- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Educational Research and Pedagogy
- Coding theory and cryptography
- Education and Learning Interventions
- Digital and Cyber Forensics
- Educational Systems and Policies
- Agriculture, Soil, Plant Science
- Physical Unclonable Functions (PUFs) and Hardware Security
- Network Security and Intrusion Detection
- Internet of Things and Social Network Interactions
- Technology and Data Analysis
- Education, Safety, and Science Studies
- Innovation in Digital Healthcare Systems
- Soil Carbon and Nitrogen Dynamics
- Speech and Audio Processing
- Consumer Perception and Purchasing Behavior
- Ecology and Conservation Studies
- Advanced Authentication Protocols Security
- Video Surveillance and Tracking Methods
- Aquaculture Nutrition and Growth
- Cloud Data Security Solutions
- Digital Media Forensic Detection
- Insect and Pesticide Research
Seoul National University of Science and Technology
2015-2024
Chungnam National University
2020-2024
National Institute of Agricultural Science and Technology
2016-2024
Chonnam National University
2018-2024
Eastern Regional Research Center
2022
Agricultural Research Service
2022
Pohang University of Science and Technology
2016-2022
Sungkyunkwan University
2013-2020
American Society For Engineering Education
2020
Korea Astronomy and Space Science Institute
2003-2019
Intertwining smart manufacturing and the Internet of Things (IoT) is known as Industrial (IIoT). IIoT improves product quality reliability requires intelligent connection, real-time data processing, collaborative monitoring, automatic information processing. Recently, it has been increasingly deployed; however, multi-party processing often required in heterogeneous IIoT. The security efficiency requirements each party interacting with other partners have become a significant challenge...
The proliferation of various connected platforms, including Internet things, industrial control systems (ICSs), cars, and in-vehicle networks, has resulted in the simultaneous use multiple protocols devices. Chaotic situations caused by usage different types devices, such as heterogeneous implemented differently vendors renders adoption a flexible security solution difficult, recent deep learning-based intrusion detection system (IDS) studies. These studies optimized learning model for their...
Healthcare applications store private user data on cloud servers and perform computation operations that support several patient diagnoses. Growing cyber-attacks hospital systems result in being held at ransom. Furthermore, mathematical stored the Cloud are exposed to untrusted external entities sell for financial gain. In this paper, we propose a privacy-preserving scheme using homomorphic encryption secure medical plaintext from accessed by attackers. Secret sharing distributes...
The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has dramatically increased diversity complexity network. This change diversifies attacker’s attack vectors, increasing impact damage cyber threats. Cyber threat intelligence (CTI) technology is a proof-based security system which responds to these advanced threats proactively by analyzing sharing security-related data. However, performance CTI systems can be significantly compromised creating...
Color information plays an important role in the color image segmentation and real-time sensor, which affects result of video correct temperature value. In this paper, a novel method is proposed, based on similarity RGB space. According to luminance space, dominant determined at first, then can be calculated with proposed calculation component, creates color-class map. Next, corresponding map utilized classify pixels. Due characteristic that thermal inks feature values change real time as...
Advanced information technologies have transformed into high-level services for more efficient use of energy resources through the fusion with infrastructure. As a part these technologies, cloud is technology that maximizes efficiency organic connection between entities produce and consume energy. However, disruption or destruction systems cyberattacks can lead to incidents such as massive blackouts, which national disasters. Furthermore, since technique severity modern continue improve,...
우리나라 논토양의 토양화학성을 4년 1주기로 정점조사하여 1999부터 2011년까지의 변화를 평가하였다. 2011년 화학성 중 측정 평균값은 토양 pH가 5.7, 유기물함량은 <TEX>$26.0g\;kg^{-1}$</TEX>, 유효인산 함량은 <TEX>$131mg\;kg^{-1}$</TEX>을 나타냈다. 치환성 칼륨, 칼슘, 마그네슘 각각 0.3, 5.1, <TEX>$1.25cmol_c\;kg^{-1}$</TEX>이었고, 유효규산 <TEX>$146mg\;kg^{-1}$</TEX>이었다. 적정범위 상한기준을 1.1배 초과하였고, 마그네슘과 하한기준의 80%와 92% 수준이었다. 평균값이 증가한 항목 과다와 적정범위의 비율도 증가하는 경향을 보였고, 적정범위보다 낮음의 비율은 감소하였다. 유효인산과 치환성칼륨 및 함량의 과다 다소 감소하고 부족비율은 보였다. 따라서 양분과다 경지에 대하여는 토양검정에 의한 적정시비량을 준수하고, 규산질비료나 퇴비 등을 경지보다는 부족한 경지로...
Cyber attacks are evolving commensurate with recent developments in information security technology.Intrusion detection systems collect various types of data from computers and networks to detect threats analyze the attack information.The large amount examined make number computations low rates problematic.Feature selection is expected improve classification performance provide faster more cost-effective results.Despite feature studies conducted for intrusion systems, it difficult automate...
Cyber-threat intelligence (CTI) is a knowledge-based threat management system that addresses increasing cyber threats. The CTI creates reputation information for network resources such as IP, URL, and file hash-based on security data collected from event (SIEM) systems. This can be applied extensively in industrial infrastructures to provide an effective response process attacks. also the systems of internal IT OT Internet objects (IoT) Surveillance Control Data Acquisition (SCADA) networks....
Recently, differential-neural cryptanalysis, which combines deep learning with differential has gained attention as a powerful and practical cryptanalysis method. In this approach, neural distinguisher is trained to distinguish the target cipher specific properties from other ciphers, its statistical analysis used guess key. This approach offers advantage of enabling analyze cryptographic properties, traditionally demanding substantial time expertise. Nevertheless, black-box nature models...
A novel analysis and design method for affine fuzzy systems is proposed. Both continuous-time discrete-time cases are considered. The quadratic stability stabilizability conditions of the derived they represented in formulation bilinear matrix inequalities (BMIs). Two diffeomorphic state transformations (one linear other nonlinear) introduced to convert plant into more tractable form. conversion makes problems convex solvable directly by inequality (LMI) technique. bias terms controller...