Journal
|
2024 |
A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers
Yu Jae Hak Computer Networks, v.254, pp.1-12 |
1 |
원문
|
Journal
|
2023 |
Trends in Digital Security Policies and Trade Rules in Major Overseas Countries
Jieun Kim 전자통신동향분석, v.38, no.4, pp.1-11 |
|
원문
|
Conference
|
2023 |
5G Architecture based on Software-Defined Perimeter (SDP) for Direct Trust Access to Private Networks
Kim Woocheol International Conference on Wireless Networks (ICWN) 2023, pp.2719-2721 |
0 |
원문
|
Journal
|
2023 |
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments
Park Kisung IEEE Transactions on Dependable and Secure Computing, v.20, no.2, pp.1719-1729 |
62 |
원문
|
Conference
|
2022 |
Reinforcement of IoT Open Platform Security using PUF -based Device Authentication
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 |
3 |
원문
|
Journal
|
2022 |
A Framework for Policy Inconsistency Detection in Software-Defined Networks
이승수 IEEE/ACM Transactions on Networking, v.30, no.3, pp.1410-1423 |
7 |
원문
|
Conference
|
2021 |
Security Use-cases for Countering Threats of CLA and UAV in 6G
Kijung Bong International Conference on Intelligent Computing and its Emerging Applications (ICEA) 2021, pp.10-15 |
0 |
원문
|
Conference
|
2021 |
A Study on the Improvement of Fine-grained Ship Classification through Data Augmentation Using Generative Adversarial Networks
Moon Sung-Won International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1230-1232 |
4 |
원문
|
Conference
|
2020 |
Hierarchical Access Control for SDP-IoT
Lee Yun-Kyung International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1742-1744 |
2 |
원문
|
Conference
|
2020 |
Secure IoT Device Authentication Scheme using Key Hiding Technology
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 |
3 |
원문
|
Journal
|
2020 |
A Comprehensive Security Assessment Framework for Software-defined Networks
이승수 Computers & Security, v.91, pp.1-15 |
33 |
원문
|
Conference
|
2019 |
Security Issues in Healthcare Service using EMR and Vital Signals
Yu Jae Hak International Conference on Digital Contents (DigiCon) 2019, pp.30-33 |
|
|
Journal
|
2019 |
Mobile Network Security Issues regarding 5G Security
Park Jong Geun 전자통신동향분석, v.34, no.1, pp.36-48 |
|
원문
|
Conference
|
2017 |
Secure-EPCIS : Addressing Security Issues in EPCIS for IoT applications
Sungpil Woo World Congress on Services (SERVICES) 2017, pp.40-43 |
2 |
원문
|
Conference
|
2017 |
Security Analysis of Samsung Knox
Munkhzorig Dorjmyagmar International Conference on Advanced Communications Technology (ICACT) 2017, pp.550-553 |
|
|
Conference
|
2016 |
On-demand Security Configuration for IoT Devices
Chung Bo-Heung International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 |
19 |
원문
|
Conference
|
2015 |
A Secure and Efficient Smart-Metering Protocol for Dynamic Pricing
Kwantae Cho European Conference of Computer Science (ECCS) 2015 (Recent Advances in Computer Engineering Series 35), v.35, pp.27-35 |
|
|
Conference
|
2015 |
Mynah: Enabling Lightweight Data Plane Authentication for SDN Controllers
Kang Jin Won International Conference on Computer Communication and Networks (ICCCN) 2015, pp.1-6 |
11 |
원문
|
Conference
|
2014 |
Reducing the Impact of Repackaged App on Android
Moon Hwa Shin International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.800-801 |
3 |
원문
|
Conference
|
2012 |
Safe Bit Mixing Method on Pattern Analysis in RFID Environment
Kim Young Back International Symposium on Embedded Technology (ISET) 2012, pp.1-3 |
|
|
Conference
|
2011 |
A Design of On-line 3D Contents Service Using Graphic Offloading
Choi Wonhyuk International Conference on Convergence Content (ICCC) 2011, pp.261-262 |
|
|
Conference
|
2011 |
International Standardization Trend of Mashup Web Service Security
Nah Jae Hoon 한국정보보호학회 학술 대회 (동계) 2011, pp.1-5 |
|
|
Conference
|
2011 |
Trusted CPS Server Discovery Mechanism in the Insecure Cloud Networks
Park Jongyoul International Conferences Control and Automation (CA) / Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal, Simulation (CES3) 2011 (CCIS 256), v.256, pp.160-168 |
1 |
원문
|
Journal
|
2010 |
Recovery of Flash Memories for Reliable Mobile Storages
Moon Dae Sung Mobile Information Systems, v.6, no.2, pp.177-191 |
6 |
원문
|
Conference
|
2010 |
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device
Chung Bo-Heung International Conferences on Security Technology (SecTech) 2010 / Disaster Recovery and Business Continuity (DRBC) 2010 (CCIS 122), v.122, pp.68-73 |
0 |
원문
|
Journal
|
2008 |
Experimental Demonstration of Security-improved OCDMA Scheme Based on Incoherent Broadband Light Source and Bipolar Coding
Chung Hwan Seok Optical Fiber Technology, v.14, no.2, pp.130-133 |
11 |
원문
|
Conference
|
2006 |
A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach
Kim Ho Won International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.1250-1258 |
0 |
|
Conference
|
2006 |
Two Layered PKI Model for Device Authentication in Multi-Domain Home Networks
Hwang Jin Bum International Symposium on Consumer Electronics (ISCE) 2006, pp.634-639 |
3 |
|
Conference
|
2006 |
Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems
Park Nam Je International Symposium on Consumer Electronics (ISCE) 2006, pp.666-671 |
8 |
|
Conference
|
2006 |
Consideration of Efficient Nearest Node Discovering Mechanisms for Key Infection
Hwang Jin Bum International Conference on Advanced Communication Technology (ICACT) 2006, pp.1686-1689 |
0 |
|
Conference
|
2005 |
Security Issues in Peer-to-Peer Systems
Jung Tae Kim International Conference on Advanced Communication Technology (ICACT) 2005, pp.1059-1063 |
|
원문
|