Subject

Subjects : Security threats

  • Articles (73)
  • Patents (2)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Conference 2024 An open video security platform for edge AI cameras   Su Wan Park  International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.643-646 0 원문
Conference 2024 Analyzing the container security threat on the 5G Core Network   Jihyeon Song  Silicon Valley Cybersecurity Conference (SVCC) 2024, pp.1-3 1 원문
Journal 2024 Practical Abandoned Object Detection in Real-World Scenarios: Enhancements Using Background Matting with Dense ASPP   정민구  IEEE Access, v.12, pp.60808-60825 3 원문
Journal 2024 PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks   Yusungjin  IEEE Internet of Things Journal, v.11, no.9, pp.15450-15464 36 원문
Journal 2024 Multi-channel Transmission Method for Improving TCP Reliability and Transmission Efficiency in UNIWAY   Kim Yong Kyun  Journal of Ambient Intelligence and Humanized Computing, v.15, no.2, pp.1583-1598 1 원문
Conference 2023 Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones   Yusungjin  International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 2 원문
Journal 2023 Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm   Kim Juyoung  IEEE Access, v.11, pp.45323-45333 2 원문
Conference 2022 Security Requirements and Countermeasures in a Cloud-native Environment   Kim Youngsoo  International Symposium on Mobile Internet Security (MobiSec) 2022, pp.1-10
Conference 2022 ZTA-based Federated Policy Control Paradigm for Enterprise Wireless Network Infrastructure   Jung Boo Geum  Asia-Pacific Conference on Communications (APCC) 2022, pp.1-5 5 원문
Journal 2022 A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions   Yusungjin  IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 104 원문
Journal 2022 SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments   Yusungjin  IEEE Access, v.10, pp.60534-60549 20 원문
Journal 2022 Attack Graph Generation with Machine Learning for Network Security   Koo Ki Jong  Electronics, v.11, no.9, pp.1-25 12 원문
Conference 2021 PUF-based IoT Device Authentication Scheme on IoT Open Platform   Byoung Koo Kim  International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 8 원문
Journal 2021 Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”   Yusungjin  IEEE Access, v.9, pp.49154-49159 22 원문
Journal 2021 A Security Analysis of Blockchain-Based Did Services   김봉곤  IEEE Access, v.9, pp.22894-22913 28 원문
Journal 2020 ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI   Kim Tae Wan  전자통신동향분석, v.35, no.7, pp.67-77 원문
Journal 2020 Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications   박태근  한국컴퓨터정보학회논문지, v.25, no.11, pp.105-114 원문
Conference 2020 Security Threats in 5G Edge Computing Environments   Kim Youngsoo  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.905-907 15 원문
Conference 2020 PUF-based Authentication Scheme for IoT Devices   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 25 원문
Conference 2020 Secure IoT Device Authentication Scheme using Key Hiding Technology   Byoung Koo Kim  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 3 원문
Journal 2020 Trends in Supply-Chain Security Technologies   Kim Dae Won  전자통신동향분석, v.35, no.4, pp.149-157 원문
Journal 2020 Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique   Lee Sung-Hoon  IEEE Access, v.8, pp.83248-83264 5 원문
Conference 2019 A Study on Traffic Characteristics for Anomaly Detection of Ethernet-based IVN   Boo-Sun Jeon  International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.951-953 9 원문
Conference 2019 Security Considerations for In-Vehicle Secure Communication   Ju Hong Il  International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 15 원문
Journal 2019 OSS (Open Source Software) Usage Considerations and Verification Method   Park Jeong-Hyun  전자통신동향분석, v.34, no.1, pp.142-153 원문
Journal 2018 Trends in Automotive Ethernet Security Technology   Chung Bo-Heung  전자통신동향분석, v.33, no.5, pp.76-85 원문
Conference 2018 Who is knocking on the Telnet Port   Heo Hwanjo  Asia Conference on Computer and Communications Security (ASIA CCS) 2018, pp.625-636 18 원문
Conference 2017 A Lightweight Authentication Mechanism between IoT Devices   Han Jin Hee  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1154-1156 20 원문
Conference 2017 Remote Security Management Server for IoT Devices   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 21 원문
Conference 2017 Security Considerations Based on Classification of IoT Device Capabilities   Yoon Seung Yong  International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15
Conference 2016 Analyzing Security Threats of Android-based Mobile Malware   Yoon Seung Yong  International Conference on Security Technology (SecTech) 2016, pp.310-315 원문
Conference 2016 Consideration of Security Threats for Identification System in Internet of Things   Kim Dae Won  International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68
Journal 2016 Host-based Intrusion Detection System for Secure Human-centric Computing   Moon Dae Sung  Journal of Supercomputing, v.72, no.7, pp.2520-2536 36 원문
Conference 2015 Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology   Lee Sokjoon  International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337
Conference 2015 Supporting a Variety of Secure Services Based on MTM   Yoon Seung Yong  International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20
Journal 2015 Implementation of a Hardware Security Chip for Mobile Devices   Ju Hong Il  IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 14 원문
Conference 2015 Mobile Security Technology for Smart Devices   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176
Conference 2015 An Abnormal Connection Detection System based on Network Flow Analysis   Jong-Hoon Lee  International Conference on Consumer Electronics (ICCE) 2015 : Berlin, pp.71-75 1 원문
Conference 2015 Study on Access Permission Control for the Web of Things   Oh Se Won  International Conference on Advanced Communication Technology (ICACT) 2015, v.4, no.1, pp.574-580 5 원문
Conference 2014 Mutual Authentication between Ships in the E-Navigation Environment   Oh Seung-Hee  International Conference on Security Technology (SecTec) 2014, pp.15-18 2 원문
Journal 2014 Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems   Lee Seoung Hyeon  Information, v.5, no.4, pp.622-633 11 원문
Conference 2014 Security Threats Analysis for Android based Mobile Device   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.775-776 6 원문
Conference 2014 Decentralized Access Permission Control Using Resource-Oriented Architecture for the Web of Things   Oh Se Won  International Conference on Advanced Communication Technology (ICACT) 2014, pp.749-753 19 원문
Journal 2013 Improving Mobile Device Classification Using Security Events for Preventing Wireless Intrusion   Kwon Hyeok Chan  International Journal of Security and Its Applications, v.7, no.6, pp.181-190 1 원문
Conference 2013 Detecting Black-Hole Attack in MANETs with Moving Detection Node   Kim Jeong Tae  International Conference on Computers, Communications and Systems (ICCCS) 2013, pp.1-4
Conference 2013 DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System   함유정  International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 8 원문
Conference 2013 A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion   Kwon Hyeok Chan  International Conference on Information Science and Industrial Applications (ISI) 2013, pp.317-321
Conference 2013 Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis   Lim Sun Hee  International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507
Conference 2012 Security Architecture for Smart Devices   Ju Hong Il  International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.94-95 1 원문
Conference 2012 Security Model for Video Surveillance System   Kim Geonwoo  International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.100-104 7 원문
Journal 2012 Security Threats in Cloud Computing Environments   Kangchan Lee  International Journal of Security and Its Applications, v.6, no.4, pp.25-32 44
Conference 2012 System Requirements of Mobile device for Security Service   Jeon Yong-Sung  International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2012, pp.1-3
Conference 2011 International Standardization Trend of Mashup Web Service Security   Nah Jae Hoon  한국정보보호학회 학술 대회 (동계) 2011, pp.1-5
Journal 2010 A Wireless Network Structure and AKA(Authentication and Key Agreement) Protocol of Advanced Metering Infrastructure on the Smart Grid based on Binary CDMA   전재우  정보보호학회논문지, v.20, no.5, pp.111-124
Conference 2010 Context-based Remote Security Control for Mobile Communication Device   An Gaeil  International Symposium on Communications and Information Technologies (ISCIT) 2010, pp.815-820 2 원문
Conference 2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Kim Dae Won  International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1 원문
Journal 2010 Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices   Han Seung Koo  ETRI Journal, v.32, no.2, pp.204-213 7 원문
Conference 2009 Context-Aware Dynamic Security Configuration for Mobile Communication Device   An Gaeil  International Conference on New Technologies, Mobility and Security (NTMS) 2009, pp.1-5 3 원문
Conference 2009 Domain-based Information Control to Enhance Security in Mobile Platforms   Bae Gun Tae  International Conference on Internet (ICONI) 2009, pp.1-7
Conference 2009 Designing Pastry-based Secure IPTV Video Delivery Network   Kwon Hyeok Chan  Joint Workshop on Information Security (JWIS) 2009, pp.1-9
Conference 2009 Protecting IPTV Service Network against Malicious Rendezvous Point   Kwon Hyeok Chan  Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 1 원문
Conference 2009 Implementation of Authorization System for Tele-Medical Service in Ubiquitous Environment   Lee Youri  Joint Workshop on Information Security (JWIS) 2009, pp.1-15
Conference 2009 Secure Overlay for Multicast IPTV Streaming using Trust Rendezvous Point   권혁찬  International Conference on New Trends in Information and Service Science (NISS) 2009, pp.419-422 0 원문
Conference 2009 Secure Overlay Multicast Infrastructure for P2P-based IPTV Service   Kwon Hyeok Chan  International Conference on Advanced Communication Technology (ICACT) 2009, pp.2041-2043
Conference 2008 Malware and Antivirus Deployment for Enterprise Security   Lee Deok Gyu  한국정보기술학회 학술 발표회 (하계) 2008, pp.1-4
Conference 2007 What Are Possible Security Threats in Ubiquitous Sensor Network Environment?   Marie Kim  Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.437-446
Conference 2006 Design and Implementation of High-Performance Security Gateway System   Yoon Seung Yong  Joint Workshop on Information Security (JWIS) 2006, pp.1-15
Conference 2006 A Study on Security Middleware Framework for the Ubiquitous Platform   Park Won-Joo  Vehicular Technology Conference (VTC) 2006 (Fall), pp.1-5 0 원문
Conference 2006 Secure Message Delivery Mechanism on Structured Overlay Network   Nah Jae Hoon  Joint Workshop on Information Security (JWIS) 2006, pp.1-8
Conference 2006 Design of Lightweight Security Protocol for Electronic Seal Data Protection   Yousung Kang  International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.517-531
Conference 2006 The Design and Implementation of MAC Security in EPON   Kyeong-Soo Han  International Conference on Advanced Communication Technology (ICACT) 2006, pp.1673-1676 13
Conference 2005 Security Considerations for RFID Technology Adoption   Park Joo Sang  International Conference on Advanced Communication Technology (ICACT) 2005, pp.797-803 원문
Conference 2005 Abnormal Traffic Detection and Its Implementation   Soo Hyung Lee  International Conference on Advanced Communication Technology (ICACT) 2005, pp.246-250 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2017 보안 장비, 보안 위협 분석 장치 및 방법 KOREA KIPRIS
Registered 2020 보안위협 방지를 위한 동적 세그멘테이션 장치 및 방법 KOREA KIPRIS
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.