Journal
|
2022 |
Recent Trends in Deep Learning-Based Optical Character Recognition
Min Gi Hyeon 전자통신동향분석, v.37, no.5, pp.22-32 |
|
원문
|
Journal
|
2019 |
Pattern-Based Decoding for Wi-Fi Backscatter Communication of Passive Sensors
황환웅 Sensors, v.19, no.5, pp.1-18 |
13 |
원문
|
Conference
|
2017 |
Soccer Event Recognition Technique based on Pattern Matching
Jiwon Lee Federated Conference on Computer Science and Information Systems (FedCSIS) 2017, pp.649-652 |
11 |
원문
|
Conference
|
2017 |
Soccer Event Recognition Technology based on Pattern Matching
Jiwon Lee 대한전자공학회 종합 학술 대회 (하계) 2017, pp.1171-1174 |
|
|
Conference
|
2015 |
Network Traffic Classification Based on Signature Tree
Choi Ji Hyeok World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-6 |
|
|
Conference
|
2014 |
Bin Picking for the Objects of Non-Lambertian Reflectance without Using an Explicit Object Model
Lee Jae Yeon International Conference on Ubiquitous Robots and Ambient Intelligence (URAI) 2014, pp.489-493 |
4 |
원문
|
Conference
|
2014 |
Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions
Kim Jong Sung International Conference on Pattern Recognition (ICPR) 2014, pp.4560-4563 |
2 |
원문
|
Conference
|
2014 |
Detection of SMS Mobile Malware
Yoon Seung Yong International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 |
1 |
원문
|
Journal
|
2013 |
Mobile Malware Detection Using Correlational Analysis
Yoon Seung Yong International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58 |
|
|
Journal
|
2013 |
Scalable and Adaptive Graph Querying with MapReduce
김송현 IEICE Transactions on Information and Systems, v.E96.D, no.9, pp.2126-2130 |
0 |
원문
|
Conference
|
2012 |
Network-based Executable File Extraction and Analysis for Malware Detection
Byoung Koo Kim International Conference on Security and Cryptography (SECRYPT) 2012, pp.430-433 |
|
|
Journal
|
2011 |
Dynamic Time Warping-based K-Means Clustering for Accelerometer-based Handwriting Recognition
Minsu Jang Studies in Computational Intelligence, v.363, pp.21-26 |
5 |
원문
|
Journal
|
2010 |
A Hardware-Efficient Pattern Matching Architecture Using Process Element Tree for Deep Packet Inspection
안성용 IEICE Transactions on Communications, v.E93.B, no.9, pp.2440-2442 |
2 |
원문
|
Journal
|
2010 |
A Memory-Efficient Heterogeneous Parallel Pattern Matching Scheme in Deep Packet Inspection
김현진 IEICE Electronics Express, v.7, no.5, pp.377-382 |
6 |
원문
|
Journal
|
2010 |
A Memory-Efficient Pattern Matching with Hardware-Based Bit-Split String Matchers for Deep Packet Inspection
김현진 IEICE Transactions on Communications, v.E93.B, no.2, pp.396-398 |
2 |
원문
|
Conference
|
2010 |
An Independently Partial Pattern Matching for Content Inspection at Multi Gigabit Networks
Woo-Sug Jung International Conference on Advanced Communication Technology (ICACT) 2010, pp.1574-1579 |
|
|
Conference
|
2009 |
High Speed Pattern Matching for Deep Packet Inspection
Kim Junghak International Symposium on Communications and Information Technology (ISCIT) 2009, pp.1310-1315 |
6 |
원문
|
Conference
|
2009 |
Improving Performance in Digital Forensics: A Case Using Pattern Matching Board
Jooyoung Lee International Conference on Availability, Reliability and Security (ARES) 2009, pp.1001-1005 |
4 |
원문
|
Journal
|
2009 |
Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection
Byoung Koo Kim International Journal of Computers, v.3, no.1, pp.115-124 |
|
|
Journal
|
2008 |
H/W based Stateful Packet Inspection using a Novel Session Architecture
Yoon Seung Yong International Journal of Computers, v.3, no.2, pp.310-319 |
|
|
Conference
|
2008 |
An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware
Byoung Koo Kim International Conference on Applied Computer Science (ACS) 2008, pp.199-204 |
|
|
Journal
|
2008 |
A Model of Sound Localisation Applied to the Evaluation of Systems for Stereophony
박문흠 Acta Acustica united with Acustica, v.94, no.6, pp.825-839 |
10 |
원문
|
Conference
|
2008 |
Performance Evaluation of TCAM Based Pattern-Matching Algorithm
Sung Jung Sik Vehicular Technology Conference (VTC) 2008 (Fall), pp.1-5 |
1 |
원문
|
Conference
|
2008 |
Evaluation of Stereophonic Images with Listening Tests and Model Simulations
Munhum Park AES Convention 2008, pp.1-8 |
|
|
Conference
|
2008 |
High Speed Search for Large-Scale Digital Forensic Investigation
Jee Hyung-Keun International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics) 2008, pp.1-4 |
|
|
Conference
|
2007 |
Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor
Young Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 |
1 |
원문
|
Conference
|
2007 |
ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response
Byoung Koo Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 |
0 |
원문
|
Conference
|
2007 |
A Mobility Management Technique with Simple Handover Prediction for 3G LTE Systems
김태형 Vehicular Technology Conference (VTC) 2007 (Fall), pp.1-5 |
45 |
원문
|
Conference
|
2007 |
FPGA based light-weight Security Gateway System
Dong Ho Kang International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387 |
|
|
Conference
|
2006 |
An Ontological Approach for Natural Language Command Interpretation and Its Application in Robotics
Kim Jae Hong SICE-ICASE International Joint Conference 2006, pp.3874-3878 |
8 |
원문
|
Conference
|
2006 |
FPGA Based Intrusion Detection System Against Unknown and Known Attacks
Dong Ho Kang Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 |
3 |
원문
|
Conference
|
2006 |
2-Way Text Classification for Harmful Web Documents
Kim Youngsoo International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3981), v.3981, pp.545-551 |
2 |
원문
|
Conference
|
2006 |
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
Sung Jung Sik International Conference on Research in Networking (Networking) 2006 (LNCS 3976), v.3976, pp.1157-1162 |
2 |
원문
|
Conference
|
2006 |
Design and Implementation of FPGA Based High-Performance Intrusion Detection System
Byoung Koo Kim International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 |
4 |
원문
|
Conference
|
2006 |
Computational Science and Its Applications - ICCSA 2006
Dong Ho Kang International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10 |
|
원문
|
Conference
|
2006 |
Fragment Packet Partial Re-assembly Method for Intrusion Detection
Chung Bo-Heung International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 |
0 |
|
Conference
|
2006 |
An Efficient Text Filter for Adult Web Documents
Kim Youngsoo International Conference on Advanced Communication Technology (ICACT) 2006, pp.438-440 |
14 |
|
Conference
|
2005 |
A Multi-gigabit Rate Deep Packet Inspection Algorithm using TCAM
Sung Jung Sik GLOBECOM 2005, pp.453-457 |
28 |
원문
|
Conference
|
2004 |
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System
김형주 International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 |
0 |
원문
|
Conference
|
2004 |
Design and Implementation of High-Performance Intrusion Detection System
Kim Byoung Koo International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 |
2 |
원문
|
Conference
|
2004 |
Two-step Rule Estimation (TRE) - Intrusion Detection Method against Eluding NIDS
Choi Byeong Cheol International Conference on Advanced Communication Technology (ICACT) 2004, pp.504-507 |
|
원문
|