|
Journal
|
2022 |
MFA-net: Object detection for complex X-ray cargo and baggage security imagery
Thanaporn Viriyasaranon PLOS ONE, v.17, no.9, pp.1-20 |
12 |
원문
|
|
Conference
|
2022 |
ArtBrain-K: AI Processor based-on 5-PetaFLOPS AI Server System
Han Jin Ho International Conference on Artificial Intelligence Circuits and Systems (AICAS) 2022, pp.1-3 |
1 |
원문
|
|
Conference
|
2021 |
Anomaly Detection based on User Feedback Learning using Multi-layered Surveillance Map
Shin Hochul International Conference on Control, Automation and Systems (ICCAS) 2021, pp.1-2 |
|
|
|
Conference
|
2021 |
Abnormal Situation Detection using Global Surveillance Map
Shin Hochul International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-4 |
1 |
원문
|
|
Conference
|
2021 |
Network Failover in Multiple WAN Environment for Reliable Sensor Network
Lee Hoo Sung International Conference on Advanced Engineering and ICT-Convergence (ICAEIC) 2021, v.4, no.2, pp.272-274 |
|
|
|
Conference
|
2020 |
Anomaly Detection Algorithm Based on Global Object Map for Video Surveillance System
Shin Hochul International Conference on Control, Automation and Systems (ICCAS) 2020, pp.1-3 |
3 |
원문
|
|
Journal
|
2020 |
User Recognition Based on Human Body Impulse Response: A Feasibility Study
정진호 IEEE Access, v.8, pp.6627-6637 |
4 |
원문
|
|
Journal
|
2019 |
Trends of Intelligent Public Safety Service Technologies
Bang Junseong 전자통신동향분석, v.34, no.1, pp.111-122 |
|
원문
|
|
Conference
|
2018 |
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps
Lee Sung-Hoon International Symposium on Software Reliability Engineering Workshops (ISSREW) 2018, pp.36-41 |
2 |
원문
|
|
Conference
|
2017 |
Embedded Face Identification System for a Smart Home
Yoo Jang-Hee International Conference on Internet (ICONI) 2017 : Symposium, pp.1-2 |
|
|
|
Conference
|
2017 |
Side Channel Attack on Digital Door Lock with Vibration Signal Analysis: Longer Password does not Guarantee Higher Security Level
Youngmok Ha International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI) 2017, pp.103-110 |
5 |
원문
|
|
Conference
|
2017 |
Building a Big Data Platform for Large-scale Security Data Analysis
Jong-Hoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 |
5 |
원문
|
|
Journal
|
2017 |
Face Recognition Performance Comparison between Fake Faces and Live Faces
Cho Mi Young Soft Computing, v.21, no.12, pp.3429-3437 |
18 |
원문
|
|
Journal
|
2016 |
RTNSS: A Routing Trace-based Network Security System for Preventing ARP Spoofing Attacks
Moon Dae Sung Journal of Supercomputing, v.72, no.5, pp.1740-1756 |
9 |
원문
|
|
Journal
|
2016 |
Single Authentication Through in Convergence Space Using Collaborative Smart Cameras
Kim Geonwoo Security and Communication Networks, v.9, no.6, pp.561-570 |
0 |
원문
|
|
Conference
|
2015 |
Transmitted File Extraction and Reconstruction from Network Packets
Choi Yangseo World Congress on Internet Security (WorldCIS) 2015, pp.164-165 |
2 |
원문
|
|
Conference
|
2015 |
Smart Agricultural Framework over RCAS in CATV Network
Han Seung Koo International Conference on Advanced Communication Technology (ICACT) 2015, pp.209-212 |
0 |
원문
|
|
Conference
|
2015 |
Design Challenges and Implementation of a Shipborne Gateway for Safe and Secure Navigational Networks
Lee Kwangil International Conference on Future Information Technology (FutureTech) 2015 (LNEE 354), v.354, pp.129-135 |
0 |
원문
|
|
Journal
|
2015 |
Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments
오두환 ETRI Journal, v.37, no.2, pp.348-358 |
13 |
원문
|
|
Conference
|
2014 |
Secure Virtualised Environment
Pushpinder Kaur Chouhan International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 |
0 |
원문
|
|
Conference
|
2014 |
Face Recognition Performance Comparison of Fake Faces with Real Faces in Relation to Lighting
Cho Mi Young International Workshop on Managing Insider Security Threats (MIST) 2014, pp.1-9 |
0 |
|
|
Conference
|
2014 |
Implementation of a Video Streaming Security System for Smart Device
Jeon Yong-Sung International Conference on Consumer Electronics (ICCE) 2014, pp.97-100 |
5 |
원문
|
|
Conference
|
2013 |
A Study on Implementation of Active Localization System Using a Microphone Array and a Loudspeaker in a Small Room
김기현 International Congress and Exposition on Noise Control Engineering (Inter-Noise) 2013, pp.1-6 |
|
|
|
Conference
|
2013 |
SCADA Network Security System Using NSM Data Objects
Youngjun Heo International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.1145-1147 |
|
|
|
Journal
|
2012 |
Multicore Flow Processor with Wire-Speed Flow Admission Control
Doo Kyeong Hwan ETRI Journal, v.34, no.6, pp.827-837 |
5 |
원문
|
|
Conference
|
2012 |
Active Localization of a Silent Intruder with Audible Frequency in 2D Security Space
김기현 International Congress and Exposition on Noise Control Engineering (Inter-Noise) 2012, pp.1-8 |
|
|
|
Conference
|
2012 |
Active Localization of a Silent Intruder using Acoustic Imaging in Anechoic Space
김기현 Internaltional Congress on Sound and Vibration (ICSV) 2012, pp.1-8 |
|
|
|
Journal
|
2012 |
A Rule Based Event Correlation Approach for Physical and Logical Security Convergence
Dong Ho Kang International Journal of Computer Science and Network Security, v.12, no.1, pp.28-31 |
|
|
|
Journal
|
2012 |
System Architecture for Physical/IT Security Event Integration
Seon-Gyoung Sohn International Journal of Computer Science and Network Security, v.12, no.1, pp.66-70 |
|
|
|
Conference
|
2010 |
A Modified Multi-Resolution Approach for Port Scan Detection
Moon Jiwoo Global Telecommunications Conference (GLOBECOM) 2010, pp.1-5 |
3 |
원문
|
|
Conference
|
2010 |
Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File
Kim Dae Won International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 |
1 |
원문
|
|
Conference
|
2010 |
An Efficient Anti-DDoS Mechanism using Flow-based Forwarding Technology
Namseok Ko International Conference on Optical Internet (COIN) 2010, pp.1-3 |
4 |
원문
|
|
Conference
|
2009 |
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique
Kim Dae Won International Conference on Communications (ICC) 2009, pp.1-6 |
0 |
원문
|
|
Conference
|
2009 |
Identity Data Security System for the Digital Identity Wallet
Choi Dae Seon International Conference on Advanced Communication Technology (ICACT) 2009, pp.1678-1681 |
|
|
|
Conference
|
2008 |
A Survey on Visualization for Wireless Security
Jeong Chi Yoon International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.129-132 |
5 |
원문
|
|
Journal
|
2008 |
Tracing Stored Program Counter to Detect Polymorphic Shellcode
Kim Dae Won IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 |
3 |
원문
|
|
Conference
|
2008 |
Development of PP for Security System on MID
Jeong Youn Seo International Conference on Electronics, Informations and Communications (ICEIC) 2008, pp.911-914 |
|
|
|
Conference
|
2008 |
Intelligent Security for Inter-space Surveillance Applications
Kim Geonwoo International Conference on Multimedia and Ubiquitous Engineering (MUE) 2008, pp.419-422 |
1 |
원문
|
|
Conference
|
2008 |
Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals
Jeong Youn Seo International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 |
2 |
원문
|
|
Conference
|
2007 |
Integrating Evidences of Independently Developed Face and Speaker Recognition Systems by Using Discrete Probability Density Function
Lee Jae Yeon International Symposium on Robot and Human Interactive Communication (RO-MAN) 2007, pp.667-672 |
1 |
원문
|
|
Journal
|
2007 |
A Non-Cooperative User Authentication System in Robot Environments
Kim Do-Hyung IEEE Transactions on Consumer Electronics, v.53, no.2, pp.804-811 |
34 |
원문
|
|
Conference
|
2006 |
High-Performance Stateful Intrusion Detection System
Yoon Seung Yong International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 |
4 |
원문
|
|
Conference
|
2006 |
Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6
Lim Jae Deok SICE-ICASE International Joint Conference 2006, pp.3924-3927 |
1 |
원문
|
|
Conference
|
2006 |
Face Identification for Human Robot Interaction: Intelligent Security System for Multi-user Working Environment on PC
Kim Do-Hyung International Symposium on Robot and Human Interactive Communication (ROMAN) 2006, pp.617-622 |
3 |
원문
|
|
Conference
|
2006 |
Hardware Supports for Network Traffic Anomaly Detection
Kim Dae Won International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5 |
|
|
|
Conference
|
2006 |
Protection Algorithm Against Security Holes of IPv6 Routing Header
Lim Jae Deok International Conference on Advanced Communication Technology (ICACT) 2006, pp.2004-2007 |
2 |
|
|
Conference
|
2006 |
Implementation of 10 Giga VPN Accelerator Board
Kim Ki Hyun International Conference on Advanced Communication Technology (ICACT) 2006, pp.1552-1556 |
0 |
|
|
Conference
|
2006 |
A Developing of Signature-based Network Security Tester for NGSS
Jeong Youn Seo International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 |
0 |
|
|
Conference
|
2005 |
Design and Implementation of Crypto Co-processor and Its Application to Security Systems
Kim Ho Won International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.1104-1109 |
1 |
원문
|
|
Conference
|
2005 |
An Analysis of ISPs’ role as Managed Security Service Providers (MSSPs)
Choi Yangseo International Conference on Advanced Communication Technology (ICACT) 2005, pp.624-626 |
|
|
|
Conference
|
2004 |
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network
Park So Hee International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 |
0 |
원문
|
|
Journal
|
2004 |
Design and implementation of a private and public key crypto processor and its application to a security system
Kim Ho Won IEEE Transactions on Consumer Electronics, v.50, no.1, pp.214-224 |
50 |
원문
|
|
Conference
|
2003 |
Design of Secure Monitor In the Secure Zone Cooperation
안계순 International Conference on Computational Science and Its Applications (ICCSA) 2003 (LNCS 2668), v.2668, pp.320-327 |
0 |
원문
|
|
Conference
|
2002 |
Design and Implementation of a Crypto Processor and Its Application to Security System
Kim Ho Won International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.315-318 |
|
|
|
Conference
|
2002 |
Information Model for Policy-Based Network Security Management
Kim Sook Yeon International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 |
3 |
원문
|
|
Conference
|
2002 |
Security Policy Deployment in IPsec
Kim Geonwoo International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.453-464 |
0 |
원문
|
|
Conference
|
2001 |
Design of key recovery system using multiple agent technology for electronic commerce
Lim Shin Young International Symposium on Industrial Electronics (ISIE) 2001, pp.1351-1356 |
|
원문
|