Journal
|
2024 |
A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers
Yu Jae Hak Computer Networks, v.254, pp.1-12 |
1 |
원문
|
Journal
|
2024 |
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels
김재한 IEEE Access, v.12, pp.146328-146342 |
0 |
원문
|
Journal
|
2024 |
gShock: A GNN-Based Fingerprinting System for Permissioned Blockchain Networks Over Encrypted Channels
Seo Minjae IEEE Access, v.12, pp.146328-146342 |
0 |
원문
|
Journal
|
2024 |
ScissionLite: Accelerating Distributed Deep Learning With Lightweight Data Compression for IIoT
안현호 IEEE Transactions on Industrial Informatics, v.20, no.10, pp.11950-11960 |
1 |
원문
|
Conference
|
2024 |
Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms
Choi Yangseo International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.427-428 |
0 |
원문
|
Journal
|
2023 |
Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection
Choi Yangseo 전자통신동향분석, v.38, no.5, pp.71-80 |
|
원문
|
Conference
|
2023 |
Intelligent Anomaly Detection System for Critical Network Infrastructure
Jung Boo Geum International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1410-1412 |
0 |
원문
|
Journal
|
2023 |
Timeslot Scheduling with Reinforcement Learning Using a Double Deep Q-Network
류지혜 ELECTRONICS, v.12, no.4, pp.1-23 |
1 |
원문
|
Conference
|
2022 |
A Traffic-Aware Dynamic Frame Adaptation Scheme for LoRaWAN Networks
Lee Junhee International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1710-1712 |
0 |
원문
|
Conference
|
2021 |
Network Anomaly Detection based on GAN with Scaling Properties
Kimhyunjin International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-5 |
5 |
원문
|
Conference
|
2021 |
Implementation and Evaluation of NDN-based Video Streaming System
Yoo Hyun Kyung International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1879-1881 |
2 |
원문
|
Journal
|
2021 |
Dynamic Fog-to-fog Offloading in SDN-based Fog Computing Systems
Linh-An Phan Future Generation Computer Systems, v.117, pp.486-497 |
58 |
원문
|
Conference
|
2021 |
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset
Lee Gyeoul International Conference on Advanced Communications Technology (ICACT) 2021, pp.254-258 |
3 |
원문
|
Journal
|
2020 |
ElasticFog: Elastic Resource Provisioning in Container-Based Fog Computing
Nguyen Dinh Nguyen IEEE Access, v.8, pp.183879-183890 |
47 |
원문
|
Conference
|
2019 |
A Flow-based Parallel Packet Processing Approach for Core Affinity and Core Scalability
Choi Kang Il International Conference on Information Science and Applications (ICISA) 2019 (LNEE 621), pp.129-134 |
0 |
원문
|
Conference
|
2019 |
Traffic Monitoring System for 5G Core Network
Kim Eung Ha International Conference on Ubiquitous and Future Networks (ICUFN) 2019, pp.671-673 |
7 |
원문
|
Conference
|
2019 |
Autonomous Network Traffic Control System Based on Intelligent Edge Computing
Kim Kwihoon International Conference on Advanced Communications Technology (ICACT) 2019, pp.164-167 |
4 |
원문
|
Journal
|
2019 |
A Survey of Deep Learning-based Network Anomaly Detection
권동운 Cluster Computing, v.22, no.Supp.1, pp.949-961 |
507 |
원문
|
Journal
|
2018 |
Deduplication Technologies over Encrypted Data
Keonwoo Kim 전자통신동향분석, v.33, no.1, pp.68-77 |
|
원문
|
Conference
|
2017 |
Information Fusion based Agile Streaming Telemetry for Intelligent Traffic Analytics of Softwarized Network
Taesang Choi Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017, pp.399-402 |
1 |
원문
|
Journal
|
2017 |
HDF: Hybrid Debugging Framework for Distributed Network Environments
Young Joo Kim ETRI Journal, v.39, no.2, pp.222-233 |
6 |
원문
|
Journal
|
2016 |
Service Platform and Monitoring Architecture for Network Function Virtualization (NFV)
김현철 Cluster Computing, v.19, no.4, pp.1835-1841 |
10 |
원문
|
Conference
|
2016 |
Traffic Storing and Related Information Generation System for Cyber Attack Analysis
Choi Yangseo International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 |
1 |
원문
|
Conference
|
2016 |
A Forensically Robust Data Acquisition from a 10G Line-rate Network
Jooyoung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 |
0 |
원문
|
Conference
|
2016 |
Local Breakout of Mobile Access Network Traffic by Mobile Edge Computing
Seung-Que Lee International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.741-743 |
14 |
원문
|
Conference
|
2016 |
A Sophisticated Packet Forwarding Scheme with Deep Packet Inspection in an OpenFlow Switch
Cho Choong Hee International Conference on Software Networking (ICSN) 2016, pp.1-5 |
10 |
원문
|
Conference
|
2016 |
Introduction to a Network Forensics System for Cyber Incidents Analysis
Choi Yangseo International Conference on Advanced Communication Technology (ICACT) 2016, pp.50-55 |
4 |
원문
|
Conference
|
2016 |
Tenant Based Dynamic Processor Mapping in the Cloud Network Function Virtualization System
Choi Kang Il International Conference on Advanced Communication Technology (ICACT) 2016, pp.592-595 |
0 |
원문
|
Conference
|
2015 |
A Cyber Blackbox for Collecting Network Evidence
Jooyoung Lee SRI Security Congress 2015, pp.141-147 |
|
|
Conference
|
2015 |
Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection
Kim Dae Won International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3 |
|
|
Journal
|
2015 |
Mobile Small Cells for Further Enhanced 5G Heterogeneous Networks
이충희 ETRI Journal, v.37, no.5, pp.856-866 |
36 |
원문
|
Conference
|
2015 |
Virtualized Traffic Monitoring Function and Resource Auto-Scaling in Software-Defined Networks
Taesang Choi Asia-Pacific Network Operations and Management Symposium (APNOMS) 2015, pp.546-549 |
1 |
원문
|
Journal
|
2015 |
Association Scheme with Traffic Control for IEEE 802.11 Wireless LANs
황재선 IEICE Transactions on Communications, v.E98.B, no.8, pp.1680-1689 |
3 |
원문
|
Conference
|
2015 |
An Implementation of Multi-Layer Parallel Packet Processing in the OMNI2 Flow-based Network Processor
Choi Kang Il International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2015, pp.378-380 |
|
|
Conference
|
2015 |
A Framework for Security Services Based on Software-Defined Networking
정재훈 International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2015, pp.150-153 |
18 |
원문
|
Conference
|
2015 |
Network Traffic Classification Based on Signature Tree
Choi Ji Hyeok World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-6 |
|
|
Conference
|
2014 |
Secure Virtualised Environment
Pushpinder Kaur Chouhan International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 |
0 |
원문
|
Conference
|
2014 |
Hybrid Cache Architecture Using Big Data Analysis for Content Delivery Network
Ku Tai-Yeon International Conference on Big Data and Cloud Computing (BdCloud) 2014, pp.273-274 |
3 |
원문
|
Conference
|
2014 |
VIM-SUMA: Virtual Infrastructure Management-Software defined Unified Monitoring Agent
Taesang Choi International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.122-127 |
0 |
원문
|
Conference
|
2014 |
SUMA: Software-Defined Unified Monitoring Agent for SDN
Taesang Choi Network Operations and Management Symposium (NOMS) 2014, pp.1-5 |
8 |
원문
|
Journal
|
2013 |
An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques
Yu Jae Hak Journal of Systems Architecture, v.59, no.10 Part B, pp.1005-1012 |
42 |
원문
|
Conference
|
2013 |
Implementation of Web-Based Collaborative Workspace for Contents Combination and Sharing
Kim Min Jung International Conference on Computers, Communications and Systems (ICCCS) 2013, pp.78-80 |
|
|
Conference
|
2013 |
Diabetic Patient Care using Home User Activity Recognition
Son Young Sung International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.191-196 |
1 |
원문
|
Conference
|
2013 |
A Monitoring Composition Approach for Reliable Embedded Systems
Kim Beob Kyun International Conference on Security-enriched Urban Computing and Smart Grid (SUComS) 2013, pp.85-89 |
|
|
Journal
|
2013 |
An ICN In-Network Caching Policy for Butterfly Network in DCN
Jeon Hong Seok KSII Transactions on Internet and Information Systems, v.7, no.7, pp.1610-1623 |
0 |
원문
|
Conference
|
2013 |
A Novel Anomaly Detection System based on HFR-MLR Method
Kim Eun Hye International Conference on Ubiquitous Context-Awareness and Wireless Sensor Network (UCAWSN) 2013, pp.1-7 |
|
|
Journal
|
2013 |
NetCube: A Comprehensive Network Traffic Analysis Model Based on Multidimensional OLAP Data Cube
박대희 International Journal of Network Management, v.23, no.2, pp.101-118 |
11 |
원문
|
Conference
|
2013 |
On-Path Caching in Information-Centric Networking
Jeon Hong Seok International Conference on Advanced Communication Technology (ICACT) 2013, pp.264-267 |
5 |
|
Journal
|
2012 |
User’s behavior based Internet traffic Control in time period
Kim Sang Wan Journal of Communications and Information Sciences, v.2, no.2, pp.37-43 |
|
원문
|
Conference
|
2012 |
Advertising Cached Contents in the Control Plane: Necessity and Feasibility
Yaogong Wang Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2012, pp.286-291 |
72 |
원문
|
Conference
|
2011 |
Timeslot Monitoring Model for Application Layer DDoS Attack Detection
Choi Yangseo International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679 |
|
|
Conference
|
2011 |
Application Independent User Mode Network Emulator Based on Packet Interception from Kernel Mode
Shin Kwang Sik IASTED International Conference Canada Modelling and Simulation (MS) 2011, pp.254-260 |
1 |
원문
|
Conference
|
2011 |
DDoS Detection Algorithm Using the Bidirectional Session
이희경 Conference on Computer Networks (CN) 2011 (CCIS 160), v.160, pp.191-203 |
6 |
원문
|
Journal
|
2011 |
EAFR-Based DLNA Proxy for High-Quality Video Distribution in Extended Home Space
Hwang Tae In IEEE Transactions on Consumer Electronics, v.57, no.1, pp.120-125 |
10 |
원문
|
Conference
|
2011 |
EAFR-Based DLNA Proxy for High-Quality Video Distribution in Extended Home Space
Hwang Tae In International Conference on Consumer Electronics (ICCE) 2011, pp.331-332 |
0 |
원문
|
Conference
|
2010 |
Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm
송재구 International Conference on Future Generation Communication and Networking (FGCN) 2010 (CCIS 120), v.120, pp.268-275 |
0 |
원문
|
Conference
|
2010 |
A Hierachical Approach to Traffic Anomaly Detection using Image Processing Technique
Jeong Chi Yoon International Conference on Networked Computing and Advanced Information Management (NCM) 2010, pp.592-594 |
|
|
Conference
|
2009 |
Popularity-based partial caching management scheme for streaming multimedia on proxy servers over IP networks
강범구 International Conference on Network Infrastructure and Digital Content (IC-NIDC) 2009, pp.586-590 |
0 |
원문
|
Conference
|
2009 |
GMPLS-based Multi-Layer Integrated Path Control
Kim Sun Me Asia-Pacific Network Operations and Management Symposium (APNOMS) 2009 (LNCS 5787), v.5787, pp.1-10 |
|
|
Conference
|
2009 |
Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points
조유희 Asia-Pacific Network Operations and Management Symposium (APNOMS) 2009 (LNCS 5787), v.5787, pp.385-394 |
0 |
원문
|
Journal
|
2009 |
Design and Implementation of an Architectural Framework for Web Portals in a Ubiquitous Pervasive Environment
Muhammad Taqi Raza Husnain Meh Sensors, v.9, no.7, pp.5201-5223 |
5 |
원문
|
Conference
|
2009 |
An Architectural Framework for Web Portal in Ubiquitous Pervasive Environment
Muhammad Taqi Raza Husnain Meh Conference on Communication Networks and Services Research (CNSR) 2009, pp.102-109 |
2 |
원문
|
Conference
|
2008 |
LACONIC: History-Based Code Dissemination in Programmable Wireless Sensor Networks
Seungki Hong International Conference on Mobile Ad-hoc and Sensor Networks (MSN) 2008, pp.234-241 |
1 |
원문
|
Journal
|
2008 |
An Efficient Flow Analysis Scheme for Identifying Various Applications in IP-based Networks
Moon Yong Hyuk International Journal of Computer Science and Network Security, v.8, no.12, pp.168-175 |
|
|
Journal
|
2008 |
Priority-based dynamic bandwidth allocation in Ethernet Passive Optical Networks
Ho Young Song Photonic Network Communications, v.15, no.3, pp.203-212 |
5 |
원문
|
Journal
|
2008 |
Soft-State Bandwidth Reservation Mechanism for Slotted Optical Burst Switching Networks
Um Tai Won ETRI Journal, v.30, no.2, pp.216-226 |
11 |
원문
|
Conference
|
2008 |
Emergency Handling in Ethernet Passive Optical Networks Using Priority-Based Dynamic Bandwidth Allocation
Moon Byongkwon IEEE Conference on Computer Communications (INFOCOM) 2008, pp.1319-1327 |
3 |
원문
|
Conference
|
2008 |
pFlours: A New Packet and Flow Gathering Tool
한병진 International Conference on Advanced Communication Technology (ICACT) 2008, pp.731-736 |
2 |
원문
|
Conference
|
2007 |
LATONA : Network I/O Acceleration Architecture
Kim Young Woo International SoC Design Conference (ISOCC) 2007, pp.42-45 |
|
|
Conference
|
2007 |
A Practical Approach for Detecting Executable Codes in Network Traffic
Kim Ik Kyun Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 |
1 |
원문
|
Conference
|
2007 |
An Efficient Clustering Algorithm for Classification of Computer Network Attacks
Jeong Chi Yoon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.1356-1357 |
|
|
Conference
|
2007 |
Bundled Authentication Scheme of Fixed and Mobile Terminal between both Service and Access Network in NGN Environment
Kim Kwihoon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.1306-1307 |
|
|
Conference
|
2007 |
High-Speed Concurrent Attack Responding System using FPGA Supporting IPv4/IPv6
Park Sang Kil International Conference on Advanced Communication Technology (ICACT) 2007, pp.1252-1257 |
0 |
원문
|
Conference
|
2007 |
An Energy Efficient Topology Control Protocol in Wireless Sensor Networks
Seungki Hong International Conference on Advanced Communication Technology (ICACT) 2007, pp.537-541 |
9 |
원문
|
Journal
|
2006 |
Cost Optimization in SIS Model of Worm Infection
Kim Jonghyun ETRI Journal, v.28, no.5, pp.692-695 |
34 |
원문
|
Conference
|
2006 |
The Integrated SLA/CNM Management System
Ryu Yong Sun International Conference on Networking and Services (ICNS) 2006, pp.1-6 |
0 |
원문
|
Conference
|
2006 |
Hardware Supports for Network Traffic Anomaly Detection
Kim Dae Won International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5 |
|
|
Journal
|
2006 |
Network Traffic Anomaly Detection based on Ratio and Volume Analysis
Kim Hyun Joo International Journal of Computer Science and Network Security, v.6, no.5B, pp.190-194 |
|
|
Conference
|
2006 |
Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis
Kim Hyun Joo International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.726-727 |
1 |
원문
|
Conference
|
2006 |
High-Speed Attack Mitigation Engine by Packet Filtering and Rate-limiting using FPGA
Park Sang Kil International Conference on Advanced Communication Technology (ICACT) 2006, pp.680-685 |
3 |
|
Conference
|
2006 |
A Protocol Switching Scheme for Developing Network Management Applications
Kwon Hyeok Chan International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.862-872 |
0 |
|
Conference
|
2005 |
Network Traffic Entropy Analysis for Worm Detection
Youngjun Heo International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.641-642 |
|
|
Conference
|
2005 |
Implementation of light-Weight IKE Protocol for IPsec VPN within Router
Lim Jae Deok International Conference on Advanced Communication Technology (ICACT) 2005, pp.81-84 |
|
원문
|
Conference
|
2005 |
Design of Firewall in Router using Network Processor
김영호 International Conference on Advanced Communication Technology (ICACT) 2005, pp.658-660 |
|
원문
|
Conference
|
2004 |
Adaptive suboptimal admission control for bulk handover requests in multi-beam satellite networks
Ki-Dong Lee International Conference on Communications (ICC) 2004, pp.2327-2331 |
|
원문
|
Conference
|
2004 |
An infrastructure of distributed network management system for 1Gb/s E-PON using mobile agents
Kim Gwan Joong International Conference on Advanced Communication Technology (ICACT) 2004, pp.791-796 |
|
원문
|
Conference
|
2003 |
Shortest-Path Mailing Service Using Active Technology
Kim Hyun Joo International Conference on Information Networking (ICOIN) 2003 (LNCS 2662), v.2662, pp.336-345 |
0 |
원문
|