Conference
|
2024 |
Defending Against EMI Attacks on Just-In-Time Checkpoint for Resilient Intermittent Systems
Jaeseok Choi International Symposium on Microarchitecture (MICRO) 2024, pp.1-15 |
1 |
원문
|
Conference
|
2024 |
Caphammer: Exploiting Capacitor Vulnerability of Energy Harvesting Systems
Joe Hyunwoo International Conference on Embedded Software (EMSOFT) 2024 / IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp.1-12 |
3 |
원문
|
Conference
|
2024 |
Caphammer: Exploiting Capacitor Vulnerability of Energy Harvesting Systems
최종욱 International Conference on Embedded Software (EMSOFT) 2024 / IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp.1-12 |
3 |
원문
|
Conference
|
2024 |
Analyzing the container security threat on the 5G Core Network
Jihyeon Song Silicon Valley Cybersecurity Conference (SVCC) 2024, pp.1-3 |
0 |
원문
|
Conference
|
2023 |
Partitioning Ethereum without Eclipsing It
Heo Hwanjo Network and Distributed System Security Symposium (NDSS) 2023, pp.1-18 |
10 |
원문
|
Conference
|
2022 |
Network Detection of Fake Base Station using Automatic Neighbour Relation in Self-Organizing Networks
Shin Ji Soo International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.968-970 |
4 |
원문
|
Conference
|
2021 |
Countering Interest flooding DDoS attacks in NDN Network
Sul Dong Myung International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1412-1414 |
0 |
원문
|
Journal
|
2021 |
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
Song-Yi Hwang Sensors, v.21, no.21, pp.1-23 |
8 |
원문
|
Conference
|
2021 |
Behind Block Explorers: Public Blockchain Measurement and Security Implication
Heo Hwanjo International Conference on Distributed Computing Systems (ICDCS) 2021, pp.216-226 |
5 |
원문
|
Conference
|
2020 |
Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT
Lim Jae Deok International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 |
2 |
원문
|
Conference
|
2020 |
Hierarchical Access Control for SDP-IoT
Lee Yun-Kyung International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1742-1744 |
2 |
원문
|
Journal
|
2019 |
A Secure Charging System for Electric Vehicles Based on Blockchain
김명현 Sensors, v.19, no.13, pp.1-22 |
65 |
원문
|
Conference
|
2018 |
Abnormal Traffic Detection Mechanism for Protecting IIoT Environments
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 |
8 |
원문
|
Conference
|
2017 |
Self-certifying ID based Trustworthy Networking System for IoT Smart Service Domain
Kim Eung Ha International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1300-1302 |
7 |
원문
|
Conference
|
2017 |
Trust Domain Based Trustworthy Networking
Byeongok Kwak International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1248-1250 |
5 |
원문
|
Conference
|
2017 |
Netflow Based HTTP Get Flooding Attack Analysis
Jung Tae Kim International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017 |
|
|
Conference
|
2016 |
Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis
Jung Tae Kim International Conference on Evolving Internet (INTERNET) 2016, pp.20-25 |
|
|
Conference
|
2015 |
Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology
Lee Sokjoon International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337 |
|
|
Journal
|
2015 |
Tag-Reader Mutual Authentication Protocol for Safe RFID/USN Environments
Bang Hyochan Information : An International Interdisciplinary Journal, v.18, no.12, pp.5103-5116 |
0 |
|
Conference
|
2015 |
A Technique to Make a Path Table for Blocking Distributed Denial-of-Service Attacks
Eun Jee Sook International Conference on Future Generation Communication and Networking (FGCN) 2015, pp.13-16 |
1 |
원문
|
Journal
|
2015 |
Cyber Genome Technology for Countering Malware
Kim Jonghyun 전자통신동향분석, v.30, no.5, pp.118-128 |
|
원문
|
Journal
|
2015 |
Controller Scheduling for Continued SDN Operation under DDoS Attacks
임승헌 Electronics Letters, v.51, no.16, pp.1259-1261 |
52 |
원문
|
Conference
|
2015 |
A Design of Authentication Method Based on Magnetic Field Area Network
Juyoung Park International Conference on Convergence and its Application (ICCA) 2015, v.10, no.13, pp.33574-33576 |
0 |
|
Journal
|
2014 |
A Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router
Park Pyung-Koo Multimedia Tools and Applications, v.74, no.16, pp.6341-6363 |
1 |
원문
|
Journal
|
2014 |
Technical Trends of the Cyber Attack Traceback
Jung Tae Kim 전자통신동향분석, v.29, no.1, pp.93-103 |
|
원문
|
Conference
|
2014 |
Defenses against ICMP Flooding Attacks
Byoung Koo Kim International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 |
|
|
Conference
|
2013 |
Detecting Application Layer-based Slow DDoS Attack
Yoon Seung Yong Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.319-322 |
|
|
Conference
|
2013 |
Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics
Byoung Koo Kim Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340 |
|
|
Journal
|
2013 |
GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection
Kim Hyun Joo Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 |
0 |
|
Journal
|
2013 |
Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection
Choi Yangseo Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 |
0 |
|
Conference
|
2013 |
Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis
Lim Sun Hee International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507 |
|
|
Conference
|
2013 |
Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router
Park Pyung-Koo International Conference on Information Science and Applications (ICISA) 2013, pp.1-4 |
0 |
원문
|
Conference
|
2012 |
A Pseudo State-based Distributed DoS Detection Mechanism using Dynamic Hashing
Park Pyung-Koo International Conference on Security Technology (SecTech) 2012 (CCIS 339), v.339, pp.22-29 |
1 |
원문
|
Journal
|
2012 |
Multicore Flow Processor with Wire-Speed Flow Admission Control
Doo Kyeong Hwan ETRI Journal, v.34, no.6, pp.827-837 |
5 |
원문
|
Journal
|
2012 |
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
최경 Energies, v.5, no.10, pp.4091-4109 |
35 |
원문
|
Conference
|
2012 |
Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding
Kim Dae Won International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 |
1 |
원문
|
Conference
|
2012 |
AIGG Threshold Based HTTP GET Flooding Attack Detection
Choi Yangseo International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 |
14 |
원문
|
Conference
|
2012 |
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks
김현주 International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 |
6 |
원문
|
Conference
|
2011 |
Design and Implementation of Secure-NIC System for DDoS Attack Response
Byoung Koo Kim 한국정보처리학회 학술 발표 (추계) 2011, pp.996-998 |
|
|
Journal
|
2011 |
Trend on the Future Internet Security Technologies
Lee Sang-Woo 전자통신동향분석, v.26, no.5, pp.102-111 |
|
원문
|
Journal
|
2011 |
Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment
Abedelaziz Mohaisen KSII Transactions on Internet and Information Systems, v.5, no.9, pp.1684-1697 |
0 |
원문
|
Journal
|
2011 |
Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card
Byoung Koo Kim 정보보호학회논문지, v.21, no.2, pp.119-129 |
|
|
Journal
|
2010 |
Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment
송재구 Sensors, v.10, no.11, pp.10376-10386 |
6 |
원문
|
Conference
|
2010 |
Control Method for the number of Checkpoint Nodes for Detecting Selective Forwarding Attacks in Wireless Sensor Networks
Lee Sang Jin International Conference on Information and Communication Technology Convergence (ICTC) 2010, pp.537-538 |
2 |
원문
|
Conference
|
2010 |
An Effective Defense Mechanism Against DoS/DDoS Attacks in Flow-based Routers
Park Pyung-Koo International Conference on Advances in Mobile Computing and Multimedia (MoMM) 2010, pp.442-446 |
6 |
원문
|
Journal
|
2009 |
Research on Distributed Denial of Service Attack Response Infrastructure
Choi Yangseo 정보보호학회지, v.19, no.5, pp.11-20 |
|
|
Conference
|
2009 |
Protecting IPTV Service Network against Malicious Rendezvous Point
Kwon Hyeok Chan Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 |
1 |
원문
|
Conference
|
2008 |
Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN
An Gaeil International Conference on Autonomic and Trusted Computing (ATC) 2008 (LNCS 5060), v.5060, pp.36-46 |
4 |
원문
|
Journal
|
2008 |
A dynamic quarantine scheme for controlling unresponsive TCP sessions
Yi Sungwon Telecommunication Systems, v.37, no.4, pp.169-189 |
14 |
원문
|
Journal
|
2007 |
3라운드 스마트카드 기반의 키 교환
권정옥 IEICE Transactions on Communications, v.E90-B, no.11, pp.3255-3258 |
|
원문
|
Conference
|
2007 |
A Study of Defense DDoS Attacks using IP Traceback
채철주 International Conference on Intelligent Pervasive Computing (IPC) 2007, pp.402-405 |
8 |
원문
|
Conference
|
2006 |
IPv6 Duplicate Address Detection DoS Attack Detector
류승호 International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-10 |
|
|
Conference
|
2005 |
The Method of P2P Traffic Detecting for P2P Harmful Contents Prevention
Lee Ho Gyun International Conference on Advanced Communication Technology (ICACT) 2005, pp.777-780 |
|
원문
|
Journal
|
2004 |
Attacker Response Framework using Mobile Code
Bang Hyochan 정보처리학회논문지 C, v.11C, no.7, pp.959-970 |
|
|
Journal
|
2004 |
Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks
Park Sang Kil 정보처리학회논문지 C, v.11, no.7, pp.951-958 |
|
|
Journal
|
2004 |
라우터 보안 기술 동향
Chung Bo-Heung 주간기술동향, v.1154, pp.1-12 |
|
|
Conference
|
2004 |
The Study about Detection of Traffic Congestion attacks using MIB traffic variables
Park Won-Joo International Conference on Advanced Communication Technology (ICACT) 2004, pp.199-203 |
|
원문
|
Conference
|
2003 |
MF (Minority First) scheme for defeating distributed denial of service attacks
An Gaeil International Symposium on Computers and Communications (ISCC) 2003, pp.1-6 |
7 |
원문
|