Conference
|
2024 |
Event-Triggered Attitude Controller Design for Unmanned Aerial Vehicles under Cyber Attacks
한승용 International Symposium on Industrial Electronics (ISIE) 2024, pp.1-7 |
0 |
원문
|
Journal
|
2021 |
Trends of Hardware-based Trojan Detection Technologies
Choi Yangseo 전자통신동향분석, v.36, no.6, pp.78-87 |
|
원문
|
Conference
|
2020 |
Drone Security Module for UAV Data Encryption
Keonwoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 |
31 |
원문
|
Journal
|
2020 |
Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
이준영 Applied Sciences, v.10, no.18, pp.1-20 |
15 |
원문
|
Conference
|
2019 |
신뢰기반 네트워크 접속 제어 및 보호 시스템
Yoo Yoon Sik International Conference on Platform Technology and Service (PlatCon) 2019, pp.71-75 |
1 |
원문
|
Conference
|
2017 |
Self-certifying ID based Trustworthy Networking System for IoT Smart Service Domain
Kim Eung Ha International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1300-1302 |
7 |
원문
|
Conference
|
2017 |
Trust Domain Based Trustworthy Networking
Byeongok Kwak International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1248-1250 |
5 |
원문
|
Conference
|
2017 |
Trustworthy Gateway System Providing IoT Trust Domain of Smart Home
Kim Eung Ha International Conference on Ubiquitous and Future Networks (ICUFN) 2017, pp.551-553 |
22 |
원문
|
Journal
|
2017 |
An Energy-Efficient Virtualization-Based Secure Platform for Protecting Sensitive User Data
Lim Kyung Soo Sustainability, v.9, no.7, pp.1-16 |
1 |
원문
|
Conference
|
2015 |
Detecting Malware with Similarity to Android Applications
Park Won-Joo International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1252-1254 |
|
|
Conference
|
2015 |
A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology
Lim Kyung Soo International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 |
3 |
원문
|
Journal
|
2015 |
Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments
오두환 ETRI Journal, v.37, no.2, pp.348-358 |
13 |
원문
|
Conference
|
2014 |
RealCatch: A Community-Based Real-Time Platform for Financial Fraud Protection on Smartphones
Lee Kyong-Ha International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.362-366 |
4 |
원문
|
Conference
|
2013 |
DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System
함유정 International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 |
8 |
원문
|
Conference
|
2009 |
A study of Management Interface for Cluster System Integrity
Lim Jae Deok International Conference on Advanced Communication Technology (ICACT) 2009, pp.1261-1264 |
|
|
Conference
|
2008 |
Performance Evaluation of TCAM Based Pattern-Matching Algorithm
Sung Jung Sik Vehicular Technology Conference (VTC) 2008 (Fall), pp.1-5 |
1 |
원문
|
Conference
|
2007 |
Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor
Young Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 |
1 |
원문
|
Conference
|
2006 |
Real-Time Watermark Embedding for High Resolution Video Watermarking
강인구 International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.227-238 |
2 |
원문
|
Conference
|
2006 |
Spread Spectrum Watermarking on Depth Map for 3DTV
Kim Moonhyoung Joint Workshop on Information Security (JWIS) 2006, pp.1-10 |
|
|
Conference
|
2006 |
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
Sung Jung Sik International Conference on Research in Networking (Networking) 2006 (LNCS 3976), v.3976, pp.1157-1162 |
2 |
원문
|
Conference
|
2005 |
A Multi-gigabit Rate Deep Packet Inspection Algorithm using TCAM
Sung Jung Sik GLOBECOM 2005, pp.453-457 |
28 |
원문
|