU
45. Vulnerability Analysis of a Secure USB Memory: Based on a Commercial Product D
46. In-vehicle Network IDS Using Message Time Interval Infrastructure
47. Towards 5G-based IoT security analysis against Vo5G eavesdropping
48. Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D
49. Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C
50. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.