If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Jong In Lim is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 4 Similar Profiles
Cryptography Engineering & Materials Science
Attack Mathematics
Differential Cryptanalysis Mathematics
Authentication Engineering & Materials Science
Block Cipher Mathematics
Linear Cryptanalysis Mathematics
Wireless networks Engineering & Materials Science
Countermeasures Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1995 2019

  • 2329 Citations
  • 22 h-Index
  • 93 Conference contribution
  • 76 Article

Behavior analysis and anomaly detection for a digital substation on cyber-physical system

Kwon, Y., Lee, S., King, R., Lim, J. I. & Kim, H. K., 2019 Mar 1, In : Electronics (Switzerland). 8, 3, 326.

Research output: Contribution to journalArticle

Open Access
Testbeds
Information technology
Transmission control protocol
Internet protocols
Electric power systems

The All-Purpose Sword: North Korea's Cyber Operations and Strategies

Ji-Young, K., Lim, J. I. & Kyoung Gon, K., 2019 May 1, 2019 11th International Conference on Cyber Conflict: Silent Battle, CyCon 2019. Signoretti, M., Tolga, I., Minarik, T., Visky, G., Alatalu, S. & Biondi, S. (eds.). NATO CCD COE Publications, 8756954. (International Conference on Cyber Conflict, CYCON; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear weapons
Military operations
Missiles
Computer systems
Economics

De-identification policy and risk distribution framework for securing personal information

Joo, M. H., Yoon, S. P., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, In : Information Polity. 23, 2, p. 195-219 25 p.

Research output: Contribution to journalArticle

liability
responsibility
privacy
risk society
exemption

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors

Lee, K. Y., Kwon, H-Y. & Lim, J. I., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 323-335 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence
Artificial Intelligence
Sector
Industry
Privacy

Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System

Lee, S. H., Kim, M. S., Kim, J. K., Lim, J. I. & Hong, I. P., 2018 Jan 1, In : International Journal of Antennas and Propagation. 2018, 9836937.

Research output: Contribution to journalArticle

Screen printing
Antenna arrays
Ink
Electromagnetic waves
Silver