Eunsoo Kim
Eunsoo Kim
Verified email at - Homepage
Cited by
Cited by
A framework for detecting MAC and IP spoofing attacks with network characteristics
J Yu, E Kim, H Kim, J Huh
2016 International conference on software security and assurance (ICSSA), 49-53, 2016
Ibcs: Intent-based cloud services for security applications
J Kim, E Kim, J Yang, J Jeong, H Kim, S Hyun, H Yang, J Oh, Y Kim, ...
IEEE Communications Magazine 58 (4), 45-51, 2020
A comparative study of time series anomaly detection models for industrial control systems
B Kim, MA Alawami, E Kim, S Oh, J Park, H Kim
Sensors 23 (3), 1310, 2023
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules
E Kim, K Kim, D Shin, B Jin, H Kim
Proceedings of the 13th International Conference on Future Internet …, 2018
Can we create a cross-domain federated identity for the industrial Internet of Things without Google?
E Kim, YS Cho, B Kim, W Ji, SH Kim, SS Woo, H Kim
IEEE Internet of Things Magazine 3 (4), 82-87, 2020
A flexible architecture for orchestrating network security functions to support high-level security policies
S Oh, E Kim, J Jeong, H Ko, H Kim
Proceedings of the 11th International Conference on Ubiquitous Information …, 2017
Design of a framework to detect device spoofing attacks using network characteristics
J Yu, E Kim, H Kim, JH Huh
IEEE Consumer Electronics Magazine 9 (2), 34-40, 2020
Empirical analysis of SSL/TLS weaknesses in real websites: Who cares?
S Oh, E Kim, H Kim
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
A Framework for managing user-defined security policies to support network security functions
E Kim, K Kim, S Lee, JP Jeong, H Kim
Proceedings of the 12th International Conference on Ubiquitous Information …, 2018
Sharing cyber threat intelligence: Does it really help?
B Jin, E Kim, H Lee, E Bertino, D Kim, H Kim
The system can't perform the operation now. Try again later.
Articles 1–10