Follow
Sunghyuck Hong
Sunghyuck Hong
Baekseok University, Division of Advanced IT
Verified email at bu.ac.kr - Homepage
Title
Cited by
Cited by
Year
P2P networking based internet of things (IoT) sensor node authentication by Blockchain
S Hong
Peer-to-Peer Networking and Applications 13 (2), 579-589, 2020
772020
Analysis of attack models via unified modeling language in wireless sensor networks: A survey study
S Hong, S Lim
2010 IEEE International Conference on Wireless Communications, Networking …, 2010
322010
Unified modeling language based analysis of security attacks in wireless sensor networks: a survey
SH Hong, SH Lim, JK Song
KSII Transactions on Internet and Information Systems (TIIS) 5 (4), 805-821, 2011
272011
New Authentication Methods based on User’s Behavior Big Data Analysis on Cloud
홍성혁
융합정보논문지 6 (4), 31-36, 2016
242016
Research on IoT international strategic standard model
S Hong
Journal of the korea convergence society 8 (2), 21-26, 2017
232017
Build a secure smart city by using blockchain and digital twin
Y Song, S Hong
Int. J. Adv. Sci. Converg 3 (3), 9-13, 2021
212021
Analysis of the Vulnerability of the IoT by the Scenario
S Hong, HJ Sin
Journal of the Korea Convergence Society 8 (9), 1-7, 2017
182017
ICS malware Triton attack and countermeasures
J Myung, S Hong
International Journal of Emerging Multidisciplinary Research 3 (2), 13-17, 2019
162019
A novel secure and efficient hash function with extra padding against rainbow table attacks
HJ Mun, S Hong, J Shin
Cluster Computing 21, 1161-1173, 2018
142018
Efficient and secure DNS cyber shelter on DDoS attacks
S Hong
Journal of Computer Virology and Hacking Techniques 11 (3), 129-136, 2015
132015
Developing a blockchain based accounting and tax information in the 4th Industrial Revolution
홍성혁, 서초롱
한국융합학회논문지 9 (3), 45-51, 2018
122018
The Research on Blockchain-based Secure loT Authentication
S Hong, S Park
Journal of the Korea Convergence Society 8 (11), 57-62, 2017
122017
Authentication Techniques in the Internet of Things Environment: A Survey.
S Hong
Int. J. Netw. Secur. 21 (3), 462-470, 2019
112019
Research on wireless sensor networks security attack and countermeasures: Survey
S Hong
Journal of Convergence Society for SMB 4 (4), 1-6, 2014
112014
Analysis of DDoS attack and countermeasure: Survey
S Hong
Journal of digital convergence 12 (1), 423-429, 2014
112014
Queue-based Group Key Agreement Protocol.
S Hong
Int. J. Netw. Secur. 9 (2), 135-142, 2009
112009
A study on stock price prediction system based on text mining method using LSTM and stock market news.
S Hong
Journal of Digital Convergence 18 (7), 2020
102020
Secure and light IoT protocol (SLIP) for anti-hacking
S Hong
Journal of Computer Virology and Hacking Techniques 13 (4), 241-247, 2017
102017
Two-channel user authentication by using USB on Cloud
S Hong
Journal of Computer Virology and Hacking Techniques 12, 137-143, 2016
102016
Multi-factor user authentication on group communication
S Hong
Indian Journal of Science and Technology, 2015
102015
The system can't perform the operation now. Try again later.
Articles 1–20