Segui
Jaehan Kim
Titolo
Citata da
Citata da
Anno
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic
M Seo, J Kim, E Marin, M You, T Park, S Lee, S Shin, J Kim
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
42022
FuzzDocs: an automated security evaluation framework for IoT
M You, Y Kim, J Kim, M Seo, S Son, S Shin, S Lee
IEEE Access 10, 102406-102420, 2022
32022
A large-scale bitcoin abuse measurement and clustering analysis utilizing public reports
J Choi, J Kim, M Song, H Kim, N Park, M Seo, Y Jin, S Shin
IEICE TRANSACTIONS on Information and Systems 105 (7), 1296-1307, 2022
22022
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph
J Kim, M Song, M Seo, Y Jin, S Shin
2024 IEEE Symposium on Security and Privacy (SP), 20-20, 2024
2024
컨테이너 이미지 보안성 분석에 관한 연구: Docker Hub 이미지를 중심으로
유명성, 김재한, 신승원
한국통신학회논문지 47 (8), 1231-1243, 2022
2022
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–5