International Journal(SCI/SCIE)


  • Jongbin Ko, Seokjun Lee, Yong-hun Lim, Seong-ho Ju, Taeshik Shon, A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems,IEICE Transactions on Information and Systems Vol. E96.D (2013) No. 9 pp. 2021-2025
  • Shehzad Ashraf Chaudhry, Naixue Xiong,Changhoon Lee, Taeshik Shon, A Privacy Preserving Authentication Scheme for Roaming in Ubiquitous networks, Cluster Computing, Springer, June 2017, Volume 20, Issue 2, pp1223-1236
  • Seokjun Lee, Soowoong Eo, Wooyeon Jo, Taeshik Shon, ExtSFR : Scalable File Recovery Framework based on Ext File System, Submitted to Digital Investigation
  • Shehzad Ashraf Chaudhry, Muhammad Tawab Khan, Muhammad Khurram Khan, Taeshik Shon, A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography, Journal of Medical Systems, Springer, November 2016, 40:230
  • Sungjin Kim, Taeshik Shon, Field Classification based Novel Fuzzing Case Generation for ICS Protocols, JoS, Springer, Online Published, February 2017
  • Minki Cha, Jung-Hyok Kwon, SungJin Kim, Taeshik Shon, Eui-Jik Kim, Data aggregation gateway framework for CoAP group communications, Symmetry, MDPI, November 2016, 8(12), 138
  • Shehzad Ashraf Chaudhry, I Luk Kim, Seungmin Rho, Taeshik Shon, An Improved Anonymous Authentication Scheme for Distributed Mobile Cloud Computing Services, Cluster Computing, Springer
  • Wooyeon Jo, Taeshik Shon, Digital Forensic Science Approach by File Recovery Research, JOS, Springer, Online Published November 2016
  • Sungmoon Kwon, Taeshik Shon, Countermeasure for Disabling Reassembly Attack in DNP3 Communications, IEICE Transactions on Information and Systems, Vol.E No. , 2017, pp.-
  • Shehzad Ashraf Chaudhry, Aiiad Albeshri, Naixue Xiong, Changhoon Lee, Taeshik Shon, A privacy preserving authentication scheme for roaming in ubiquitous networks, Cluster Computing, Springer, June 2017, Volume 20, Issue 2, pp1223-1236
  • Hyo Hyun Choi, Su Hyun Nam, Taeshik Shon, Two Tier Search Scheme using micro UAV Swarm, WPC, Springer, March 2017, Volume 93, Issue 2, pp 349-363
  • Tewodros Legesse Munea, I Luk Kim, Taeshik Shon, Design and Implementation of Fuzzing Framework based on IoT Applications, WPC, Springer,March 2017, Volume 93, Issue 2, pp 365-382

  • Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash, Taeshik Shon, Muhammad Sher, An improved and robust biometrics-based three factor authentication scheme for multiserver environments, Journal of Supercomputing, Springer, Online Published, December 2015
  • Shehzad Ashraf Chaudhry, Mohammad S Farash, Husnain Naqvi, SK H Islam, Taeshik Shon, A robust and efficient privacy aware handover authentication scheme for wireless networks, Wireless Pervasive Computing, Springer, March 2017, Volume 93, Issue 2, pp 311-335
  • Tewodros Legesse Munea, Hyunwoo Lim, Taeshik Shon, Network Protocol Fuzz-testing for Information Systems and Applications : A Survey and Taxonomy, Multimedia Tools and Applications, Springer, November 2016, Volume 75, Issue 22, pp 14745-14757 (JCR 2015 Ranking 29%)
  • Yongmin Park, Hyunsoo Chang, Taeshik Shon, Data Investigation based on XFS File System Metadata, Multimedia Tools and Applications, Springer, November 2016, Volume 75, Issue 22, pp 14721-14743(JCR 2015 Ranking 29%)

  • Seokcheol Lee, Taeshik Shon, User Privacy-Enhanced Security Architecture for Home Area Network of Smartgrid, MTAP, Springer, October 2016, Volume 75, Issue 20, pp 12749-12764(JCR 2015 Ranking 29%)
  • Myungwhan Choi, Paul Vincent S. Contreras, Taeshik Shon, Hyo Hyun Choi, Exploring an area by groups of UAVs in the presence of a refueling base, Journal of Supercomputing, Springer, September 2016, Volume 72, Issue 9, pp 3409-3427
  • Hyunguk Yoo, Taeshik Shon, Challenges and Research Directions for Heterogeneous Cyber Physical System based on IEC 61850:Vulnerability, Security Requirement, and Security Architecture, Future Generation Computing System, Elsevier, Volume 61, Pages 128-136, August 2016(JCR 2015 Ranking 10%)
  • Eui-Jik Kim, Jung-Hyok Kwon, Ken Choi, Taeshik Shon, Unified Medium Access Control Architecture for Resource-Constrained Machine-to-Machine Devices, ACM Transactions on Embedded Computing Systems, Volume 15 Issue 2, May 2016
  • Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, A lightweight message authentication scheme for Smart Grid communications in power sector, CEE, Elsevier, Volume 52, May 2016, Pages 114-124
  • Jongbin Ko, Seokjun Lee, Taeshik Shon, Towards A Novel Quantification Approach based on Smart Grid Network Vulnerability Score, International Journal of Energy Research, Wiley, Volume 40, Issue 310 Pages 298-312, March 2016(JCR 2014 Ranking 2.9%)
  • Kyumin Cho, Hyunwoo Lim, Taeshik Shon, Seungjoo Kim, A Novel Security Architecture for Smart Grid Communication, Journal of Supercomputing, Springer, January 2016, Volume 72, Issue 1, pp 214-231
  • Jung-Hyok Kwon, Hyun Soo Chang, Taeshik Shon, Jai-Jin Jung, and Eui-Jik Kim, Neighbor stability-based VANET clustering for urban vehicular environments, Journal of Supercomputing, Springer,January 2016, Volume 72, Issue 1, pp 161-176
  • Sania Yaqoob, Taeshik Shon, A Hybrid EV Authentication Approach in Smart grid based Distributed Network, Ad hoc & Sensor Wireless Networks, Volume 31, Number 1-4, pp 89-99, 2016

  • Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, Muhammad Sher, Mohammad Sabzinejad Farash, Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems, Journal of Medical Systems, Volume 39 Issue 6, June 2015 pages 1-11
  • Hyunhee Park, Seunghyun Park, Taeshik Shon, Eui-Jik Kim, Multi-Hop-based Opportunistic Concurrent Directional Transmission in 60 GHz WPANs, Multimedia Tools and Applications, Springer, March 2015, Volume 74, Issue 5, pp 1627-1644
  • JungTaek Seo,Sukjun Lee, Taeshik Shon, A Study on Memory Dump Analysis based on Digital Forensic Tools, Peer-to-Peer Networking and Applications, Springer, Volume 8, Issue 4, pp 694-703, July 2015
  • Kyusuk Han, Taeshik Shon, Authentication of Mobile Applications through Various Local Distributors, Multimedia Tools and Applications,Springer, March 2015, Volume 74, Issue 5, pp 1541-1555 (JCR 2013 Ranking 34%, IF=1.058)
  • Kangseok Kim, Wonjeong Ha, Okkyung Choi, Hongjin Yeh, Jai-Hoon Kim, Manpyo Hong, Taeshik Shon, An interactive pervasive whiteboard based on MVC architecture for ubiquitous collaboration, Multimedia Tools and Applications, Springer, March 2015, Volume 74, Issue 5, pp 1557-1576 (JCR 2013 Ranking 34%, IF=1.058)
  • Hyunguk Yoo, Taeshik Shon, Novel Approach for Detecting Network Anomalies for Substation Automation based on IEC 61850, Multimedia Tools and Applications, January 2015, Volume 74, Issue 1, pp 303-318, Springer(JCR 2013 Ranking 34%)

  • Soobok Shin, Taeshik Shon, Hongjin Yeh, Kangseok Kim, An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment, Peer-to-Peer Networking and Applications, Springer, December 2014, Volume 7, Issue 4, pp 612-619
  • Sukjun Lee, Taeshik Shon, Improved deleted file recovery technique for Ext2/3 Filesystem, JoS, October 2014, Volume 70, Issue 1, pp 20-30
  • Irug Kim, Jungtaek Seo, Taeshik Shon, Jongsub Moon, A novel approach to detection of mobile rogue access points, Security and Communication Networks, Wiley, Volume 7, Issue 10, pages 1510-1516, October 2014
  • Sekie Amanuel Majore, Hyunguk Yoo, Taeshik Shon, Secure and Reliable Electronic Record Management System using Digital Forensic Technologies, Journal of Supercomputing, Springer, October 2014, Volume 70, Issue 1, pp 149-165
  • Kyusuk Han, Taeshik Shon, Software Authority Transition through Multiple Distributors, TSWJ, Hindawi, Volume 2014 (2014),Published July 2014, Article ID 920534, 11 pages
  • Sukjun Lee, Taeshik Shon, Physical Memory Collection and Analysis in SmartGrid Embedded Platform, MONET, ACM/Springer, Volume 19 Issue 3, June 2014, Pages 382-391
  • Taeshik Shon, Jaeik Cho, Kyusunk Han, Hyohyun Choi, Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction, Mobile Networks and Applications, ACM/Springer, Volume 19 Issue 3, June 2014, Pages 404-413
  • Jongbin Ko, Hyunwoo Lim, Seokjun Lee, Taeshik Shon, AVQS : Attack Route based Vulnerability Quantification Scheme for Smartgrid, TSWJ, Hindawi, Volume 2014 (2014),Published July 2014, Article ID 920534, 11 pages
  • Hyo Hyun Choi, HyunSoo Choi, Myungwhan Choi, Taeshik Shon, and ByoungSeob Park, An Obstacle Avoidance Scheme Maintaining Connectivity for Micro Unmanned Aerial Vehicles, International Journal of Distributed Sensor Networks,Volume 2014 (2014),Published April 2014, Article ID 920534
  • Yunlong Zhang, Joohee Kim, Ken Choi and Taeshik Shon, High Performance and Low Power Hardware Implementation Methodology for Cryptographic Hash Functions, International Journal of Distributed Sensor Networks,Volume 2014 (2014), Published March 2014, Article ID 736312
  • Hyo Hyun Choi, Su Hyun Nam, Taeshik Shon, Myungwhan Choi, Information Delivery Scheme of micro UAVs having limited communication range during tracking the moving target, Journal of Supercomputing, Springer, November 2013, Volume 66, Issue 2, pp 950-972
  • Okkyung Choi, Seolhwa Han, Kangseok Kim, Hongjin Yeh, Taesik Shon, Secure Mobile Payment Service using Vibration Cues on NFC Smartphone, Sensor Letters, American Scientific Publishers, Sept 2013, Vol 11, No 9, pp1750-1754
  • Sania Yaqoob, Taeshik Shon, Secure EV Authentication using Aggregator Load Management in Smart Grid, Sensor Letters, American Scientific Publishers, Sept 2013, Vol 11, No 9, pp1704-1714
  • Choi Okkyung, Kim Kangseok, Shon, Taeshik, Hong Manpyo, Yeh Hongjin, Kim Jaihoon, Ku Yunlim, Two-Factor Authentication System Based on Extended OTP Mechanism, International Journal of Computer Mathematics, Taylor & Francis,Volume 90, Issue 12, December 2013, pages 2515-2529
  • Eui-Jik Kim, Sungkwan Youm, Taeshik Shon, and Chul-Hee Kang, Stable Pairwise Time Synchronization in the Application Layer for Capillary Machine-to-Machine Networks, Computers & Electrical Engineering, Elsevier, Volume 39, Issue 7, October 2013, Pages 2207-2213
  • Jongbin Ko, Seokjun Lee, Yong-hun Lim, Seong-ho Ju, Taeshik Shon, A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems, IEICE Transaction on Information and Systems, IEICE, , Vol.E96-D, No.9, Sept. 1 2013, pp.


  • Eui-Jik Kim, Sungkwan Youm, Taeshik Shon, and Chul-Hee Kang, Asynchronous Inter-Network Interference Avoidance for Wireless Body Area Networks, Journal of Supercomputing, Springer, Online Published, November 2012
  • Manhyun Chung, Young Hoon Lee, Taeshik Shon, Jongsub Moon, A Security Model for IPTV with One-Time Password and Conditional Access System for Smart Mobile Platforms, Journal of Telecommunication Systems, Online Published, 14 September 2011


  • Kyusuk Han, Jangseong Kim, Taeshik Shon, Daesik Ko, A Novel Secure Key Paring Protocol for RF4CE Ubiquitous Smart Home Systems,Personal and Ubiquitous Computing, Springer, Online Published, 24 May 2012
  • Jaeik Cho, Taeshik Shon, Ken Choi, and Jongsub Moon, Dynamic Learning Model Update of Hybrid-Classifiers for Intrusion Detection, Journal of Supercomputing, Springer, Online Published, 23 September 2011
  • Choi Okkyung, Kim Kangseok, Shon, Taeshik, Hong Manpyo, Yeh Hongjin, Kim Jaihoon, Ku Yunlim, Two-Factor Authentication System Based on Extended OTP Mechanism, International Journal of Computer Mathematics, Taylor & Francis, Online Published Nov 2012
  • Junghun Park, Okkyung Choi, Kangseok Kim, Taeshic Shon, Manpyo Hong, Hongjin Yeh, Two-Factor Authentication Technology on Smartphone, Informaiton-An International Interdisciplinary Journal, INT INFORMATION INST (Accepted)
  • Jaeik Cho, Taeshik Shon, Ken Choi, Jungtaek Seo, Jongsub Moon, Simple Security Protocols based on EPC Global Generation, Informaiton-An International Interdisciplinary Journal, INT INFORMATION INST (Accepted)
  • Zeen Kim, Jangseong Kim, Doyoung Chung, Kwangjo Kim, Taeshik Shon, A Scalable Privacy-preserving Authentication Protocol for Secure Vehicular Communications, Informaiton-An International Interdisciplinary Journal, INT INFORMATION INST (Accepted)
  • Hyunhee Park, Eui-Jik Kim, Taeshik Shon, Chul-Hee Kang, Adaptive anomaly control for alleviating the exclusive channel occupation in wireless networks, IJCS, Wiley, On-line Published Apr 2012
  • Bonhyun Koo, Kyusuk Han, Jonghyuk Park, and Taeshik Shon, Design and Implementation of a Wireless Sensor Network Architecture using Smart Mobile Devices, Journal of Telecommunication Systems, Online Published, 13 July 2011
  • Junwon Lee, Jaeik Cho, Jungtaek Seo, Taeshik Shon, Dongho Won, A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed, MONET, ACM Springer, On-line Published May 2012
  • Jaeik Cho, Ken Choi, Taeshik Shon, Jongsub Moon, Visualization of Abnormal Behavior Detection using Parallel Coordinate and Correspondence Analysis, Informaiton-An International Interdisciplinary Journal, INT INFORMATION INST, Vol. 15, No. , 2012, pp.


  • Taeshik Shon, James J.(Jong Hyuk) Park, Doo-Soon Park, Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device, IJCS, Weily, Volume 5, Issue 9, pp 974-986, September 2012
  • Eui-jik Kim, Taeshik Shon, James Jong Hyuk Park, Chul-Hee Kang, Latency Bounded and Energy Efficient MAC for Wireless Sensor Networks, IET Communications, volume 6, Issue 14, September 2012, pp. 2115-2257
  • Kyusuk Han, Hyeran Mun, Chan Yeob Yeun, Taeshik Shon, Jonghyuk Park, Secure and Efficient Public Key Management In Next Generation Mobile Networks, Personal and Ubiquitous Computing, Springer, Volume 16, Issue 6, pp 677-684 August 2012
  • Jongbin Ko, JungTaek Seo, Euijik Kim, Taeshik Shon, Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-enabled Vehicles, IJARS, InTech, Vol. 9, No. 5, May 2012, pp 1-9.
  • Hyunhee Park, Taeshik Shon, Seunghyun Park and Eui-Jik Kim, An Adaptive Allocation Algorithm using Directional CSMA/CA over mmWave Wireless Personal Area Networks, IJARS, InTech, Vol. 9, No. 5, May 2012, pp 1-9.
  • Kyusuk Han, Kwangjo Kim, Wook Choi, Hyohyun Choi, Jungtaek Seo, Taeshik Shon, Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks, Ad Hoc & Sensor Wireless Networks, Volume 14 , Number 3-4 , Apr 2012, pp 251-269, ISSN: 1551-9899
  • Mario Ciampi, Taeshik Shon, A Collaborative Architecture for Healthcare Applications, Informaiton-An International Interdisciplinary Journal, INT INFORMATION INST, Vol. 15, No. 2, Feb 2012, pp. 607-618
  • Jangseong Kim, Kwangjo Kim and Taeshik Shon, An efficient and Secure Service Discovery Protocol for Ubiquitous Computing, IEICE TRANSACTIONS on Information and Systems, Vol.E95-D No.1, Jan 2012, pp.117-125, ISSN: 0916-8516
  • Jangseong Kim, Taeshik Shon, Kwangjo Kim, A Scalable and Privacy-preserving Child-care & Safety Service in Ubiquitous Computing Environment, Mathematical and Computer Modelling, Elsevier, Volume 55, Issues 1-2, Jan 2012, pp 45-57,


  • Bonhyun Koo, Taeshik Shonx, Wook Choi, and Jonghyuk Park, A Novel Low-Power RF4CE-based Communication Framework for Multimedia System Control, International Journal of Communication Systems, Wiely, Volume 24, Issue 10, pp. 1340-1353, John Wiley & Sons,Ltd., October 2011
  • Kyusuk Han, Youngjoon Seo, Sungjune Yoon, James J.(Jong Hyuk) Park, Taeshik Shon, Providing Secure Vertical Handoff in SARAH for Heterogeneous Networks, Journal of Network and Computer Application, Elsevier, Vol. 34, Issue 6, Nov. 2011
  • Kyusuk Han, Kwangjo Kim, Jonghyuk Park, Taeshik Shon, Efficient Sensor Node Authentication in 3G-WSN Integrated Networks, IET Communications, Volume 5, Issue 12, Aug. 2011, pp.1633-1784
  • Kyusuk Han, Kwangjo Kim, Taeshik Shon, Design and Implementation of One-way Key Agreement Model for Enhancing VoIP Internet Phone Security, IEICE TRANSACTIONS on Communications, Vol.E94-B, No.08, pp.2235-2238, Aug.2011
  • Kyusuk Han, Kwangjo Kim, Taeshik Shon, Enhancing Credibility of Location Based Service using Multiple Sensing Technologies, IEICE TRANSACTIONS on Information and Systems, Vol.E94-D No.6, June 2011, pp. 1181-1184, ISSN: 0916-8516
  • Eui-Jik Kim , Taeshik Shon, James Jong Hyuk Park and Young-Sik Jeong, Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks, Sensors, Volume 11, No. 7, June 27 2011, pp. 6629-6644, ISSN 1424-8220
  • Jangseong Kim, Kwangjo Kim and Taeshik Shon, An Efficient and Scalable Re-authentication Protocol over Wireless Sensor Network, IEEE Transactions on Consumer Electronics, Vol 57, Issues 2, May 31 2011, pp 516-522, ISSN: 0098-3063
  • Kyusuk Han, Chan Yeob Yeun, Taeshik Shon(s), Jonghyuk Park and Kwangjo Kim, A Scalable and Efficient Key Escrow Model for Lawful Interceptions of IDBC based Secure Communication, International Journal of Communication Systems, John Wiley & Sons, Vol. 24, Issue 4, Apr 2011, pp. 415-552, ISSN: 1074-5351
  • Taeshik Shon, Bonhyun Koo, Kyusuk Han, Jonghyuk Park, and Yongsuk Park, WiFi Auto Configuration Architecture using ZigBee RF4CE for Pervasive Environments, Journal of Internet Technology, Vol. 12 No. 2, Mar 2011, pp. 337-346, ISSN : 1607-9264
  • Taeshik Shon, Hyohyun Choi, "An Approach for Efficient Hybrid Reliable Transport in IEEE 802.15.4-based Wireless Sensor Network", Ad Hoc & Sensor Wireless Networks, Volume 11 , Number 3 , Mar 2011, pp 199-217 , ISSN: 1551-9899
  • Jangseong Kim, Taeshik Shon, and Kwangjo Kim, Location-aware and privacy-preserving approach for child-care and safety in ubiquitous computing environment, IEICE TRANSACTIONS on Communications, Vol.E94-B, No.3, Mar. 1 2011, pp. 686-689, ISSN: 0916-8516
  • Taeshik Shon, Kyusuk Han, Jonghyuk Park, Hangbae Chang, "A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets," EURASIP Journal on Wireless Communications and Networking, vol. 2011, Article ID 210746, 14 pages, 2011, ISSN: 1687-1499
  • Taeshik Shonx, Kyusuk Han, Jong Hyuk Park, A Secure and Robust Connectivity Architecture for Smart Devices and Applications, EURASIP Journal on Wireless Communications and Networking, Volume 2011 (2011), Article ID 176393, 12 pages, Dec 2010, ISSN: 1687-1499


International Conference


  • Keunho Park, Taeshik Shon, Cvss Consideration in Healthcare Domain, PlatCon-17, 2017
  • Hyunguk Yoo, Taeshik Shon, Inferring State Machine using Hybrid Teacher, IEEE International Conference on Cyber, Physical, and Social Computing (CPSCom), 2016
  • Seokjun Lee, Jongwan Kim, Hyunguk Yoo, Taeshik Shon, Case Studies for Analyzing DLMS/COSEM-based Smart Meter Vulnerabilities in Korea, IEEE International Conference on Green Computing and Communications (GreenCom), 2016
  • Seokjun Lee, Hyunguk Yoo, Jungtaek Seo, Taeshik Shon, Packet Diversity-based Anomaly Detection System with OCSVM and Representative Model, CPSCom2016
  • Hyunguk Yoo, Taeshik Shon, Grammar-based Adaptive Fuzzing: Evaluation on SCADA Modbus Protocol, IEEE International Conference on Smart Grid Communications (SmartGridComm), 2016, pp. 557-563
  • Keunho Park, Sungmoon Kwon, Sungjin Kim, Taeshik Shon, Digital Forensic Consideration for Financial IT Security, Future Technologies Conference (FTC), 2016, pp. 1025-1029
  • Seokcheol Lee, Taeshik Shon, Open Source Intelligence base Cyber Threat Inspection Framework for Critical Infrastructures, Future Technologies Conference (FTC), 2016, pp. 1030-1033
  • SungJin Kim, WooYeon Jo, Taeshik Shon, A novel vulnerability analysis approach to generate fuzzing test case in industrial control systems, IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2016, pp566-570
  • WooYeon Jo, Hyunsoo Chang, Taeshik Shon, Digital Forensic Approach for File Recovery in Unix Systems, IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2016, pp562-565
  • HyunJin Kim, Seokcheol Lee, SungJin Kim, Taeshik Shon, Reliablity Enhanced Communication Guidance for Electric Utilities based on Regulatory standard, ICITCS, 2015, pp465-468
  • Soowoong Eo, Wooyeon Jo, Seokjun Lee, Taeshik Shon, A Phase of Deleted File Recovery for Digital Forensics Research in Tizen, ICITCS, 2015, pp362-364
  • Hyun Soo Chang, Seokjun Lee, Taeshik Shon, Security Threat Analysis Case Study: Using non-malicious Mobile Game and Messenger Applications, BAI, 2015, pp1665-1674
  • SungJin Kim, Taeshik Shon, The Intrusion Detection Method for MMS Protocol, PlatCon-15, 2015, pp146-147
  • Hyun Soo Chang, Taeshik Shon, Duplicated Session Authentication Vulnerability of Telegram Messenger, PlatCon-15, 2015, pp178-179
  • Hyunwoo Lim, Taeshik Shon, DLMS/COSEM Fuzzing for Vulnerability Detection, PlatCon-15, 2015, pp188-189
  • Eui-Jik Kim, Taeshik Shon, Medium Access Control Framework for M2M Devices, PlatCon-15, 2015, pp214-215
  • Seokcheol Lee, Hyunwoo Lim, Woong Go, Haeryong Park, Taeshik Shon, Logical Architecture of HAN-Centric Smartgrid Model, PlatCon-15, 2015, pp41-42
  • SungJin Kim, HyunSoo Chng, Taeshik Shon, Survey on Security techniques for AMI Metering System, Volume 2014, 2014 International Soc Design Conference (ISOCC), pp 192-193, 2014
  • Yongmin Park, Seokjun Lee, Jongwan Kim, Taeshik Shon, Applying Digital Forensics in Various Application Fields : Required Elements for Having Legal Force, Volume 2014, 2014 International Conference on IT Convergence and Security (ICITCS), pp 194-197, 2014
  • Seokcheol Lee, Yongmin Park, Hyunwoo Lim, Taeshik Shon, Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 based Electric Vehicle Charging Technology, Volume 2014, 2014 International Conference on IT Convergence and Security (ICITCS), pp 190-193, 2014
  • SungMoon Kwon, HyungUk Yoo, Taeshik Shon, GunWoong Lee, Scenario-based Attack Route on Industrial Control System, Volume 2014, 2014 International Conference on IT Convergence and Security (ICITCS), pp 198-200, 2014
  • Hyunwoo Lim, Jongbin Ko, Seokjun Lee, Jongwan Kim, Mijoo Kim, Taeshik Shon, Security Architecture Model for Smart Grid Communication Systems, Volume 2013, 2013 International Conference on IT Convergence and Security (ICITCS), pp 1-4, 2013

  • Kyusuk Han, Taeshik Shon, Enhancing Performance of Mobile Node Authentication with Practical Security, Lecture Notes in Electrical Engineering, 1, Volume 107, IT Convergence and Services, Part 1, pp 135-139, 2011
  • Zeen Kim, Jangseong Kim, Kwangjo Kim, Imsung Choi, Taeshik Shon, Untraceable and Serverless RFID Authentication and Search Protocols, 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011, PP. 278-283
  • Jangseong Kim, Joonsang Baek, Taeshik Shon, "Design of secure key agreement protocol for pairing in RF4CE", 2010 International Conference for Internet Technology and Secured Transactions (ICITST), 2010, PP. 1-5
  • Bonhyun Koo, Taewon Ahn, JungSik In, Youngsuk Park, Taeshik Shon, "R-URC: RF4CE-Based Universal Remote Control Framework Using Smartphone", 2010 International Conference on Computational Science and Its Applications (ICCSA), 2010, PP. 311-314
  • Taeshik Sohn, Zeen Kim, Junhyun Yim, Jangseong Kim, Kwangjo Kim, "Traceable Anonymous Authentication Scheme for Vehicular Ad-hoc Networks", 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011, pp. 250-255
  • Taeshik Shon , Yongsuk Park, "Implementation of RF4CE-Based Wireless Auto Configuration Architecture for Ubiquitous Smart Home", 2010 International Conference on Complex, Intelligent and Software Intensive Systems, February 2010, pp. 779-783
  • Eui-Jik Kim , Jeongsik In , Taeshik Shon , Yongsuk Park , Bong Wan Jun, Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks, 2009 International Conference on Network-Based Information Systems, August 2009, pp. 115-120
  • Bonhyun Koo, Hyohyun Choi, Taeshik Shon, "WIVA: WSN Monitoring Framework Based on 3D Visualization and Augmented Reality in Mobile Devices", 7th International Conference on Smart Homes and Health Telematics, ICOST 2009, France, July 2009, Lecture Notes in Computer Science 5597, Springer Berlin Heidelberg, pp 158-165
  • Taeshik Shon, Bonhyun Koo, Hyohyun Choi, Yongsuk Park, Security Architecture for IEEE 802.15.4-based Wireless Sensor Network, Wireless Pervasive Computing, 2009. ISWPC 2009. 4th International Symposium on, Feb 2009 , pp 1 - 5
  • Taeshik Shon, Hyuhyun Choi, Towards the Implementation of Reliable Data Transmission for 802.15.4-Based Wireless Sensor Networks,Ubiquitous Intelligence and Computing 2008, Lecture Notes in Computer Science 5061, Springer Berlin / Heidelberg, pp 363-372, 06 2008

  • Taeshik Shon, Wook Choi, An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions, Network-Based Information Systems 2007, Lecture Notes in Computer Science 4658, Springer Berlin / Heidelberg, pp 88-97, August 2007
  • Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jungtaek Seo and Jongsub Moon, An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows, Advanced Intelligent Computing Theories and Applications ICIC 2007, Lecture Notes in Computer Science 4681, Springer Berlin / Heidelberg, July 2007, pp 646-655
  • Wook Choi, Taeshik Shon, Hyohyun Choi, Yong Lee, "Designing a Novel Unlicensed Nomadic Access Relay Station in IEEE 802.16-based Wireless Access Networks", 2007 IEEE 65th Vehicular Technology Conference VTC2007-Spring, 22 - 25 April 2007, Dublin, Ireland
  • Jung-Taek Seo , Yun-ju Kim , Eung-Ki Park , Sang-won Lee , Taeshik Shon and Jongsub Moon, Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms, Fuzzy Systems and Knowledge Discovery 2006, Lecture Notes in Computer Science 4223, Springer Berlin / Heidelberg, Sept 2006, pp 716-724
  • Taeshik Shon, Yongdae Kim, Cheolwon Lee, Jongsub Moon, "A Machine Learning Framework for Network Anomaly Detection using SVM and GA", IEEE IAW 2005
  • Taeshik Shon, Wook Choi, "An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions", The 1st International Conference on Network-Based Information Systems, Regensburg, Germany, Sept. 3 - 7, LNCS 4658, pp. 88-97, 2007
  • MinSoo Lee, Taeshik Shon, KyuHyung Cho, Manhyun Chung, and JongSub Moon, "An Approach for Classifying Internet Worms based on Temporal Behaviors and Packet Flows", 2007 International Conference on Intelligent Computing (ICIC' 07), August 21-24, 2007, Qingdao China, LNCS 4681, pp. 646-655, 2007
  • Jung-Taek Seo, Jongsub Moon, Yun-ju Kim, Sang-won Lee, Taeshik Shon, Eung-Ki Park, "Design and Implement of the Patch Management System for Removing Security Vulnerability in Multi-Platforms", the Second International Conference on Natural Computation (ICNC'06) and the Third International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'06), September 24-28, Xi'-an, China, 2006, Lecture Notes in Computer Science 4223, pages 716-724
  • Taeshik Shon, Jungtaek Seo, Jongsub Moon, "SVM Approach with a Genetic Algorithm for Network Intrusion Detection", The 20th International Symposium on Computer and Information Sciences, ISCIS 2005, October 26-28, 2005, Istanbul, Turkey, Lecture Notes in Computer Science 3733, pp. 224-233, 2005.
  • Jungtaek Seo, Cheolho Lee, Taeshik Shon, Kyu-Hyung Cho, Jongsub Moon, "A New DDoS Detection Model Using Multiple SVMs and TRA", Embedded and Ubiquitous Computing: EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Lecture Notes in Computer Science 3823, Springer-Verlag

  • Jung-Taek Seo, Cheol-Ho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon, "Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks", Network and Parallel Computing: IFIP International Conference, NPC 2005, Beijing, China, November 30 - December 3, 2005, LNCS 3779
  • Jungtaek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon , "PPF Model with CTNT to Defend Web Server from DDoS Attack", Embedded and Ubiquitous Computing: EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Lecture Notes in Computer Science 3823, Springer-Verlag
  • Jungtaek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon, " SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing", Grid and Cooperative Computing - GCC 2005: 4th International Conference, Beijing, China, November 30 - December 3, 2005, Lecture Notes in Computer Science 3795, Springer-Verlag
  • Taeshik Shon, Jongsub Moon, Hongmin Choi, "Efficiency Evaluation for Key Distribution Models among Satellite Terminals", The 2004 IFIP International Conference on Intelligence in Communication Systems, 23-26 November 2004, Bangkok, Thailand, INTELLCOMM 04, Lecture Notes in Computer Science 3283, pp 92-99, 2004.
  • Jongsub Moon, Taeshik Shon, Jungtaek Seo, Jongho Kim, Jungwoo Seo, "An Approach for Detecting Spam E-mail with Support Vector Machine and n-Gram indexing", The 19th International Symposium on Computer and Information Sciences, Kemer, Antalya, Turkey 27-29 October 2004, ISCIS'04, Lecture Notes in Computer Science 3280, pp 351-362, 2004
  • Jungtaek Seo, Dae-Sik Choi, Eung-Ki Park, Tae-Shik Shon and Jongsub Moon, "Patch Management System for Multi-Platform Environment", Parallel and Distributed Computing: Applications and Technologies: 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, PDCAT 04, Lecture Notes in Computer Science 3320, pp 654-661, 2004.
  • Taeshik Shon, Jungtaek Seo, Jongsub Moon, "Simple Key Agreement and its Efficiency Analysis for Grid Computing Environments", The Third International Conference on Grid and Cooperative Computing (GCC 2004), Wuhan, China, October 21-24, 2004, Lecture Notes in Computer Science 3283, pp 891-894, 2004.
  • Taeshik Shon et al, "Safe Patch Distribution Architecture in Intranet Environments", The 2003 International Conference on Security and Management(SAM'03), June 23 - 26, 2003, Monte Carlo Resort, Las Vegas, Nevada, USA SAM 2003
  • Taeshik Shon, Seo Jung-Taek, Lee Cheol-Won,Kim Dong-Kyoo, "A Study on Terminal-to-Terminal Information Security in Satellite Communication Environments and its Performance Analysis", WISA2001
  • Cheol-Won Lee,Eul Gyu Im,Jung-Taek Seo,Tae-Shik Sohn,Jong-Sub Moon,Dong-Kyu Kim, "A Secure Patch Distribution Architecture", ISDA '03

  • Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee and Jongin Lim, "Covert Channel Detection in the ICMP Payload Using Support Vector Machine", ISCIS XVIII - Eighteenth International Symposium on Computer and Information Sciences, November 3-5, 2003, Antalya, Turkey, ISCIS 2003, Lecture Notes in Computer Science 2869, pp 828-835, 2003.
  • Taeshik Shon, Jungtaek Seo, Jongsub Moon, "A Study on the Covert Channel Detection of TCP/IP Header using Support Vector Machine", Fifth International Conference on Information and Communications Security Huhehaote City, Inner-Mongolia, China 10-13 October, 2003 ICICS 2003, Lecture Notes in Computer Science 2836, pp 313-324, 2003
  • Taeshik Shon, Taewoo Noh, Jongsub Moon, "Support Vector Machine based ICMP Covert Channel Attack Detection", Mathematical Methods, Models and Architectures for Computer Networks Security, September 20-24, 2003, St. Petersburg, Russia, MMM-ACNS 2003, Lecture Notes in Computer Science 2776, pp 461-464, 2003

Domestic Conference


  • 김성진, 박근호, 손태식, “보건의료용 공개키 기반구조 보안 요구사항 분석”, 한국스마트미디어학회 춘계학술대회, 2016.04
  • 박근호, 김성진, 손태식, “의료 보안 PKI 표준의 인증서 요구사항에 관한 연구”, 정보처리학회 춘계학술대회, pp277-279, 2016.04
  • 김현진, 김성진, 이석철, 손태식, “해외 전력계통 IoT 통신 기준 연구”, 한국정보보호학회 동계학술대회, 2015.12
  • 이석철, 장현수, 손태식, “IoT 환경에서의 OSINT 기반 국가기반시설 보안 취약점 점검 방법”, 한국정보보호학회 동계학술대회, 2015.12
  • 박근호, 손태식, “TLS에 특화된 침입탐지시스템”, 한국정보처리학회 추계학술발표대회, pp862-865, 2015.10
  • 조우연, 손태식, “데이터마이닝 기법을 이용한 감정 기반 음악 분류”, 한국정보처리학회 춘계학술발표대회, pp941-944, 2015.04
  • 박호철, 김기형, 이주연, 왕지남, 김강석, 손태식, “스마트 팩토리를 위한 CPPS(Cyber Physical Production System) 설계 및 구현", 한국정보처리학회 동계학술발표대회, pp838-840, 2014.12
  • 장현수, 손태식, “리눅스 현장도구 설계에 관한 연구”, 한국디지털포렌식학회, 2014.08
  • 김성진, 손태식, “스마트그리드 환경에서 ICCP 통신 취약점 및 보안기술 동향 연구”, 한국정보처리학회 춘계학술대회, pp420-423, 2014.04
  • 장현수, 손태식, “SMiShing 어플리케이션 타지 모델에 관한 연구”, 한국정보처리학회 춘계학술대회, pp416-419, 2014.04
  • 박용민, 김종완, 손태식, 김상국, 박지혜, “디지털 포렌식 기반 전자기록물 이관 도구 요구사항 분석”, 한국정보보호학회 동계학술대회, pp193-196, 2013.12
  • 이석철, 유형욱, 손태식, 강상국, 박지혜, “디지털 포렌식 기반 전자기록물 수집 및 이관 절차에 관한 연구”, 한국정보보호학회 동계학술대회, pp171-177, 2013.12
  • 이석철, 유형욱, 손태식, 강상국, 박지혜, “디지털 포렌식 기반 전자기록물 수집 및 이관 절차에 관한 연구”, 한국정보보호학회 동계학술대회, pp171-177, 2013.12
  • 고현석, 이택균, 김강석, 손태식, “모바일 오피스 환경에서 에이전트 기반의 웹앱 실행속도 개선을 위한 연구”, 한국인터넷정보학회, 추계학술발표대회 논문집 제14권2호, pp177-178, 2013.11
  • 김종완, 손태식, "스마트그리드 환경의 BEMS 보안위협 및 대응방안 분석“, 한국정보처리학회, pp875-878, 2013.11
  • 권성문, 손태식, “GOOSE 프로토콜의 취약성을 이용한 공격 및 탐지방안”, 한국정보처리학회 추계학술 발표대회, pp879-881, 2013.11
  • 고현석, 이택균, 손태식, “모바일 오피스 환경에서 개인정보 보호를 위한 형태소 기반의 데이터 필터링 기법”, 한국컴퓨터종합 학술대회 논문집, pp726-728, 2013.06
  • 유형욱, 박지혜, 김상국, 손태식, "기록보관소 전자기록물의 증거능력 확립을 위한 디지털 포렌식 적용 연구", 한국정보처리학회 추계학술대회, pp 1333-1335, 2012.11
  • 이석준, 유형욱, 손태식, "IOS 애필리케이션 데이터 취약성에 관한 연구", 한국정보처리학회 추계학술대회, pp 1088-1091, 2012.11
  • Seok-Cheol Lee, Taeshik Shon, "Analysis of Vulnerability in Electric Vehicle Charging Technology", Conference on Information Security and Cryptology - Summer 2012, pp 311-314, 2012.06
  • Seokjun Lee, Taeshik Shon, "Research on digital forensic process for physical memory of smartgrid embedded system", Conference on Information Security and Cryptology - Summer 2012, pp 307-310, 2012.06
  • Hyung-Uk Yoo, Taeshik Shon, "Threats Analysis and Solution of Security in LSM", Conference on Information Security and Cryptology - Summer 2012, pp 63-66, 2012.06
  • Sang Yeel Ji, Taeshik Shon, "Compare SELinux and AppArmor using Linux Security Module(LSM)", 2012 Winter IT-Convergence Service & Applications for Future Environments, pp 47-49, 2012.02
  • Seokjun Lee, Taeshik Shon, "A Study on Research trends and research directions of memory analysis", 2012 Winter IT-Convergence Service & Applications for Future Environments, pp 44-45, 2012.02
  • Hyung-Uk Yoo, Taeshik Shon, "Electric Vehicle Cyber Threat in Smartgrid", 2012 Winter IT-Convergence Service & Applications for Future Environments, pp 50-51, 2012.02