Subject

Subjects : Intrusion detection

  • Articles (82)
  • Patents (2)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2025 Trade-off Model-Based Traffic Sampling for Intrusion Detection in Hybrid Vehicular Networks   Ryangsoo Kim  IEEE Transactions on Vehicular Technology, v.권호미정, pp.1-6 0 원문
Journal 2024 SITRAN: Self-Supervised IDS With Transferable Techniques for 5G Industrial Environments   Kimhyunjin  IEEE Internet of Things Journal, v.11, no.21, pp.35465-35476 0 원문
Conference 2023 Intelligent Anomaly Detection System for Critical Network Infrastructure   Jung Boo Geum  International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1410-1412 0 원문
Conference 2023 Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks   Park Cheolhee  European Conference on Networks and Communications (EuCNC) 2023, pp.490-495 7 원문
Journal 2023 An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks   Park Cheolhee  IEEE Internet of Things Journal, v.10, no.3, pp.2330-2345 141 원문
Conference 2022 Analysis of Intrusion Detection Performance by Smoothing Factor of Gaussian NB Model Using Modified NSL-KDD Dataset   Kijung Bong  International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1471-1476 7 원문
Conference 2021 Network Anomaly Detection based on GAN with Scaling Properties   Kimhyunjin  International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-5 5 원문
Journal 2021 Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks   정성훈  Vehicular Communications, v.29, pp.1-11 53 원문
Conference 2018 Intelligent Visual Surveillance System for Safety Management in Railway Stations   Lee Jae-Yeong  Asian Conference on Railway Engineering and Transportation (ART) 2018, pp.1-4
Journal 2018 Hybrid Sensor Network-Based Indoor Surveillance System for Intrusion Detection   박하실  Symmetry, v.10, no.6, pp.1-17 4 원문
Journal 2017 DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks   Moon Dae Sung  Journal of Supercomputing, v.73, no.7, pp.2881-2895 119 원문
Conference 2016 Hierarchical Network Signature Clustering and Generation   Choi Sunoh  International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 2 원문
Journal 2016 Vision Based Displacement Detection for Stabilized UAV Control on Cloud Server   정혁준  Mobile Information Systems, v.2016, pp.1-11 6 원문
Journal 2016 Host-based Intrusion Detection System for Secure Human-centric Computing   Moon Dae Sung  Journal of Supercomputing, v.72, no.7, pp.2520-2536 35 원문
Journal 2015 A Multi-Resolution Port Scan Detection Technique for High-Speed Networks   Moon Hwa Shin  Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 2 원문
Conference 2015 Intrusion Detection Based on the Sound Field Variation in Audible Frequency - Broadening Security Area   Lee Sung Q  International Congress on Sound and Vibration (ICSV) 2015, pp.1-8
Conference 2015 A Novel Hierarchical Detection Method for Enhancing Anomaly Detection Efficiency   Kim Eun Hye  International Conference on Communication Systems and Computing Application Science (CSCAS) 2015, pp.1-5 8 원문
Journal 2015 Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space   Lee Han Sung  KSII Transactions on Internet and Information Systems, v.9, no.3, pp.1173-1192 5 원문
Conference 2014 Smart Channel Scheduling for WLAN Intrusion Detection   Lee Sokjoon  Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4
Conference 2013 Detecting Black-Hole Attack in MANETs with Moving Detection Node   Kim Jeong Tae  International Conference on Computers, Communications and Systems (ICCCS) 2013, pp.1-4
Journal 2013 An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques   Yu Jae Hak  Journal of Systems Architecture, v.59, no.10 Part B, pp.1005-1012 42 원문
Conference 2013 A Novel Anomaly Detection System based on HFR-MLR Method   Kim Eun Hye  International Conference on Ubiquitous Context-Awareness and Wireless Sensor Network (UCAWSN) 2013, pp.1-7
Conference 2013 Practical Implementation of Intrusion De-tection Method based on the Sound Field Variation   Lee Sung Q  International Congress on Sound and Vibration (ICSV) 2013, pp.1-7
Journal 2012 A Novel Anomaly-Network Intrusion Detection System Using ABC Algorithms   Chang Seok Bae  International Journal of Innovative Computing, Information and Control, v.8, no.12, pp.8231-8248 16
Journal 2012 Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid   최경  Energies, v.5, no.10, pp.4091-4109 35 원문
Conference 2012 Implementation of WSN application service using people detection algorithm   Hong Yeon Yu  International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.117-118 0 원문
Journal 2012 The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack   Kim Sun Wook  IETE Journal of Research, v.58, no.5, pp.398-410 0 원문
Conference 2012 Intrusion Detection Based on the Sound Field Variation of Audible Frequency Band   Lee Sung Q  Internaltional Congress on Sound and Vibration (ICSV) 2012, pp.1-8
Conference 2012 Fire Detection Technique based on Audible Sound Field   Kang-Ho Park  Internaltional Congress on Sound and Vibration (ICSV) 2012, pp.1-8
Journal 2011 Self-Adaptive and Dynamic Clustering for Online Anomaly Detection   Seung Min Lee  Expert Systems with Applications, v.38, no.12, pp.14891-14898 47 원문
Conference 2011 Intrusion Detection based on the Sound Field Variation of Audible Frequency   Lee Sung Q  International Congress on Sound and Vibration (ICSV) 2011, pp.1-8
Journal 2011 Intrusion Detection Based on the Sound Field Variation of Audible Frequency Band   Lee Sung Q  한국소음진동공학회논문집, v.21, no.3, pp.212-219 원문
Conference 2010 Network Intrusion Prevention System based on TOE   Kim Sun Wook  International Workshop on Information Security Applications (WISA) 2010, pp.1-6
Journal 2010 Feature Construction Scheme for Efficient Intrusion Detection System   Kim Eun Hye  Journal of Information Science and Engineering, v.26, no.2, pp.527-547 4
Journal 2009 Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection   Byoung Koo Kim  International Journal of Computers, v.3, no.1, pp.115-124
Journal 2008 H/W based Stateful Packet Inspection using a Novel Session Architecture   Yoon Seung Yong  International Journal of Computers, v.3, no.2, pp.310-319
Conference 2008 An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware   Byoung Koo Kim  International Conference on Applied Computer Science (ACS) 2008, pp.199-204
Conference 2008 Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System   Yoon Seung Yong  International Conference on Applied Computer Science (ACS) 2008, pp.1-6
Conference 2008 Design of Network Management Platform and Security Framework for WSN   Lee Byung-Gil  International Conference on Signal Image Technology and Internet Based Systems (SITIS) 2008, pp.640-645 8 원문
Conference 2008 Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets   Ryan Iwahashi  International Conference on Information Security (ISC) 2008 (LNCS 5222), v.5222, pp.114-130 4 원문
Conference 2008 A Survey on Visualization for Wireless Security   Jeong Chi Yoon  International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.129-132 4 원문
Conference 2008 Performance Evaluation of TCAM Based Pattern-Matching Algorithm   Sung Jung Sik  Vehicular Technology Conference (VTC) 2008 (Fall), pp.1-5 1 원문
Conference 2008 An Efficient Algorithm for Intrusion Source Identification   Kim Jonghyun  International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.188-190 0 원문
Journal 2008 A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System   Oh Jintae  International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162
Conference 2008 Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System   이중희  International Conference on Advanced Communication Technology (ICACT) 2008, pp.1170-1175 63 원문
Conference 2008 A Cooperation Network Model for Secure Management in Dynamic P2P Flow   Moon Yong Hyuk  International Conference on Advanced Communication Technology (ICACT) 2008, pp.1176-1181 1 원문
Journal 2008 Multi-Domain Security Management Framework and Its Performance Evaluation to Protect BcN Infrastructure   장정숙  International Journal of Computer Science and Network Security, v.8, no.1, pp.85-95
Conference 2007 Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor   Young Ho Kim  International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 1 원문
Conference 2007 High Performance Session State Management Scheme for Stateful Packet Inspection   Yoon Seung Yong  Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 6 원문
Conference 2007 ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response   Byoung Koo Kim  Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 0 원문
Conference 2007 Implementation of Multi-thread based Intrusion Prevention System for IPv6   Lim Jae Deok  International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 5 원문
Conference 2007 FPGA based light-weight Security Gateway System   Dong Ho Kang  International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387
Journal 2007 Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System   Oh Jintae  International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117
Conference 2007 Memory-efficient content filtering hardware for high-speed intrusion detection systems   Yi Sungwon  Symposium on Applied Computing (SAC) 2007, pp.264-269 15 원문
Conference 2006 High-Performance Stateful Intrusion Detection System   Yoon Seung Yong  International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 4 원문
Conference 2006 A Study of Security Policy Enforcement using Priority   Su Hyung Jo  SICE-ICASE International Joint Conference 2006, pp.3726-3729 0 원문
Conference 2006 FPGA Based Intrusion Detection System Against Unknown and Known Attacks   Dong Ho Kang  Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 3 원문
Conference 2006 Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks   오하영  International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.440-447 3 원문
Conference 2006 A Fast Pattern-Matching Algorithm for Network Intrusion Detection System   Sung Jung Sik  International Conference on Research in Networking (Networking) 2006 (LNCS 3976), v.3976, pp.1157-1162 2 원문
Conference 2006 Design and Implementation of FPGA Based High-Performance Intrusion Detection System   Byoung Koo Kim  International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 4 원문
Conference 2006 Computational Science and Its Applications - ICCSA 2006   Dong Ho Kang  International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10 원문
Conference 2006 Fragment Packet Partial Re-assembly Method for Intrusion Detection   Chung Bo-Heung  International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 0
Conference 2006 A Developing of Signature-based Network Security Tester for NGSS   Jeong Youn Seo  International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 0
Conference 2006 Incorporating Intrusion Detection Functionality into 1XP2800 Network Processor based Router   Ryu Seung Ho  International Conference on Advanced Communication Technology (ICACT) 2006, pp.797-800 1
Conference 2005 An Efficient Multi-Packet Inspection Scheme without Packet Reassmbly   Woo-Sug Jung  International Conference on Computational and Information Science (CIS) 2005, pp.1-5
Journal 2005 Security Requirements and Proposals for the Home Server in Ubiquitous Home Networks   Jung Tae Kim  전자통신동향분석, v.20, no.2, pp.83-92 원문
Conference 2005 Kernel-level Intrusion Detection Method Using Simplification and Grouping   Chung Bo-Heung  International Conference on Advanced Communication Technology (ICACT) 2005, pp.251-254
Conference 2005 A Memory-based Learning Approach to Reduce False Alarms in Intrusion Detection   Ill-Young Weon  International Conference on Advanced Communication Technology (ICACT) 2005, pp.241-245 2 원문
Conference 2004 A Study on Intrusion Detection of ARP Poisoning Attack on Wireless LAN   Ham Young Hwan  International Conference on Electronics, Informations and Communications (ICEIC) 2004, pp.540-543
Conference 2004 Design and Implementation of Detection Engine Against IDS Evasion with Unicode   Dong Ho Kang  International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 원문
Journal 2004 네트워크-기반 침입방지 시스템 성능 평가 기술 동향   Jeon Yong Hee  주간기술동향, v.1158, pp.16-31
Journal 2004 네트워크-기반 침입방지 시스템 성능 평가 기술 동향   Jeon Yong Hee  주간기술동향, v.1158, pp.16-31
Conference 2004 Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System   김형주  International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 0 원문
Journal 2004 침입탐지시스템과 침입방지시스템의 기술 비교 및 동향   Jeon Yong Hee  주간기술동향, v.1149, pp.1-7
Conference 2004 Design and Implementation of High-Performance Intrusion Detection System   Kim Byoung Koo  International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 2 원문
Conference 2004 Two-step Rule Estimation (TRE) - Intrusion Detection Method against Eluding NIDS   Choi Byeong Cheol  International Conference on Advanced Communication Technology (ICACT) 2004, pp.504-507 원문
Conference 2004 Kernel-level Intrusion Detection System for Minimum Packet Loss   Chung Bo-Heung  International Conference on Advanced Communication Technology (ICACT) 2004, pp.207-212 원문
Journal 2004 Giga급 보안 프로세서 및 VPN 장비 기술 동향   김기현  주간기술동향, v.1131, pp.1-13
Conference 2003 CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection   Kim Jin Suk  International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.84-96 5 원문
Conference 2002 Policy-Based Intrusion Detection and Automated Response Mechanism   Kim Jin Oh  International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.399-408 3 원문
Conference 2002 Design of Network Security Control System for Cooperative Intrusion Detection   Kim Byoung Koo  Information Networking: Wireless Communications Technologies and Network Applications (ICOIN) 2002 (LNCS 2344), v.2344, pp.389-398 4 원문
Conference 2002 Information Model for Policy-Based Network Security Management   Kim Sook Yeon  International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 3 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2017 STEPPING-STONE DETECTION APPARATUS AND METHOD UNITED STATES
Registered 2021 확장 학습 데이터 기반 네트워크 침입 위협 탐지 모델 학습 장치 및 방법 KOREA
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.