Journal
|
2024 |
A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers
Yu Jae Hak Computer Networks, v.254, pp.1-12 |
1 |
원문
|
Conference
|
2024 |
Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms
Choi Yangseo International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.427-428 |
0 |
원문
|
Conference
|
2023 |
Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks
Park Cheolhee European Conference on Networks and Communications (EuCNC) 2023, pp.490-495 |
7 |
원문
|
Journal
|
2023 |
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks
Park Cheolhee IEEE Internet of Things Journal, v.10, no.3, pp.2330-2345 |
141 |
원문
|
Conference
|
2022 |
Network Anomaly Detection based on Domain Adaptation for 5G Network Security
Kimhyunjin International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.976-980 |
2 |
원문
|
Conference
|
2022 |
Network Security in 5G Cloud Native MEC Environments
Shin Yong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.965-967 |
0 |
원문
|
Conference
|
2022 |
AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments
Jong-Hoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.971-975 |
7 |
원문
|
Journal
|
2022 |
Stabilizing Adversarially Learned One-Class Novelty Detection Using Pseudo Anomalies
Zaheer Muhammad Zaigham IEEE Transactions on Image Processing, v.31, pp.5963-5975 |
7 |
원문
|
Journal
|
2022 |
Attack Graph Generation with Machine Learning for Network Security
Koo Ki Jong Electronics, v.11, no.9, pp.1-25 |
9 |
원문
|
Journal
|
2021 |
Analysis of Current 5G Open-Source Projects
Minjae Kim 전자통신동향분석, v.36, no.2, pp.83-92 |
|
원문
|
Conference
|
2021 |
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset
Lee Gyeoul International Conference on Advanced Communications Technology (ICACT) 2021, pp.254-258 |
3 |
원문
|
Conference
|
2020 |
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
Seungwon Woo Conference on Computer Communications (INFOCOM) 2020, pp.1788-1797 |
9 |
원문
|
Conference
|
2020 |
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
이승수 Conference on Computer Communications (INFOCOM) 2020, pp.1788-1797 |
9 |
원문
|
Conference
|
2019 |
Canary
Shin Yong Yoon Conference on Information-Centric Networking (ICN) 2019, pp.167-168 |
1 |
원문
|
Journal
|
2019 |
A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph
Jooyoung Lee Journal of Supercomputing, v.75, no.6, pp.3028-3045 |
17 |
원문
|
Conference
|
2018 |
Implementation of TLS and DTLS on Zephyr OS for IoT Devices
Lee Yun-Kyung International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1292-1294 |
13 |
원문
|
Journal
|
2017 |
Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma
박장순 Scientific Reports, v.7, pp.1-8 |
11 |
원문
|
Journal
|
2017 |
Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma
Kim Cheol Ho Scientific Reports, v.7, pp.1-8 |
11 |
원문
|
Journal
|
2017 |
Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma
김다진 Scientific Reports, v.7, pp.1-8 |
11 |
원문
|
Conference
|
2017 |
Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security
Kim Hyun Joo iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 |
3 |
원문
|
Journal
|
2016 |
RTNSS: A Routing Trace-based Network Security System for Preventing ARP Spoofing Attacks
Moon Dae Sung Journal of Supercomputing, v.72, no.5, pp.1740-1756 |
8 |
원문
|
Conference
|
2016 |
Abnormal Traffic Filtering Mechanism for Protecting ICS Networks
Byoung Koo Kim International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 |
7 |
원문
|
Conference
|
2015 |
Transmitted File Extraction and Reconstruction from Network Packets
Choi Yangseo World Congress on Internet Security (WorldCIS) 2015, pp.164-165 |
2 |
원문
|
Conference
|
2014 |
Design of Industrial Firewall System based on Multiple Access Control Filter
Byoung Koo Kim International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 |
1 |
원문
|
Conference
|
2013 |
SCADA Network Security System Using NSM Data Objects
Youngjun Heo International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.1145-1147 |
|
|
Conference
|
2013 |
A Study on Multi-Control Working Position Authentication System in Aviation Security
Lee Deok Gyu International Conference on Advanced IT, engineering Management (AIM) 2013, pp.226-230 |
|
|
Conference
|
2012 |
Novel Compositing Method for Quantification of Wireless Network Security
정성모 International Conference on Security Technology (SecTech) 2012 (CCIS 339), v.339, pp.1-6 |
0 |
원문
|
Journal
|
2012 |
The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack
Kim Sun Wook IETE Journal of Research, v.58, no.5, pp.398-410 |
0 |
원문
|
Conference
|
2012 |
Security Architecture of Inter VTS Exchange Format Protocol for Secure u-Navigation
Lee Byung-Gil International Conference on Embedded and Multimedia Computing (EMC) 2012 (LNEE 181), v.181, pp.229-236 |
7 |
원문
|
Conference
|
2011 |
Scalable Wireless Network Security for Bluetooth in Global Collaborative Environment
Dae-Hee Seo International Conference on Ubi-media Computing (U-Media) 2011, pp.1-6 |
1 |
원문
|
Journal
|
2010 |
An Efficient Network Attack Visualization Using Security Quad and Cube
Beom Hwan Chang ETRI Journal, v.33, no.5, pp.770-779 |
7 |
원문
|
Conference
|
2010 |
High Performance DFA-based String Matching
Kim Junghak International Telecommunications Network Strategy and Planning Symposium (Networks) 2010, pp.1-6 |
0 |
원문
|
Conference
|
2010 |
Network Intrusion Prevention System based on TOE
Kim Sun Wook International Workshop on Information Security Applications (WISA) 2010, pp.1-6 |
|
|
Conference
|
2010 |
A Hierachical Approach to Traffic Anomaly Detection using Image Processing Technique
Jeong Chi Yoon International Conference on Networked Computing and Advanced Information Management (NCM) 2010, pp.592-594 |
|
|
Conference
|
2009 |
High Speed Pattern Matching for Deep Packet Inspection
Kim Junghak International Symposium on Communications and Information Technology (ISCIT) 2009, pp.1310-1315 |
6 |
원문
|
Conference
|
2009 |
A Study on Reliable Communication in ATN Environment
Do-Woo Kim International Conference on Information & Knowledge Engineering (IKE) 2009, pp.370-373 |
|
|
Conference
|
2009 |
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique
Kim Dae Won International Conference on Communications (ICC) 2009, pp.1-6 |
0 |
원문
|
Journal
|
2009 |
Security technologies based on a home gateway for making smart homes secure
Kim Geonwoo Internet Research, v.19, no.2, pp.209-226 |
2 |
원문
|
Journal
|
2009 |
Validation Methods of Suspicious Network Flows for Unknown Attack Detection
Kim Ik Kyun International Journal of Computers, v.1, no.3, pp.104-114 |
|
|
Conference
|
2009 |
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication
Lee Deok Gyu Consumer Communications and Networking Conference (CCNC) 2009, pp.1-5 |
5 |
원문
|
Conference
|
2008 |
An Architecture of Unknown Attack Detection System against Zero-day Worm
Kim Ik Kyun International Conference on Applied Computer Science (ACS) 2008, pp.205-211 |
|
|
Conference
|
2008 |
Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network
Lee Deok Gyu International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 |
3 |
원문
|
Journal
|
2008 |
Tracing Stored Program Counter to Detect Polymorphic Shellcode
Kim Dae Won IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 |
3 |
원문
|
Conference
|
2008 |
Function Call Mechanism Based Executable Code Detection for the Network Security
Kim Dae Won International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 |
3 |
원문
|
Journal
|
2008 |
Technique for Estimating the Number of Active Flows in High-Speed Networks
Yi Sungwon ETRI Journal, v.30, no.2, pp.194-204 |
4 |
원문
|
Conference
|
2008 |
High Speed Search for Large-Scale Digital Forensic Investigation
Jee Hyung-Keun International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics) 2008, pp.1-4 |
|
|
Conference
|
2007 |
Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor
Young Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 |
1 |
원문
|
Conference
|
2007 |
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification
Lee Deok Gyu OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007 (LNCS 4804), v.4804, pp.1688-1700 |
1 |
원문
|
Conference
|
2007 |
Intelligent Home Network Authentication: S/Key-Based Home Device Authentication
Lee Deok Gyu International Symposium on Parallel and Distributed Processing and Applications (ISPA) 2007 (LNCS 4743), v.4743, pp.214-223 |
5 |
원문
|
Conference
|
2007 |
Development of Role Based Network Security Management System
Kim Geon Lyang International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.374-375 |
|
|
Conference
|
2007 |
Home Device Authentication Method in Ubiquitous Environment
Lee Yun-Kyung International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 |
5 |
원문
|
Conference
|
2007 |
Security Framework for Home Network: Authentication, Authorization, and Security Policy
Kim Geonwoo Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 |
7 |
원문
|
Conference
|
2007 |
A Design and Implementation of Wireless Sensor Network Security on Nano-Qplus Platform
Kim Jin Won International Conference on Advanced Communication Technology (ICACT) 2007, pp.684-688 |
0 |
원문
|
Journal
|
2006 |
The Development of Policy Proxy Agent in Policy-Based Network Security Management System
Kim Geon Lyang WSEAS Transactions on Communications, v.6, no.1, pp.236-240 |
|
|
Conference
|
2006 |
The Development of Policy Proxy Agent in Policy-Based Network Security Management System
Kim Geon Lyang International Conference on Information Security and Privacy (ISP) 2006, pp.41-45 |
|
|
Conference
|
2006 |
High-Performance Stateful Intrusion Detection System
Yoon Seung Yong International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 |
4 |
원문
|
Journal
|
2006 |
Cost Optimization in SIS Model of Worm Infection
Kim Jonghyun ETRI Journal, v.28, no.5, pp.692-695 |
34 |
원문
|
Conference
|
2006 |
Implementation of VPN Router Hardware Platform using Network Processor
Lee Sang-Woo International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 |
2 |
|
Conference
|
2006 |
An Efficient Design of High Speed Network Security Platform using Network Processor
Jeon Yong-Sung International Conference on Embedded Systems and Applications (ESA) 2006, pp.121-123 |
|
|
Conference
|
2006 |
Hardware Supports for Network Traffic Anomaly Detection
Kim Dae Won International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5 |
|
|
Conference
|
2006 |
Home Network Security Description Language
Kim Geonwoo 한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.741-744 |
|
|
Conference
|
2006 |
A Security Model for Home Networks with Authority Delegation
Hwang Jin Bum International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 |
6 |
원문
|
Conference
|
2006 |
Considerations on Security Model of Home Network
Kim Geonwoo International Conference on Advanced Communication Technology (ICACT) 2006, pp.109-112 |
6 |
|
Conference
|
2006 |
On the Study of Service Security Model for Privacy using Global User Management Framework
Choi Byeong Cheol International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 |
2 |
|
Conference
|
2006 |
A Developing of Signature-based Network Security Tester for NGSS
Jeong Youn Seo International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 |
0 |
|
Conference
|
2006 |
Implementation of VPN Router Hardware Platform using Netwvor Processor
Lee Sang-Woo International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 |
2 |
|
Conference
|
2005 |
A Study on Establishment of Secure RFID Network Using DNS Security Extension
Ham Young Hwan Asia-Pacific Conference on Communications (APCC) 2005, pp.525-529 |
5 |
원문
|
Conference
|
2005 |
Abnormal Traffic Detection and Its Implementation
Soo Hyung Lee International Conference on Advanced Communication Technology (ICACT) 2005, pp.246-250 |
|
원문
|
Conference
|
2005 |
Design of Firewall in Router using Network Processor
김영호 International Conference on Advanced Communication Technology (ICACT) 2005, pp.658-660 |
|
원문
|
Conference
|
2005 |
Design of network security policy information model for policy-based network management
Seon-Gyoung Sohn International Conference on Advanced Communication Technology (ICACT) 2005, pp.701-705 |
|
원문
|
Conference
|
2004 |
Design and Implementation of High-Performance Intrusion Detection System
Kim Byoung Koo International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 |
2 |
원문
|
Conference
|
2004 |
Security Flow Control by Dynamic Stack Allocation
Kim Geonwoo International Conference on Advanced Communication Technology (ICACT) 2004, pp.309-311 |
|
원문
|
Journal
|
2002 |
The Implementation of Policy Management Tool Based on Network Security Policy Information Model
Kim Geon Lyang 정보처리학회논문지 C, v.9C, no.5, pp.775-782 |
|
|
Conference
|
2002 |
Design of Network Security Control System for Cooperative Intrusion Detection
Kim Byoung Koo Information Networking: Wireless Communications Technologies and Network Applications (ICOIN) 2002 (LNCS 2344), v.2344, pp.389-398 |
4 |
원문
|
Conference
|
2002 |
Information Model for Policy-Based Network Security Management
Kim Sook Yeon International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 |
3 |
원문
|
Conference
|
2002 |
Security Policy Deployment in IPsec
Kim Geonwoo International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.453-464 |
0 |
원문
|
Conference
|
2001 |
Policy Core Information Model in Policy-Based Management far Network Security
Kim Sook Yeon 한국정보과학회 학술 발표 (가을) 2001, pp.652-654 |
|
|