Journal
|
2023 |
Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection
Choi Yangseo 전자통신동향분석, v.38, no.5, pp.71-80 |
|
원문
|
Conference
|
2022 |
Analysis of Intrusion Detection Performance by Smoothing Factor of Gaussian NB Model Using Modified NSL-KDD Dataset
Kijung Bong International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1471-1476 |
7 |
원문
|
Conference
|
2017 |
Netflow Based HTTP Get Flooding Attack Analysis
Jung Tae Kim International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017 |
|
|
Conference
|
2016 |
Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis
Jung Tae Kim International Conference on Evolving Internet (INTERNET) 2016, pp.20-25 |
|
|
Journal
|
2015 |
Short Dynamic Group Signature Scheme Supporting Controllable Linkability
Jung Yeon Hwang IEEE Transactions on Information Forensics and Security, v.10, no.6, pp.1109-1124 |
57 |
원문
|
Conference
|
2015 |
Host Behavior Characteristic Description Method Against APT Attack Detection
Moon Dae Sung World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7 |
|
|
Conference
|
2014 |
Abnormal Behavior Detection Technique based on Big Data
Kim Hyun Joo International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.553-563 |
6 |
원문
|
Journal
|
2013 |
Mobile Malware Detection Using Correlational Analysis
Yoon Seung Yong International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58 |
|
|
Journal
|
2013 |
An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques
Yu Jae Hak Journal of Systems Architecture, v.59, no.10 Part B, pp.1005-1012 |
42 |
원문
|
Conference
|
2013 |
MAC Spoofing Attack Detection based on EVM in 802.11 WLAN
An Gaeil International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM) 2013, pp.163-167 |
|
|
Journal
|
2013 |
Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection
Choi Yangseo Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 |
0 |
|
Conference
|
2013 |
A DNS Flooding Attack Detection by Attack Traffic Characteristics Analysis
Byoung Koo Kim International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.875-877 |
|
|
Conference
|
2012 |
AIGG Threshold Based HTTP GET Flooding Attack Detection
Choi Yangseo International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 |
14 |
원문
|
Conference
|
2011 |
Rooting attack detection method on the Android-based smart phone
장원준 International Conference on Computer Science and Network Technology (ICCSNT) 2011, pp.477-481 |
9 |
원문
|
Conference
|
2011 |
Timeslot Monitoring Model for Application Layer DDoS Attack Detection
Choi Yangseo International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679 |
|
|
Conference
|
2011 |
Traffic Flooding Attack Detection and Classification with SNMP MIB via SVDD and Sparse Representation
Yu Jae Hak International Conference on Information System, Computer Engineering and Application (ICISCEA) 2011, pp.26-34 |
|
|
Conference
|
2011 |
A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment
정성모 International Conference on Advanced Communication and Networking (ACN) 2011 (CCIS 199), v.199, pp.31-35 |
3 |
원문
|
Conference
|
2010 |
Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention
Choi Yangseo International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 |
27 |
원문
|
Conference
|
2009 |
Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points
조유희 Asia-Pacific Network Operations and Management Symposium (APNOMS) 2009 (LNCS 5787), v.5787, pp.385-394 |
0 |
원문
|
Conference
|
2009 |
Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme
Yoon Seung Yong International Conference on Security and Management (SAM) 2009, pp.1-5 |
|
|
Journal
|
2009 |
Validation Methods of Suspicious Network Flows for Unknown Attack Detection
Kim Ik Kyun International Journal of Computers, v.1, no.3, pp.104-114 |
|
|
Conference
|
2009 |
A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment
Kim Ik Kyun International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 |
|
|
Conference
|
2008 |
An Architecture of Unknown Attack Detection System against Zero-day Worm
Kim Ik Kyun International Conference on Applied Computer Science (ACS) 2008, pp.205-211 |
|
|
Conference
|
2004 |
A Combined Data Mining Approach for DDoS Attack Detection
김미희 International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.943-950 |
24 |
원문
|
Conference
|
2001 |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation
Choi Yangseo International Conference on Information Security and Cryptology (ICISC) 2001 (LNCS 2288), v.2288, pp.146-159 |
1 |
|