Journal
|
2021 |
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
Song-Yi Hwang Sensors, v.21, no.21, pp.1-23 |
8 |
원문
|
Conference
|
2020 |
Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT
Lim Jae Deok International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 |
2 |
원문
|
Journal
|
2017 |
DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks
Moon Dae Sung Journal of Supercomputing, v.73, no.7, pp.2881-2895 |
119 |
원문
|
Conference
|
2016 |
Visualization of Malware Detection Based on API Call Sequence Alignment
Kim Jonghyun International Conference on Internet (ICONI) 2016, pp.175-178 |
|
|
Conference
|
2015 |
Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection
Kim Dae Won International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3 |
|
|
Conference
|
2015 |
Behavior-Based Anomaly Detection on Big Data
Kim Hyun Joo SRI Security Congress 2015, pp.73-80 |
|
|
Conference
|
2015 |
Mobile Security Technology for Smart Devices
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176 |
|
|
Conference
|
2015 |
Testing Data Set for Analyzing Behaviors of Malicious Codes
Kim Youngsoo International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2015, pp.4-9 |
|
|
Conference
|
2014 |
New Approach to Determine Metamorphic Malicious Mobile Code on Android based Smartphones
김상돈 International Conference on Internet (ICONI) 2014, pp.1-6 |
|
|
Conference
|
2014 |
Involvers’ Behavior-based Modeling in Cyber Targeted Attack
Kim Youngsoo International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2014, pp.132-137 |
|
|
Conference
|
2014 |
Protection Method from APP Repackaging Attack on Mobile Device with Separated Domain
Lee Yun-Kyung International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.667-668 |
3 |
원문
|
Conference
|
2014 |
Hidden Evasive Server-Side Polymorphic Malicious Apps Detection Mechanism on Android based Smart Phone Devices
문대열 International Conference on Convergence Technology (ICCT) 2014, pp.819-820 |
|
|
Conference
|
2014 |
The Phased Classification of Attacking Methods used for Advanced Persistent Threat
Kim Youngsoo International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014, pp.1-7 |
|
|
Journal
|
2013 |
Energy‐efficient replica detection for resource‐limited mobile devices in the internet of things
Kwantae Cho IET Communications, v.7, no.18, pp.2141-2150 |
9 |
원문
|
Journal
|
2013 |
Mobile Malware Detection Using Correlational Analysis
Yoon Seung Yong International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58 |
|
|
Conference
|
2013 |
DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System
함유정 International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 |
8 |
원문
|
Conference
|
2013 |
A Study on Multi-Control Working Position Authentication System in Aviation Security
Lee Deok Gyu International Conference on Advanced IT, engineering Management (AIM) 2013, pp.226-230 |
|
|
Conference
|
2012 |
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks
김현주 International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 |
6 |
원문
|
Conference
|
2010 |
Design of Cyber Attack Precursor Symptom Detection Algorithm through System base Behavior Analysis and Memory Monitoring
정성모 International Conference on Future Generation Communication and Networking (FGCN) 2010 (CCIS 120), v.120, pp.276-283 |
2 |
원문
|
Conference
|
2009 |
Hardware Based Data Inspection for USB Data Leakage Prevention
Dong Ho Kang Communications in Computer and Information Science (CCIS) 2009, pp.57-63 |
1 |
원문
|
Journal
|
2009 |
Security Policy Specification for Home Network
Kim Geonwoo International Journal Ad Hoc and Ubiquitous Computing, v.4, no.6, pp.372-378 |
1 |
원문
|
Conference
|
2009 |
Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection
Byoung Koo Kim International Conference on Security and Management (SAM) 2009, pp.1-6 |
|
|
Conference
|
2009 |
USB Data Leakage Prevention Using Hardware based Data Inspection Technique
Dong Ho Kang International Conference on Security and Management (SAM) 2009, pp.1-5 |
|
|
Conference
|
2009 |
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication
Lee Deok Gyu Consumer Communications and Networking Conference (CCNC) 2009, pp.1-5 |
5 |
원문
|
Conference
|
2008 |
Multiple-Aspect Malicious Code Detection for Component Survivability in Distributed Environments
Joon S. Park IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS) 2008, pp.1-8 |
|
|
Conference
|
2008 |
Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network
Lee Deok Gyu International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 |
3 |
원문
|
Conference
|
2008 |
Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals
Jeong Youn Seo International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 |
2 |
원문
|
Conference
|
2007 |
Cooperative Component Testing Architecture in Collaborating Network Environment
An Gaeil International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.179-190 |
5 |
원문
|
Conference
|
2007 |
Security Framework for Home Network: Authentication, Authorization, and Security Policy
Kim Geonwoo Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 |
7 |
원문
|
Conference
|
2006 |
Fragment Packet Partial Re-assembly Method for Intrusion Detection
Chung Bo-Heung International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 |
0 |
|