Conference
|
2024 |
Event-Triggered Attitude Controller Design for Unmanned Aerial Vehicles under Cyber Attacks
한승용 International Symposium on Industrial Electronics (ISIE) 2024, pp.1-7 |
0 |
원문
|
Conference
|
2022 |
Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure
Choi Yangseo International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2179-2181 |
2 |
원문
|
Journal
|
2019 |
Mobile Network Security Issues regarding 5G Security
Park Jong Geun 전자통신동향분석, v.34, no.1, pp.36-48 |
|
원문
|
Conference
|
2019 |
신뢰기반 네트워크 접속 제어 및 보호 시스템
Yoo Yoon Sik International Conference on Platform Technology and Service (PlatCon) 2019, pp.71-75 |
1 |
원문
|
Journal
|
2017 |
네트워크 주소 이동 기술 동향
Kyungmin Park 전자통신동향분석, v.32, no.6, pp.73-82 |
|
원문
|
Conference
|
2017 |
A Retransmission Method for Improving Transmission Reliability in One-way Transmission
Boo-Sun Jeon International Conference on Communication and Network Security (ICCNS) 2017, pp.1-5 |
0 |
원문
|
Journal
|
2017 |
DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks
Moon Dae Sung Journal of Supercomputing, v.73, no.7, pp.2881-2895 |
119 |
원문
|
Conference
|
2017 |
Development of Unidirectional Security Gateway satisfying Security Functional Requirements
Seon-Gyoung Sohn World Congress on Information Technology Applications and Services (World IT Congress) 2017, pp.1-6 |
|
|
Conference
|
2016 |
Visualization of Malware Detection Based on API Call Sequence Alignment
Kim Jonghyun International Conference on Internet (ICONI) 2016, pp.175-178 |
|
|
Conference
|
2016 |
Traffic Storing and Related Information Generation System for Cyber Attack Analysis
Choi Yangseo International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 |
1 |
원문
|
Conference
|
2016 |
Development of Unidirectional Security Gateway Appliance using Intel 82580EB NIC Interface
Youngjun Heo International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1194-1196 |
3 |
원문
|
Journal
|
2016 |
Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
Kim Hyun Joo IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 |
6 |
원문
|
Conference
|
2016 |
A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks
Kim Youngsoo International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322 |
|
|
Journal
|
2016 |
An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation
Choi Yong-Je Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 |
7 |
원문
|
Journal
|
2016 |
Secure Firmware Validation and Update for Consumer Devices in Home Networking
Choi Byeong Cheol IEEE Transactions on Consumer Electronics, v.62, no.1, pp.39-44 |
54 |
원문
|
Conference
|
2016 |
Abnormal Traffic Filtering Mechanism for Protecting ICS Networks
Byoung Koo Kim International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 |
7 |
원문
|
Conference
|
2015 |
Behavior-Based Anomaly Detection on Big Data
Kim Hyun Joo SRI Security Congress 2015, pp.73-80 |
|
|
Conference
|
2015 |
Implementation of Netflow based Interactive Connection Traceback System
Jung Tae Kim International Conference on Systems and Networks Communications (ICSNC) 2015, pp.21-26 |
|
|
Conference
|
2014 |
Cyber Incident Forensics as a Forward Lean Security
Jooyoung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.872-873 |
1 |
원문
|
Journal
|
2014 |
Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks
Dong Ho Kang Journal of Applied Mathematics, v.2014, pp.1-7 |
13 |
원문
|
Conference
|
2014 |
Cyber Threats and Defence Approaches in SCADA systems
Dong Ho Kang International Conference on Advanced Communication Technology (ICACT) 2014, pp.324-327 |
17 |
원문
|
Conference
|
2014 |
Design of Industrial Firewall System based on Multiple Access Control Filter
Byoung Koo Kim International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 |
1 |
원문
|
Conference
|
2014 |
Abnormal Behavior Detection Technique based on Big Data
Kim Hyun Joo International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.553-563 |
6 |
원문
|
Conference
|
2014 |
Whitelist Generation Technique for Industrial Firewall in SCADA Networks
Dong Ho Kang International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.525-534 |
4 |
원문
|
Conference
|
2013 |
Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis
Lim Sun Hee International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507 |
|
|
Journal
|
2013 |
Cyber Attacks and Security Intelligence
Kim Youngsoo Research Notes in Information Science, v.14, pp.106-108 |
0 |
|
Conference
|
2013 |
A Study on Multi-Control Working Position Authentication System in Aviation Security
Lee Deok Gyu International Conference on Advanced IT, engineering Management (AIM) 2013, pp.226-230 |
|
|
Conference
|
2011 |
For Aviation Security Using Surveillance System
Lee Deok Gyu FTRA International Workshop on Convergence Security in Pervasive Environments (IWCS) / International Workshop on STAVE / Conference on Secure and Trust Computing, Data Management, and Applications (STA) 2011 (CCIS 187), v.187, pp.103-115 |
0 |
원문
|
Conference
|
2010 |
Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm
송재구 International Conference on Future Generation Communication and Networking (FGCN) 2010 (CCIS 120), v.120, pp.268-275 |
0 |
원문
|
Conference
|
2010 |
Design of Cyber Attack Precursor Symptom Detection Algorithm through System base Behavior Analysis and Memory Monitoring
정성모 International Conference on Future Generation Communication and Networking (FGCN) 2010 (CCIS 120), v.120, pp.276-283 |
2 |
원문
|
Conference
|
2010 |
Context-based Remote Security Control for Mobile Communication Device
An Gaeil International Symposium on Communications and Information Technologies (ISCIT) 2010, pp.815-820 |
2 |
원문
|
Conference
|
2010 |
An Efficient Anti-DDoS Mechanism using Flow-based Forwarding Technology
Namseok Ko International Conference on Optical Internet (COIN) 2010, pp.1-3 |
4 |
원문
|
Journal
|
2009 |
Security Policy Specification for Home Network
Kim Geonwoo International Journal Ad Hoc and Ubiquitous Computing, v.4, no.6, pp.372-378 |
1 |
원문
|
Journal
|
2009 |
Validation Methods of Suspicious Network Flows for Unknown Attack Detection
Kim Ik Kyun International Journal of Computers, v.1, no.3, pp.104-114 |
|
|
Conference
|
2009 |
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication
Lee Deok Gyu Consumer Communications and Networking Conference (CCNC) 2009, pp.1-5 |
5 |
원문
|
Conference
|
2008 |
An Architecture of Unknown Attack Detection System against Zero-day Worm
Kim Ik Kyun International Conference on Applied Computer Science (ACS) 2008, pp.205-211 |
|
|
Conference
|
2008 |
Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network
Lee Deok Gyu International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 |
3 |
원문
|
Conference
|
2008 |
Security Requirement for Cyber Attack Traceback
Ryu Jong Ho International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.653-658 |
3 |
원문
|
Other
|
2008 |
Handbook of Research on Information Security and Assurance
An Gaeil Handbook of Research on Information Security and Assurance [Book], pp.29-41 |
0 |
원문
|
Conference
|
2007 |
Security Framework for Home Network: Authentication, Authorization, and Security Policy
Kim Geonwoo Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 |
7 |
원문
|
Conference
|
2007 |
Memory-efficient content filtering hardware for high-speed intrusion detection systems
Yi Sungwon Symposium on Applied Computing (SAC) 2007, pp.264-269 |
15 |
원문
|
Conference
|
2006 |
Return on Security Investment Against Cyber Attacks on Availability
민병준 International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3981), v.3981, pp.270-278 |
0 |
원문
|