Seungwon Shin
Seungwon Shin
Email verificata su kaist.ac.kr - Home page
Titolo
Citata da
Citata da
Anno
FRESCO: Modular Composable Security Services for Software-Defined Networks
S Shin, P Porras, V Yegneswaran, M Fong, G Gu, M Tyson
Internet Society NDSS (Feb. 2013). To appear, 2013
6632013
A security enforcement kernel for OpenFlow networks
P Porras, S Shin, V Yegneswaran, M Fong, M Tyson, G Gu
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
6112012
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
S Shin, V Yegneswaran, P Porras, G Gu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5262013
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Proceedings of the 21st international conference on World Wide Web, 71-80, 2012
3022012
Attacking software-defined networks: A first feasibility study
S Shin, G Gu
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
2962013
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
S Shin, G Gu
2012 20th IEEE international conference on network protocols (ICNP), 1-6, 2012
2372012
Rosemary: A robust, secure, and high-performance network operating system
S Shin, Y Song, T Lee, S Lee, J Chung, P Porras, V Yegneswaran, J Noh, ...
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
2342014
Model checking invariant security properties in OpenFlow
S Son, S Shin, V Yegneswaran, P Porras, G Gu
2013 IEEE international conference on communications (ICC), 1974-1979, 2013
1692013
Conficker and beyond: a large-scale empirical study
S Shin, G Gu
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
1172010
Enabling security functions with SDN: A feasibility study
C Yoon, T Park, S Lee, H Kang, S Shin, Z Zhang
Computer Networks 85, 19-35, 2015
852015
A large-scale empirical study of conficker
S Shin, G Gu, N Reddy, CP Lee
IEEE Transactions on Information Forensics and Security 7 (2), 676-690, 2011
852011
Malware prevalence in the KaZaA file-sharing network
S Shin, J Jung, H Balakrishnan
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 333-338, 2006
792006
DELTA: A Security Assessment Framework for Software-Defined Networks.
S Lee, C Yoon, C Lee, S Shin, V Yegneswaran, PA Porras
NDSS, 2017
782017
Network intrusion detection and prevention system and method thereof
SW Shin, J Oh, KY Kim, JS Jang, SW Sohn
US Patent 7,565,693, 2009
732009
Enhancing network security through software defined networking (SDN)
S Shin, L Xu, S Hong, G Gu
2016 25th international conference on computer communication and networks …, 2016
722016
A first step toward network security virtualization: From concept to prototype
S Shin, H Wang, G Gu
IEEE Transactions on Information Forensics and Security 10 (10), 2236-2249, 2015
532015
Effort: Efficient and effective bot malware detection
S Shin, Z Xu, G Gu
2012 Proceedings IEEE INFOCOM, 2846-2850, 2012
532012
Flow wars: Systemizing the attack surface and defenses in software-defined networks
C Yoon, S Lee, H Kang, T Park, S Shin, V Yegneswaran, P Porras, G Gu
IEEE/ACM Transactions on Networking 25 (6), 3514-3530, 2017
492017
Real-time network attack pattern detection system for unknown network attack and method thereof
J Oh, SW Shin, KY Kim, JS Jang, SW Sohn
US Patent 7,571,477, 2009
412009
D-SAT: detecting SYN flooding attack by two-stage statistical approach
S Shin, K Kim, J Jang
The 2005 Symposium on Applications and the Internet, 430-436, 2005
382005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20