Subject

Subjects : network Security

  • Articles (77)
  • Patents (8)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2024 A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers   Yu Jae Hak  Computer Networks, v.254, pp.1-12 1 원문
Conference 2024 Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms   Choi Yangseo  International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.427-428 0 원문
Conference 2023 Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks   Park Cheolhee  European Conference on Networks and Communications (EuCNC) 2023, pp.490-495 7 원문
Journal 2023 An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks   Park Cheolhee  IEEE Internet of Things Journal, v.10, no.3, pp.2330-2345 141 원문
Conference 2022 Network Anomaly Detection based on Domain Adaptation for 5G Network Security   Kimhyunjin  International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.976-980 2 원문
Conference 2022 Network Security in 5G Cloud Native MEC Environments   Shin Yong Yoon  International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.965-967 0 원문
Conference 2022 AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments   Jong-Hoon Lee  International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.971-975 7 원문
Journal 2022 Stabilizing Adversarially Learned One-Class Novelty Detection Using Pseudo Anomalies   Zaheer Muhammad Zaigham  IEEE Transactions on Image Processing, v.31, pp.5963-5975 7 원문
Journal 2022 Attack Graph Generation with Machine Learning for Network Security   Koo Ki Jong  Electronics, v.11, no.9, pp.1-25 9 원문
Journal 2021 Analysis of Current 5G Open-Source Projects   Minjae Kim  전자통신동향분석, v.36, no.2, pp.83-92 원문
Conference 2021 Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset   Lee Gyeoul  International Conference on Advanced Communications Technology (ICACT) 2021, pp.254-258 3 원문
Conference 2020 AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks   Seungwon Woo  Conference on Computer Communications (INFOCOM) 2020, pp.1788-1797 9 원문
Conference 2020 AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks   이승수  Conference on Computer Communications (INFOCOM) 2020, pp.1788-1797 9 원문
Conference 2019 Canary   Shin Yong Yoon  Conference on Information-Centric Networking (ICN) 2019, pp.167-168 1 원문
Journal 2019 A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph   Jooyoung Lee  Journal of Supercomputing, v.75, no.6, pp.3028-3045 17 원문
Conference 2018 Implementation of TLS and DTLS on Zephyr OS for IoT Devices   Lee Yun-Kyung  International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1292-1294 13 원문
Journal 2017 Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma   박장순  Scientific Reports, v.7, pp.1-8 11 원문
Journal 2017 Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma   Kim Cheol Ho  Scientific Reports, v.7, pp.1-8 11 원문
Journal 2017 Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma   김다진  Scientific Reports, v.7, pp.1-8 11 원문
Conference 2017 Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security   Kim Hyun Joo  iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 3 원문
Journal 2016 RTNSS: A Routing Trace-based Network Security System for Preventing ARP Spoofing Attacks   Moon Dae Sung  Journal of Supercomputing, v.72, no.5, pp.1740-1756 8 원문
Conference 2016 Abnormal Traffic Filtering Mechanism for Protecting ICS Networks   Byoung Koo Kim  International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 7 원문
Conference 2015 Transmitted File Extraction and Reconstruction from Network Packets   Choi Yangseo  World Congress on Internet Security (WorldCIS) 2015, pp.164-165 2 원문
Conference 2014 Design of Industrial Firewall System based on Multiple Access Control Filter   Byoung Koo Kim  International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 1 원문
Conference 2013 SCADA Network Security System Using NSM Data Objects   Youngjun Heo  International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.1145-1147
Conference 2013 A Study on Multi-Control Working Position Authentication System in Aviation Security   Lee Deok Gyu  International Conference on Advanced IT, engineering Management (AIM) 2013, pp.226-230
Conference 2012 Novel Compositing Method for Quantification of Wireless Network Security   정성모  International Conference on Security Technology (SecTech) 2012 (CCIS 339), v.339, pp.1-6 0 원문
Journal 2012 The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack   Kim Sun Wook  IETE Journal of Research, v.58, no.5, pp.398-410 0 원문
Conference 2012 Security Architecture of Inter VTS Exchange Format Protocol for Secure u-Navigation   Lee Byung-Gil  International Conference on Embedded and Multimedia Computing (EMC) 2012 (LNEE 181), v.181, pp.229-236 7 원문
Conference 2011 Scalable Wireless Network Security for Bluetooth in Global Collaborative Environment   Dae-Hee Seo  International Conference on Ubi-media Computing (U-Media) 2011, pp.1-6 1 원문
Journal 2010 An Efficient Network Attack Visualization Using Security Quad and Cube   Beom Hwan Chang  ETRI Journal, v.33, no.5, pp.770-779 7 원문
Conference 2010 High Performance DFA-based String Matching   Kim Junghak  International Telecommunications Network Strategy and Planning Symposium (Networks) 2010, pp.1-6 0 원문
Conference 2010 Network Intrusion Prevention System based on TOE   Kim Sun Wook  International Workshop on Information Security Applications (WISA) 2010, pp.1-6
Conference 2010 A Hierachical Approach to Traffic Anomaly Detection using Image Processing Technique   Jeong Chi Yoon  International Conference on Networked Computing and Advanced Information Management (NCM) 2010, pp.592-594
Conference 2009 High Speed Pattern Matching for Deep Packet Inspection   Kim Junghak  International Symposium on Communications and Information Technology (ISCIT) 2009, pp.1310-1315 6 원문
Conference 2009 A Study on Reliable Communication in ATN Environment   Do-Woo Kim  International Conference on Information & Knowledge Engineering (IKE) 2009, pp.370-373
Conference 2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Kim Dae Won  International Conference on Communications (ICC) 2009, pp.1-6 0 원문
Journal 2009 Security technologies based on a home gateway for making smart homes secure   Kim Geonwoo  Internet Research, v.19, no.2, pp.209-226 2 원문
Journal 2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Kim Ik Kyun  International Journal of Computers, v.1, no.3, pp.104-114
Conference 2009 Intelligent Pervasive Network Authentication: S/Key Based Device Authentication   Lee Deok Gyu  Consumer Communications and Networking Conference (CCNC) 2009, pp.1-5 5 원문
Conference 2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Kim Ik Kyun  International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference 2008 Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network   Lee Deok Gyu  International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 3 원문
Journal 2008 Tracing Stored Program Counter to Detect Polymorphic Shellcode   Kim Dae Won  IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 3 원문
Conference 2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Kim Dae Won  International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3 원문
Journal 2008 Technique for Estimating the Number of Active Flows in High-Speed Networks   Yi Sungwon  ETRI Journal, v.30, no.2, pp.194-204 4 원문
Conference 2008 High Speed Search for Large-Scale Digital Forensic Investigation   Jee Hyung-Keun  International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics) 2008, pp.1-4
Conference 2007 Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor   Young Ho Kim  International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 1 원문
Conference 2007 Intelligent Home Network Authentication: Home Device Authentication Using Device Certification   Lee Deok Gyu  OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007 (LNCS 4804), v.4804, pp.1688-1700 1 원문
Conference 2007 Intelligent Home Network Authentication: S/Key-Based Home Device Authentication   Lee Deok Gyu  International Symposium on Parallel and Distributed Processing and Applications (ISPA) 2007 (LNCS 4743), v.4743, pp.214-223 5 원문
Conference 2007 Development of Role Based Network Security Management System   Kim Geon Lyang  International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.374-375
Conference 2007 Home Device Authentication Method in Ubiquitous Environment   Lee Yun-Kyung  International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 5 원문
Conference 2007 Security Framework for Home Network: Authentication, Authorization, and Security Policy   Kim Geonwoo  Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 7 원문
Conference 2007 A Design and Implementation of Wireless Sensor Network Security on Nano-Qplus Platform   Kim Jin Won  International Conference on Advanced Communication Technology (ICACT) 2007, pp.684-688 0 원문
Journal 2006 The Development of Policy Proxy Agent in Policy-Based Network Security Management System   Kim Geon Lyang  WSEAS Transactions on Communications, v.6, no.1, pp.236-240
Conference 2006 The Development of Policy Proxy Agent in Policy-Based Network Security Management System   Kim Geon Lyang  International Conference on Information Security and Privacy (ISP) 2006, pp.41-45
Conference 2006 High-Performance Stateful Intrusion Detection System   Yoon Seung Yong  International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 4 원문
Journal 2006 Cost Optimization in SIS Model of Worm Infection   Kim Jonghyun  ETRI Journal, v.28, no.5, pp.692-695 34 원문
Conference 2006 Implementation of VPN Router Hardware Platform using Network Processor   Lee Sang-Woo  International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 2
Conference 2006 An Efficient Design of High Speed Network Security Platform using Network Processor   Jeon Yong-Sung  International Conference on Embedded Systems and Applications (ESA) 2006, pp.121-123
Conference 2006 Hardware Supports for Network Traffic Anomaly Detection   Kim Dae Won  International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5
Conference 2006 Home Network Security Description Language   Kim Geonwoo  한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.741-744
Conference 2006 A Security Model for Home Networks with Authority Delegation   Hwang Jin Bum  International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 6 원문
Conference 2006 Considerations on Security Model of Home Network   Kim Geonwoo  International Conference on Advanced Communication Technology (ICACT) 2006, pp.109-112 6
Conference 2006 On the Study of Service Security Model for Privacy using Global User Management Framework   Choi Byeong Cheol  International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 2
Conference 2006 A Developing of Signature-based Network Security Tester for NGSS   Jeong Youn Seo  International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 0
Conference 2006 Implementation of VPN Router Hardware Platform using Netwvor Processor   Lee Sang-Woo  International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 2
Conference 2005 A Study on Establishment of Secure RFID Network Using DNS Security Extension   Ham Young Hwan  Asia-Pacific Conference on Communications (APCC) 2005, pp.525-529 5 원문
Conference 2005 Abnormal Traffic Detection and Its Implementation   Soo Hyung Lee  International Conference on Advanced Communication Technology (ICACT) 2005, pp.246-250 원문
Conference 2005 Design of Firewall in Router using Network Processor   김영호  International Conference on Advanced Communication Technology (ICACT) 2005, pp.658-660 원문
Conference 2005 Design of network security policy information model for policy-based network management   Seon-Gyoung Sohn  International Conference on Advanced Communication Technology (ICACT) 2005, pp.701-705 원문
Conference 2004 Design and Implementation of High-Performance Intrusion Detection System   Kim Byoung Koo  International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 2 원문
Conference 2004 Security Flow Control by Dynamic Stack Allocation   Kim Geonwoo  International Conference on Advanced Communication Technology (ICACT) 2004, pp.309-311 원문
Journal 2002 The Implementation of Policy Management Tool Based on Network Security Policy Information Model   Kim Geon Lyang  정보처리학회논문지 C, v.9C, no.5, pp.775-782
Conference 2002 Design of Network Security Control System for Cooperative Intrusion Detection   Kim Byoung Koo  Information Networking: Wireless Communications Technologies and Network Applications (ICOIN) 2002 (LNCS 2344), v.2344, pp.389-398 4 원문
Conference 2002 Information Model for Policy-Based Network Security Management   Kim Sook Yeon  International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 3 원문
Conference 2002 Security Policy Deployment in IPsec   Kim Geonwoo  International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.453-464 0 원문
Conference 2001 Policy Core Information Model in Policy-Based Management far Network Security   Kim Sook Yeon  한국정보과학회 학술 발표 (가을) 2001, pp.652-654
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2017 네트워크 보안 강화 장치 및 그 방법 KOREA KIPRIS
Registered 2012 네트워크 보안 상황 시각화 방법 및 그 장치 KOREA KIPRIS
Registered 2012 METHOD AND APPARATUS FOR VISUALIZING NETWORK SECURITY STATE UNITED STATES
Registered 2014 KEY MANAGING SYSTEM AND METHOD FOR SENSOR NETWORK SECURITY UNITED STATES
Registered 2013 센서 네트워크 보안을 위한 키 관리 시스템 및 그 방법 KOREA KIPRIS
Registered 2018 APPARATUS FOR ENHANCING NETWORK SECURITY AND METHOD FOR THE SAME UNITED STATES
Registered 2013 제어 네트워크에서의 스캐닝 공격 탐지 장치 KOREA KIPRIS
Registered 2006 METHOD OF BLOCKING NETWORK ATTACKS USING PACKET INFORMATION AND APPARATUS THEREOF UNITED STATES
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.