Follow
Keywhan Chung
Title
Cited by
Cited by
Year
Game theory with learning for cyber security monitoring
K Chung, CA Kamhoua, KA Kwiat, ZT Kalbarczyk, RK Iyer
2016 IEEE 17th International Symposium on High Assurance Systems Engineering …, 2016
572016
Availability attacks on computing systems through alteration of environmental control: smart malware approach
K Chung, ZT Kalbarczyk, RK Iyer
Proceedings of the 10th ACM/IEEE international conference on cyber-physical …, 2019
312019
Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots
K Chung, X Li, P Tang, Z Zhu, ZT Kalbarczyk, RK Iyer, T Kesavadas
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
242019
Attacking supercomputers through targeted alteration of environmental control: A data driven case study
K Chung, V Formicola, ZT Kalbarczyk, RK Iyer, A Withers, AJ Slagell
2016 IEEE Conference on Communications and Network Security (CNS), 406-410, 2016
92016
Preemptive intrusion detection
P Cao, K Chung, Z Kalbarczyk, R Iyer, AJ Slagell
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-2, 2014
92014
Machine Learning in the Hands of a Malicious Adversary: A Near Future If Not Reality 1
K Chung, X Li, P Tang, Z Zhu, ZT Kalbarczyk, T Kesavadas, RK Iyer
Game Theory and Machine Learning for Cyber Security, 289-316, 2021
32021
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection
M Landen, K Chung, M Ike, S Mackay, JP Watson, W Lee
Proceedings of the 38th Annual Computer Security Applications Conference, 13-27, 2022
22022
Indirect cyber attacks by perturbation of environment control: A data driven attack model: Poster
K Chung, ZT Kalbarczyk, RK Iyer
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
22018
Attack detection and countermeasure identification system
JP Watson, AL Fox, SCM Mackay, WB Mitchell, M Landen, KW Chung, ...
US Patent App. 18/089,373, 2023
2023
stealthML: Data-driven Malware for Stealthy Data Exfiltration
K Chung, P Cao, ZT Kalbarczyk, RK Iyer
2023 IEEE International Conference on Cyber Security and Resilience (CSR), 16-21, 2023
2023
TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation
K Chung, P Cao, Y Wu, ZT Kalbarczyk, RK Iyer, A Withers
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
2019
Poster: Indirect cyber attacks by perturbation of environment control: A data driven attack model
K Chung, ZT Kalbarczyk, RK Iyer
5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–12