|
Conference
|
2024 |
An open video security platform for edge AI cameras
Su Wan Park International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.643-646 |
0 |
원문
|
|
Conference
|
2024 |
Analyzing the container security threat on the 5G Core Network
Jihyeon Song Silicon Valley Cybersecurity Conference (SVCC) 2024, pp.1-3 |
1 |
원문
|
|
Journal
|
2024 |
Practical Abandoned Object Detection in Real-World Scenarios: Enhancements Using Background Matting with Dense ASPP
정민구 IEEE Access, v.12, pp.60808-60825 |
3 |
원문
|
|
Journal
|
2024 |
PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks
Yusungjin IEEE Internet of Things Journal, v.11, no.9, pp.15450-15464 |
36 |
원문
|
|
Journal
|
2024 |
Multi-channel Transmission Method for Improving TCP Reliability and Transmission Efficiency in UNIWAY
Kim Yong Kyun Journal of Ambient Intelligence and Humanized Computing, v.15, no.2, pp.1583-1598 |
1 |
원문
|
|
Conference
|
2023 |
Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones
Yusungjin International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 |
2 |
원문
|
|
Journal
|
2023 |
Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm
Kim Juyoung IEEE Access, v.11, pp.45323-45333 |
2 |
원문
|
|
Conference
|
2022 |
Security Requirements and Countermeasures in a Cloud-native Environment
Kim Youngsoo International Symposium on Mobile Internet Security (MobiSec) 2022, pp.1-10 |
|
|
|
Conference
|
2022 |
ZTA-based Federated Policy Control Paradigm for Enterprise Wireless Network Infrastructure
Jung Boo Geum Asia-Pacific Conference on Communications (APCC) 2022, pp.1-5 |
5 |
원문
|
|
Journal
|
2022 |
A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
Yusungjin IEEE Internet of Things Journal, v.9, no.20, pp.20214-20228 |
104 |
원문
|
|
Journal
|
2022 |
SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments
Yusungjin IEEE Access, v.10, pp.60534-60549 |
20 |
원문
|
|
Journal
|
2022 |
Attack Graph Generation with Machine Learning for Network Security
Koo Ki Jong Electronics, v.11, no.9, pp.1-25 |
12 |
원문
|
|
Conference
|
2021 |
PUF-based IoT Device Authentication Scheme on IoT Open Platform
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 |
8 |
원문
|
|
Journal
|
2021 |
Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”
Yusungjin IEEE Access, v.9, pp.49154-49159 |
22 |
원문
|
|
Journal
|
2021 |
A Security Analysis of Blockchain-Based Did Services
김봉곤 IEEE Access, v.9, pp.22894-22913 |
28 |
원문
|
|
Journal
|
2020 |
ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI
Kim Tae Wan 전자통신동향분석, v.35, no.7, pp.67-77 |
|
원문
|
|
Journal
|
2020 |
Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications
박태근 한국컴퓨터정보학회논문지, v.25, no.11, pp.105-114 |
|
원문
|
|
Conference
|
2020 |
Security Threats in 5G Edge Computing Environments
Kim Youngsoo International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.905-907 |
15 |
원문
|
|
Conference
|
2020 |
PUF-based Authentication Scheme for IoT Devices
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 |
25 |
원문
|
|
Conference
|
2020 |
Secure IoT Device Authentication Scheme using Key Hiding Technology
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 |
3 |
원문
|
|
Journal
|
2020 |
Trends in Supply-Chain Security Technologies
Kim Dae Won 전자통신동향분석, v.35, no.4, pp.149-157 |
|
원문
|
|
Journal
|
2020 |
Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique
Lee Sung-Hoon IEEE Access, v.8, pp.83248-83264 |
5 |
원문
|
|
Conference
|
2019 |
A Study on Traffic Characteristics for Anomaly Detection of Ethernet-based IVN
Boo-Sun Jeon International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.951-953 |
9 |
원문
|
|
Conference
|
2019 |
Security Considerations for In-Vehicle Secure Communication
Ju Hong Il International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 |
15 |
원문
|
|
Journal
|
2019 |
OSS (Open Source Software) Usage Considerations and Verification Method
Park Jeong-Hyun 전자통신동향분석, v.34, no.1, pp.142-153 |
|
원문
|
|
Journal
|
2018 |
Trends in Automotive Ethernet Security Technology
Chung Bo-Heung 전자통신동향분석, v.33, no.5, pp.76-85 |
|
원문
|
|
Conference
|
2018 |
Who is knocking on the Telnet Port
Heo Hwanjo Asia Conference on Computer and Communications Security (ASIA CCS) 2018, pp.625-636 |
18 |
원문
|
|
Conference
|
2017 |
A Lightweight Authentication Mechanism between IoT Devices
Han Jin Hee International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1154-1156 |
20 |
원문
|
|
Conference
|
2017 |
Remote Security Management Server for IoT Devices
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 |
21 |
원문
|
|
Conference
|
2017 |
Security Considerations Based on Classification of IoT Device Capabilities
Yoon Seung Yong International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15 |
|
|
|
Conference
|
2016 |
Analyzing Security Threats of Android-based Mobile Malware
Yoon Seung Yong International Conference on Security Technology (SecTech) 2016, pp.310-315 |
|
원문
|
|
Conference
|
2016 |
Consideration of Security Threats for Identification System in Internet of Things
Kim Dae Won International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68 |
|
|
|
Journal
|
2016 |
Host-based Intrusion Detection System for Secure Human-centric Computing
Moon Dae Sung Journal of Supercomputing, v.72, no.7, pp.2520-2536 |
36 |
원문
|
|
Conference
|
2015 |
Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology
Lee Sokjoon International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337 |
|
|
|
Conference
|
2015 |
Supporting a Variety of Secure Services Based on MTM
Yoon Seung Yong International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20 |
|
|
|
Journal
|
2015 |
Implementation of a Hardware Security Chip for Mobile Devices
Ju Hong Il IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 |
14 |
원문
|
|
Conference
|
2015 |
Mobile Security Technology for Smart Devices
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176 |
|
|
|
Conference
|
2015 |
An Abnormal Connection Detection System based on Network Flow Analysis
Jong-Hoon Lee International Conference on Consumer Electronics (ICCE) 2015 : Berlin, pp.71-75 |
1 |
원문
|
|
Conference
|
2015 |
Study on Access Permission Control for the Web of Things
Oh Se Won International Conference on Advanced Communication Technology (ICACT) 2015, v.4, no.1, pp.574-580 |
5 |
원문
|
|
Conference
|
2014 |
Mutual Authentication between Ships in the E-Navigation Environment
Oh Seung-Hee International Conference on Security Technology (SecTec) 2014, pp.15-18 |
2 |
원문
|
|
Journal
|
2014 |
Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems
Lee Seoung Hyeon Information, v.5, no.4, pp.622-633 |
11 |
원문
|
|
Conference
|
2014 |
Security Threats Analysis for Android based Mobile Device
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.775-776 |
6 |
원문
|
|
Conference
|
2014 |
Decentralized Access Permission Control Using Resource-Oriented Architecture for the Web of Things
Oh Se Won International Conference on Advanced Communication Technology (ICACT) 2014, pp.749-753 |
19 |
원문
|
|
Journal
|
2013 |
Improving Mobile Device Classification Using Security Events for Preventing Wireless Intrusion
Kwon Hyeok Chan International Journal of Security and Its Applications, v.7, no.6, pp.181-190 |
1 |
원문
|
|
Conference
|
2013 |
Detecting Black-Hole Attack in MANETs with Moving Detection Node
Kim Jeong Tae International Conference on Computers, Communications and Systems (ICCCS) 2013, pp.1-4 |
|
|
|
Conference
|
2013 |
DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System
함유정 International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 |
8 |
원문
|
|
Conference
|
2013 |
A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion
Kwon Hyeok Chan International Conference on Information Science and Industrial Applications (ISI) 2013, pp.317-321 |
|
|
|
Conference
|
2013 |
Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis
Lim Sun Hee International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507 |
|
|
|
Conference
|
2012 |
Security Architecture for Smart Devices
Ju Hong Il International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.94-95 |
1 |
원문
|
|
Conference
|
2012 |
Security Model for Video Surveillance System
Kim Geonwoo International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.100-104 |
7 |
원문
|
|
Journal
|
2012 |
Security Threats in Cloud Computing Environments
Kangchan Lee International Journal of Security and Its Applications, v.6, no.4, pp.25-32 |
44 |
|
|
Conference
|
2012 |
System Requirements of Mobile device for Security Service
Jeon Yong-Sung International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2012, pp.1-3 |
|
|
|
Conference
|
2011 |
International Standardization Trend of Mashup Web Service Security
Nah Jae Hoon 한국정보보호학회 학술 대회 (동계) 2011, pp.1-5 |
|
|
|
Journal
|
2010 |
A Wireless Network Structure and AKA(Authentication and Key Agreement) Protocol of Advanced Metering Infrastructure on the Smart Grid based on Binary CDMA
전재우 정보보호학회논문지, v.20, no.5, pp.111-124 |
|
|
|
Conference
|
2010 |
Context-based Remote Security Control for Mobile Communication Device
An Gaeil International Symposium on Communications and Information Technologies (ISCIT) 2010, pp.815-820 |
2 |
원문
|
|
Conference
|
2010 |
Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File
Kim Dae Won International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 |
1 |
원문
|
|
Journal
|
2010 |
Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices
Han Seung Koo ETRI Journal, v.32, no.2, pp.204-213 |
7 |
원문
|
|
Conference
|
2009 |
Context-Aware Dynamic Security Configuration for Mobile Communication Device
An Gaeil International Conference on New Technologies, Mobility and Security (NTMS) 2009, pp.1-5 |
3 |
원문
|
|
Conference
|
2009 |
Domain-based Information Control to Enhance Security in Mobile Platforms
Bae Gun Tae International Conference on Internet (ICONI) 2009, pp.1-7 |
|
|
|
Conference
|
2009 |
Designing Pastry-based Secure IPTV Video Delivery Network
Kwon Hyeok Chan Joint Workshop on Information Security (JWIS) 2009, pp.1-9 |
|
|
|
Conference
|
2009 |
Protecting IPTV Service Network against Malicious Rendezvous Point
Kwon Hyeok Chan Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 |
1 |
원문
|
|
Conference
|
2009 |
Implementation of Authorization System for Tele-Medical Service in Ubiquitous Environment
Lee Youri Joint Workshop on Information Security (JWIS) 2009, pp.1-15 |
|
|
|
Conference
|
2009 |
Secure Overlay for Multicast IPTV Streaming using Trust Rendezvous Point
권혁찬 International Conference on New Trends in Information and Service Science (NISS) 2009, pp.419-422 |
0 |
원문
|
|
Conference
|
2009 |
Secure Overlay Multicast Infrastructure for P2P-based IPTV Service
Kwon Hyeok Chan International Conference on Advanced Communication Technology (ICACT) 2009, pp.2041-2043 |
|
|
|
Conference
|
2008 |
Malware and Antivirus Deployment for Enterprise Security
Lee Deok Gyu 한국정보기술학회 학술 발표회 (하계) 2008, pp.1-4 |
|
|
|
Conference
|
2007 |
What Are Possible Security Threats in Ubiquitous Sensor Network Environment?
Marie Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.437-446 |
|
|
|
Conference
|
2006 |
Design and Implementation of High-Performance Security Gateway System
Yoon Seung Yong Joint Workshop on Information Security (JWIS) 2006, pp.1-15 |
|
|
|
Conference
|
2006 |
A Study on Security Middleware Framework for the Ubiquitous Platform
Park Won-Joo Vehicular Technology Conference (VTC) 2006 (Fall), pp.1-5 |
0 |
원문
|
|
Conference
|
2006 |
Secure Message Delivery Mechanism on Structured Overlay Network
Nah Jae Hoon Joint Workshop on Information Security (JWIS) 2006, pp.1-8 |
|
|
|
Conference
|
2006 |
Design of Lightweight Security Protocol for Electronic Seal Data Protection
Yousung Kang International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.517-531 |
|
|
|
Conference
|
2006 |
The Design and Implementation of MAC Security in EPON
Kyeong-Soo Han International Conference on Advanced Communication Technology (ICACT) 2006, pp.1673-1676 |
13 |
|
|
Conference
|
2005 |
Security Considerations for RFID Technology Adoption
Park Joo Sang International Conference on Advanced Communication Technology (ICACT) 2005, pp.797-803 |
|
원문
|
|
Conference
|
2005 |
Abnormal Traffic Detection and Its Implementation
Soo Hyung Lee International Conference on Advanced Communication Technology (ICACT) 2005, pp.246-250 |
|
원문
|