Journal
|
2025 |
Trade-off Model-Based Traffic Sampling for Intrusion Detection in Hybrid Vehicular Networks
Ryangsoo Kim IEEE Transactions on Vehicular Technology, v.권호미정, pp.1-6 |
0 |
원문
|
Journal
|
2024 |
SITRAN: Self-Supervised IDS With Transferable Techniques for 5G Industrial Environments
Kimhyunjin IEEE Internet of Things Journal, v.11, no.21, pp.35465-35476 |
0 |
원문
|
Conference
|
2023 |
Intelligent Anomaly Detection System for Critical Network Infrastructure
Jung Boo Geum International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1410-1412 |
0 |
원문
|
Conference
|
2023 |
Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks
Park Cheolhee European Conference on Networks and Communications (EuCNC) 2023, pp.490-495 |
7 |
원문
|
Journal
|
2023 |
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks
Park Cheolhee IEEE Internet of Things Journal, v.10, no.3, pp.2330-2345 |
141 |
원문
|
Conference
|
2021 |
Network Anomaly Detection based on GAN with Scaling Properties
Kimhyunjin International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-5 |
5 |
원문
|
Journal
|
2021 |
Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks
정성훈 Vehicular Communications, v.29, pp.1-11 |
53 |
원문
|
Journal
|
2018 |
Hybrid Sensor Network-Based Indoor Surveillance System for Intrusion Detection
박하실 Symmetry, v.10, no.6, pp.1-17 |
4 |
원문
|
Journal
|
2017 |
DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks
Moon Dae Sung Journal of Supercomputing, v.73, no.7, pp.2881-2895 |
119 |
원문
|
Conference
|
2016 |
Hierarchical Network Signature Clustering and Generation
Choi Sunoh International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 |
2 |
원문
|
Journal
|
2016 |
Vision Based Displacement Detection for Stabilized UAV Control on Cloud Server
정혁준 Mobile Information Systems, v.2016, pp.1-11 |
6 |
원문
|
Journal
|
2016 |
Host-based Intrusion Detection System for Secure Human-centric Computing
Moon Dae Sung Journal of Supercomputing, v.72, no.7, pp.2520-2536 |
35 |
원문
|
Journal
|
2015 |
A Multi-Resolution Port Scan Detection Technique for High-Speed Networks
Moon Hwa Shin Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 |
2 |
원문
|
Conference
|
2015 |
A Novel Hierarchical Detection Method for Enhancing Anomaly Detection Efficiency
Kim Eun Hye International Conference on Communication Systems and Computing Application Science (CSCAS) 2015, pp.1-5 |
8 |
원문
|
Journal
|
2013 |
An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques
Yu Jae Hak Journal of Systems Architecture, v.59, no.10 Part B, pp.1005-1012 |
42 |
원문
|
Journal
|
2012 |
A Novel Anomaly-Network Intrusion Detection System Using ABC Algorithms
Chang Seok Bae International Journal of Innovative Computing, Information and Control, v.8, no.12, pp.8231-8248 |
16 |
|
Conference
|
2012 |
Implementation of WSN application service using people detection algorithm
Hong Yeon Yu International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.117-118 |
0 |
원문
|
Journal
|
2012 |
The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack
Kim Sun Wook IETE Journal of Research, v.58, no.5, pp.398-410 |
0 |
원문
|
Journal
|
2011 |
Self-Adaptive and Dynamic Clustering for Online Anomaly Detection
Seung Min Lee Expert Systems with Applications, v.38, no.12, pp.14891-14898 |
47 |
원문
|
Conference
|
2010 |
Network Intrusion Prevention System based on TOE
Kim Sun Wook International Workshop on Information Security Applications (WISA) 2010, pp.1-6 |
|
|
Journal
|
2010 |
Feature Construction Scheme for Efficient Intrusion Detection System
Kim Eun Hye Journal of Information Science and Engineering, v.26, no.2, pp.527-547 |
4 |
|
Journal
|
2009 |
Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection
Byoung Koo Kim International Journal of Computers, v.3, no.1, pp.115-124 |
|
|
Journal
|
2008 |
H/W based Stateful Packet Inspection using a Novel Session Architecture
Yoon Seung Yong International Journal of Computers, v.3, no.2, pp.310-319 |
|
|
Conference
|
2008 |
An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware
Byoung Koo Kim International Conference on Applied Computer Science (ACS) 2008, pp.199-204 |
|
|
Conference
|
2008 |
Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System
Yoon Seung Yong International Conference on Applied Computer Science (ACS) 2008, pp.1-6 |
|
|
Conference
|
2008 |
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets
Ryan Iwahashi International Conference on Information Security (ISC) 2008 (LNCS 5222), v.5222, pp.114-130 |
4 |
원문
|
Conference
|
2008 |
A Survey on Visualization for Wireless Security
Jeong Chi Yoon International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.129-132 |
4 |
원문
|
Conference
|
2008 |
Performance Evaluation of TCAM Based Pattern-Matching Algorithm
Sung Jung Sik Vehicular Technology Conference (VTC) 2008 (Fall), pp.1-5 |
1 |
원문
|
Conference
|
2008 |
An Efficient Algorithm for Intrusion Source Identification
Kim Jonghyun International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.188-190 |
0 |
원문
|
Conference
|
2008 |
Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System
이중희 International Conference on Advanced Communication Technology (ICACT) 2008, pp.1170-1175 |
63 |
원문
|
Conference
|
2008 |
A Cooperation Network Model for Secure Management in Dynamic P2P Flow
Moon Yong Hyuk International Conference on Advanced Communication Technology (ICACT) 2008, pp.1176-1181 |
1 |
원문
|
Conference
|
2007 |
Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor
Young Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 |
1 |
원문
|
Conference
|
2007 |
High Performance Session State Management Scheme for Stateful Packet Inspection
Yoon Seung Yong Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 |
6 |
원문
|
Conference
|
2007 |
Implementation of Multi-thread based Intrusion Prevention System for IPv6
Lim Jae Deok International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 |
5 |
원문
|
Conference
|
2007 |
FPGA based light-weight Security Gateway System
Dong Ho Kang International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387 |
|
|
Journal
|
2007 |
Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System
Oh Jintae International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117 |
|
|
Conference
|
2007 |
Memory-efficient content filtering hardware for high-speed intrusion detection systems
Yi Sungwon Symposium on Applied Computing (SAC) 2007, pp.264-269 |
15 |
원문
|
Conference
|
2006 |
High-Performance Stateful Intrusion Detection System
Yoon Seung Yong International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 |
4 |
원문
|
Conference
|
2006 |
FPGA Based Intrusion Detection System Against Unknown and Known Attacks
Dong Ho Kang Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 |
3 |
원문
|
Conference
|
2006 |
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
Sung Jung Sik International Conference on Research in Networking (Networking) 2006 (LNCS 3976), v.3976, pp.1157-1162 |
2 |
원문
|
Conference
|
2006 |
Design and Implementation of FPGA Based High-Performance Intrusion Detection System
Byoung Koo Kim International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 |
4 |
원문
|
Conference
|
2006 |
Computational Science and Its Applications - ICCSA 2006
Dong Ho Kang International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10 |
|
원문
|
Conference
|
2006 |
Fragment Packet Partial Re-assembly Method for Intrusion Detection
Chung Bo-Heung International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 |
0 |
|
Conference
|
2006 |
A Developing of Signature-based Network Security Tester for NGSS
Jeong Youn Seo International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 |
0 |
|
Conference
|
2006 |
Incorporating Intrusion Detection Functionality into 1XP2800 Network Processor based Router
Ryu Seung Ho International Conference on Advanced Communication Technology (ICACT) 2006, pp.797-800 |
1 |
|
Journal
|
2005 |
Security Requirements and Proposals for the Home Server in Ubiquitous Home Networks
Jung Tae Kim 전자통신동향분석, v.20, no.2, pp.83-92 |
|
원문
|
Conference
|
2004 |
Design and Implementation of Detection Engine Against IDS Evasion with Unicode
Dong Ho Kang International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 |
|
원문
|
Journal
|
2004 |
네트워크-기반 침입방지 시스템 성능 평가 기술 동향
Jeon Yong Hee 주간기술동향, v.1158, pp.16-31 |
|
|
Journal
|
2004 |
네트워크-기반 침입방지 시스템 성능 평가 기술 동향
Jeon Yong Hee 주간기술동향, v.1158, pp.16-31 |
|
|
Conference
|
2004 |
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System
김형주 International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 |
0 |
원문
|
Journal
|
2004 |
침입탐지시스템과 침입방지시스템의 기술 비교 및 동향
Jeon Yong Hee 주간기술동향, v.1149, pp.1-7 |
|
|
Conference
|
2004 |
Design and Implementation of High-Performance Intrusion Detection System
Kim Byoung Koo International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 |
2 |
원문
|
Conference
|
2004 |
Two-step Rule Estimation (TRE) - Intrusion Detection Method against Eluding NIDS
Choi Byeong Cheol International Conference on Advanced Communication Technology (ICACT) 2004, pp.504-507 |
|
원문
|
Conference
|
2004 |
Kernel-level Intrusion Detection System for Minimum Packet Loss
Chung Bo-Heung International Conference on Advanced Communication Technology (ICACT) 2004, pp.207-212 |
|
원문
|
Journal
|
2004 |
Giga급 보안 프로세서 및 VPN 장비 기술 동향
김기현 주간기술동향, v.1131, pp.1-13 |
|
|
Conference
|
2002 |
Design of Network Security Control System for Cooperative Intrusion Detection
Kim Byoung Koo Information Networking: Wireless Communications Technologies and Network Applications (ICOIN) 2002 (LNCS 2344), v.2344, pp.389-398 |
4 |
원문
|
Conference
|
2002 |
Information Model for Policy-Based Network Security Management
Kim Sook Yeon International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 |
3 |
원문
|