Personal information

Activities

Works (7)

V2TSA: Analysis of Vulnerability to Attack Techniques Using a Semantic Approach

IEEE Access
2024 | Journal article
Contributors: Do-Yeon Kim; Seong-Su Yoon; Ieck-Chae Euom
Source: check_circle
Crossref

Research on Digital Forensics Analyzing Heterogeneous Internet of Things Incident Investigations

Applied Sciences
2024-01-29 | Journal article
Contributors: Dong-Hyuk Shin; Seung-Ju Han; Yu-Bin Kim; Ieck-Chae Euom
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Vulnerability Exploitation Risk Assessment Based on Offensive Security Approach

Applied Sciences
2023-11-09 | Journal article
Contributors: Seong-Su Yoon; Do-Yeon Kim; Ka-Kyung Kim; Ieck-Chae Euom
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation

Sensors
2022-08 | Journal article | Author
Contributors: Dong-Hyuk Shin; Ga-Yeong Kim; IeckChae Euom
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

Vulnerabilities of Live-Streaming Services in Korea

Sensors
2022-05 | Journal article | Author
Contributors: Sunhong Hwang; Ga-Yeong Kim; Su-Hwan Myeong; Tai-Sic Yun; Seung-Min Yoon; Tai-ho Kim; IeckChae Euom
Source: check_circle
Multidisciplinary Digital Publishing Institute
grade
Preferred source (of 2)‎

Delegation-Based Personal Data Processing Request Notarization Framework for GDPR Based on Private Blockchain

Applied Sciences
2021-11-10 | Journal article
Contributors: Sung-Soo Jung; Sang-Joon Lee; Ieck-Chae Euom
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files

Symmetry
2020-09-30 | Journal article
Contributors: Dong-Seob Jung; Sang-Joon Lee; Ieck-Chae Euom
Source: check_circle
Crossref