default search action
Insu Oh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Myoungsu Kim, Insu Oh, Kangbin Yim, Mahdi Sahlabadi, Zarina Shukur:
Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies. IEEE Access 12: 33972-34001 (2024) - [c23]Yoonji Kim, Insu Oh, Jiung Hwang, Minchan Jeong, Kangbin Yim:
Effect of DoS Attack into LiDAR Ethernet. IMIS 2024: 69-78 - [c22]Md Rezanur Islam, Kamronbek Yusupov, Munkhdelgerekh Batzorig, Insu Oh, Kangbin Yim:
Enhancing Road Safety with In-Vehicle Network Abnormal Driving Behavior Detection. IMIS 2024: 79-88 - 2023
- [j3]Rahmad Abdillah, Zarina Shukur, Masnizah Mohd, Mohd Zamri Murah, Insu Oh, Kangbin Yim:
Performance Evaluation of Phishing Classification Techniques on Various Data Sources and Schemes. IEEE Access 11: 38721-38738 (2023) - [c21]Kamronbek Yusupov, Md Rezanur Islam, Insu Oh, Kangbin Yim:
Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System. BWCCA 2023: 302-311 - [c20]Md Rezanur Islam, Insu Oh, Muminov Ibrokhim Botir Ugli, Kangbin Yim:
Enhancing In-Vehicle Network Security Through Bitstream Feature Extraction-Based Intrusion Detection. IC3 2023: 224-229 - [c19]Md Rezanur Islam, Insu Oh, Kangbin Yim:
Universal Intrusion Detection System on In-Vehicle Network. IMIS 2023: 78-85 - [c18]Baatarsuren Sukhbaatar, Md Rezanur Islam, Kamronbek Yuspov, Insu Oh, Kangbin Yim:
A Lightweight Intrusion Detection System on In-Vehicle Network Using Polynomial Features. IMIS 2023: 96-102 - [c17]Purevbaatar Ganbold, Insu Oh, Yoonji Kim, Kangbin Yim:
Artifact Extraction Methods for In-Vehicle Infotainment System. INCoS 2023: 68-78 - [c16]Munkhdelgerekh Batzorig, Yeji Koh, Insu Oh, Kangbin Yim:
A Novel Attack Scenario Dataset Collection for Intrusion Detection System in CAN Network. NBiS 2023: 130-141 - 2022
- [c15]Insu Oh, Munkhdelgerekh Batzorig, Baasantogtokh Duulga, Kangbin Yim:
Hardware-Software Interworking Real-Time V2X Dynamic Analysis Method. BWCCA 2022: 215-223 - [c14]Md Rezanur Islam, Insu Oh, Munkhdelgerekh Batzorig, Myoungsu Kim, Kangbin Yim:
Wavelet Transform Based PID Sequence Analysis for IDS on CAN Protocol. IMIS 2022: 85-96 - [c13]Yeji Koh, Seoyeon Kim, Yoonji Kim, Insu Oh, Kangbin Yim:
Efficient CAN Dataset Collection Method for Accurate Security Threat Analysis on Vehicle Internal Network. IMIS 2022: 97-107 - 2021
- [c12]Chanmin Kim, Insu Oh, Yeji Koh, Myoungsu Kim, Kangbin Yim:
In-vehicle Network IDS Using Message Time Interval Infrastructure. BWCCA 2021: 111-119 - [c11]Munkhdelgerekh Batzorig, Insu Oh, Chanmin Kim, Yeji Koh, Kangbin Yim:
SPEC: Frame Filtering for CAN Protocol on ECU. BWCCA 2021: 284-293 - [c10]Md Rezanur Islam, Insu Oh, Munkhdelgerekh Batzorig, Seoyeon Kim, Kangbin Yim:
A Concept of IDS for CAN Protocol Based on Statics Theory. BWCCA 2021: 294-302 - 2020
- [c9]Insu Oh, Eunseon Jeong, Junyoung Park, Taeyoung Jeong, Junghoon Park, Kangbin Yim:
Cyber Attack Scenarios in Cooperative Automated Driving. BWCCA 2020: 416-425 - [c8]Youngho An, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:
Design and Implementation of a Novel Testbed for Automotive Security Analysis. IMIS 2020: 234-243 - [c7]Eunseon Jeong, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim:
Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC Runtime. IMIS 2020: 457-467
2010 – 2019
- 2019
- [j2]Insu Oh, Taeeun Kim, Kangbin Yim, Sun-Young Lee:
A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing. Sensors 19(18): 3869 (2019) - 2018
- [j1]Kyungroul Lee, Insu Oh, Yeunsu Lee, Hyeji Lee, Kangbin Yim, Jungtaek Seo:
A Study on a Secure USB Mechanism That Prevents the Exposure of Authentication Information for Smart Human Care Services. J. Sensors 2018: 2089626:1-2089626:17 (2018) - [c6]Kyungroul Lee, Insu Oh, Wonyoung Jang, Chang Choi, Kangbin Yim:
Vulnerability Analysis on a Secure USB: Based on a Commercial Product A. BWCCA 2018: 498-502 - [c5]Insu Oh, Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Hyobeom Ahn, Kangbin Yim:
Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface. IMIS 2018: 212-219 - 2017
- [c4]Kyungroul Lee, Habin Yim, Insu Oh, Kangbin Yim:
Study on the Transaction Linkage Technique Combining the Designated Terminal. BDTA 2017: 3-8 - [c3]Insu Oh, Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim:
Security Assessment of the Image-Based Authentication Using Screen-Capture Tools. IMIS 2017: 156-161 - [c2]Insu Oh, Kyungroul Lee, Kangbin Yim:
A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function. WISA 2017: 236-245 - 2016
- [c1]Kyungroul Lee, Insu Oh, Kangbin Yim:
Ransomware-Prevention Technique Using Key Backup. BDTA 2016: 105-114
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-10 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint