Journal
|
2025 |
Trade-off Model-Based Traffic Sampling for Intrusion Detection in Hybrid Vehicular Networks
Ryangsoo Kim IEEE Transactions on Vehicular Technology, v.권호미정, pp.1-6 |
0 |
원문
|
Journal
|
2024 |
SITRAN: Self-Supervised IDS With Transferable Techniques for 5G Industrial Environments
Kimhyunjin IEEE Internet of Things Journal, v.11, no.21, pp.35465-35476 |
0 |
원문
|
Conference
|
2023 |
Intelligent Anomaly Detection System for Critical Network Infrastructure
Jung Boo Geum International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1410-1412 |
0 |
원문
|
Conference
|
2023 |
Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks
Park Cheolhee European Conference on Networks and Communications (EuCNC) 2023, pp.490-495 |
7 |
원문
|
Journal
|
2023 |
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks
Park Cheolhee IEEE Internet of Things Journal, v.10, no.3, pp.2330-2345 |
141 |
원문
|
Conference
|
2022 |
Analysis of Intrusion Detection Performance by Smoothing Factor of Gaussian NB Model Using Modified NSL-KDD Dataset
Kijung Bong International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1471-1476 |
7 |
원문
|
Conference
|
2021 |
Network Anomaly Detection based on GAN with Scaling Properties
Kimhyunjin International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-5 |
5 |
원문
|
Journal
|
2021 |
Convolutional Neural Network-based Intrusion Detection System for AVTP Streams in Automotive Ethernet-based Networks
정성훈 Vehicular Communications, v.29, pp.1-11 |
53 |
원문
|
Conference
|
2018 |
Intelligent Visual Surveillance System for Safety Management in Railway Stations
Lee Jae-Yeong Asian Conference on Railway Engineering and Transportation (ART) 2018, pp.1-4 |
|
|
Journal
|
2018 |
Hybrid Sensor Network-Based Indoor Surveillance System for Intrusion Detection
박하실 Symmetry, v.10, no.6, pp.1-17 |
4 |
원문
|
Journal
|
2017 |
DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks
Moon Dae Sung Journal of Supercomputing, v.73, no.7, pp.2881-2895 |
119 |
원문
|
Conference
|
2016 |
Hierarchical Network Signature Clustering and Generation
Choi Sunoh International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 |
2 |
원문
|
Journal
|
2016 |
Vision Based Displacement Detection for Stabilized UAV Control on Cloud Server
정혁준 Mobile Information Systems, v.2016, pp.1-11 |
6 |
원문
|
Journal
|
2016 |
Host-based Intrusion Detection System for Secure Human-centric Computing
Moon Dae Sung Journal of Supercomputing, v.72, no.7, pp.2520-2536 |
35 |
원문
|
Journal
|
2015 |
A Multi-Resolution Port Scan Detection Technique for High-Speed Networks
Moon Hwa Shin Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 |
2 |
원문
|
Conference
|
2015 |
Intrusion Detection Based on the Sound Field Variation in Audible Frequency - Broadening Security Area
Lee Sung Q International Congress on Sound and Vibration (ICSV) 2015, pp.1-8 |
|
|
Conference
|
2015 |
A Novel Hierarchical Detection Method for Enhancing Anomaly Detection Efficiency
Kim Eun Hye International Conference on Communication Systems and Computing Application Science (CSCAS) 2015, pp.1-5 |
8 |
원문
|
Journal
|
2015 |
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space
Lee Han Sung KSII Transactions on Internet and Information Systems, v.9, no.3, pp.1173-1192 |
5 |
원문
|
Conference
|
2014 |
Smart Channel Scheduling for WLAN Intrusion Detection
Lee Sokjoon Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4 |
|
|
Conference
|
2013 |
Detecting Black-Hole Attack in MANETs with Moving Detection Node
Kim Jeong Tae International Conference on Computers, Communications and Systems (ICCCS) 2013, pp.1-4 |
|
|
Journal
|
2013 |
An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques
Yu Jae Hak Journal of Systems Architecture, v.59, no.10 Part B, pp.1005-1012 |
42 |
원문
|
Conference
|
2013 |
A Novel Anomaly Detection System based on HFR-MLR Method
Kim Eun Hye International Conference on Ubiquitous Context-Awareness and Wireless Sensor Network (UCAWSN) 2013, pp.1-7 |
|
|
Conference
|
2013 |
Practical Implementation of Intrusion De-tection Method based on the Sound Field Variation
Lee Sung Q International Congress on Sound and Vibration (ICSV) 2013, pp.1-7 |
|
|
Journal
|
2012 |
A Novel Anomaly-Network Intrusion Detection System Using ABC Algorithms
Chang Seok Bae International Journal of Innovative Computing, Information and Control, v.8, no.12, pp.8231-8248 |
16 |
|
Journal
|
2012 |
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
최경 Energies, v.5, no.10, pp.4091-4109 |
35 |
원문
|
Conference
|
2012 |
Implementation of WSN application service using people detection algorithm
Hong Yeon Yu International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.117-118 |
0 |
원문
|
Journal
|
2012 |
The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack
Kim Sun Wook IETE Journal of Research, v.58, no.5, pp.398-410 |
0 |
원문
|
Conference
|
2012 |
Intrusion Detection Based on the Sound Field Variation of Audible Frequency Band
Lee Sung Q Internaltional Congress on Sound and Vibration (ICSV) 2012, pp.1-8 |
|
|
Conference
|
2012 |
Fire Detection Technique based on Audible Sound Field
Kang-Ho Park Internaltional Congress on Sound and Vibration (ICSV) 2012, pp.1-8 |
|
|
Journal
|
2011 |
Self-Adaptive and Dynamic Clustering for Online Anomaly Detection
Seung Min Lee Expert Systems with Applications, v.38, no.12, pp.14891-14898 |
47 |
원문
|
Conference
|
2011 |
Intrusion Detection based on the Sound Field Variation of Audible Frequency
Lee Sung Q International Congress on Sound and Vibration (ICSV) 2011, pp.1-8 |
|
|
Journal
|
2011 |
Intrusion Detection Based on the Sound Field Variation of Audible Frequency Band
Lee Sung Q 한국소음진동공학회논문집, v.21, no.3, pp.212-219 |
|
원문
|
Conference
|
2010 |
Network Intrusion Prevention System based on TOE
Kim Sun Wook International Workshop on Information Security Applications (WISA) 2010, pp.1-6 |
|
|
Journal
|
2010 |
Feature Construction Scheme for Efficient Intrusion Detection System
Kim Eun Hye Journal of Information Science and Engineering, v.26, no.2, pp.527-547 |
4 |
|
Journal
|
2009 |
Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection
Byoung Koo Kim International Journal of Computers, v.3, no.1, pp.115-124 |
|
|
Journal
|
2008 |
H/W based Stateful Packet Inspection using a Novel Session Architecture
Yoon Seung Yong International Journal of Computers, v.3, no.2, pp.310-319 |
|
|
Conference
|
2008 |
An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware
Byoung Koo Kim International Conference on Applied Computer Science (ACS) 2008, pp.199-204 |
|
|
Conference
|
2008 |
Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System
Yoon Seung Yong International Conference on Applied Computer Science (ACS) 2008, pp.1-6 |
|
|
Conference
|
2008 |
Design of Network Management Platform and Security Framework for WSN
Lee Byung-Gil International Conference on Signal Image Technology and Internet Based Systems (SITIS) 2008, pp.640-645 |
8 |
원문
|
Conference
|
2008 |
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets
Ryan Iwahashi International Conference on Information Security (ISC) 2008 (LNCS 5222), v.5222, pp.114-130 |
4 |
원문
|
Conference
|
2008 |
A Survey on Visualization for Wireless Security
Jeong Chi Yoon International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.129-132 |
4 |
원문
|
Conference
|
2008 |
Performance Evaluation of TCAM Based Pattern-Matching Algorithm
Sung Jung Sik Vehicular Technology Conference (VTC) 2008 (Fall), pp.1-5 |
1 |
원문
|
Conference
|
2008 |
An Efficient Algorithm for Intrusion Source Identification
Kim Jonghyun International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.188-190 |
0 |
원문
|
Journal
|
2008 |
A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System
Oh Jintae International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162 |
|
|
Conference
|
2008 |
Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System
이중희 International Conference on Advanced Communication Technology (ICACT) 2008, pp.1170-1175 |
63 |
원문
|
Conference
|
2008 |
A Cooperation Network Model for Secure Management in Dynamic P2P Flow
Moon Yong Hyuk International Conference on Advanced Communication Technology (ICACT) 2008, pp.1176-1181 |
1 |
원문
|
Journal
|
2008 |
Multi-Domain Security Management Framework and Its Performance Evaluation to Protect BcN Infrastructure
장정숙 International Journal of Computer Science and Network Security, v.8, no.1, pp.85-95 |
|
|
Conference
|
2007 |
Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor
Young Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 |
1 |
원문
|
Conference
|
2007 |
High Performance Session State Management Scheme for Stateful Packet Inspection
Yoon Seung Yong Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 |
6 |
원문
|
Conference
|
2007 |
ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response
Byoung Koo Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 |
0 |
원문
|
Conference
|
2007 |
Implementation of Multi-thread based Intrusion Prevention System for IPv6
Lim Jae Deok International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 |
5 |
원문
|
Conference
|
2007 |
FPGA based light-weight Security Gateway System
Dong Ho Kang International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387 |
|
|
Journal
|
2007 |
Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System
Oh Jintae International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117 |
|
|
Conference
|
2007 |
Memory-efficient content filtering hardware for high-speed intrusion detection systems
Yi Sungwon Symposium on Applied Computing (SAC) 2007, pp.264-269 |
15 |
원문
|
Conference
|
2006 |
High-Performance Stateful Intrusion Detection System
Yoon Seung Yong International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 |
4 |
원문
|
Conference
|
2006 |
A Study of Security Policy Enforcement using Priority
Su Hyung Jo SICE-ICASE International Joint Conference 2006, pp.3726-3729 |
0 |
원문
|
Conference
|
2006 |
FPGA Based Intrusion Detection System Against Unknown and Known Attacks
Dong Ho Kang Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 |
3 |
원문
|
Conference
|
2006 |
Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks
오하영 International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.440-447 |
3 |
원문
|
Conference
|
2006 |
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
Sung Jung Sik International Conference on Research in Networking (Networking) 2006 (LNCS 3976), v.3976, pp.1157-1162 |
2 |
원문
|
Conference
|
2006 |
Design and Implementation of FPGA Based High-Performance Intrusion Detection System
Byoung Koo Kim International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 |
4 |
원문
|
Conference
|
2006 |
Computational Science and Its Applications - ICCSA 2006
Dong Ho Kang International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10 |
|
원문
|
Conference
|
2006 |
Fragment Packet Partial Re-assembly Method for Intrusion Detection
Chung Bo-Heung International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 |
0 |
|
Conference
|
2006 |
A Developing of Signature-based Network Security Tester for NGSS
Jeong Youn Seo International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 |
0 |
|
Conference
|
2006 |
Incorporating Intrusion Detection Functionality into 1XP2800 Network Processor based Router
Ryu Seung Ho International Conference on Advanced Communication Technology (ICACT) 2006, pp.797-800 |
1 |
|
Conference
|
2005 |
An Efficient Multi-Packet Inspection Scheme without Packet Reassmbly
Woo-Sug Jung International Conference on Computational and Information Science (CIS) 2005, pp.1-5 |
|
|
Journal
|
2005 |
Security Requirements and Proposals for the Home Server in Ubiquitous Home Networks
Jung Tae Kim 전자통신동향분석, v.20, no.2, pp.83-92 |
|
원문
|
Conference
|
2005 |
Kernel-level Intrusion Detection Method Using Simplification and Grouping
Chung Bo-Heung International Conference on Advanced Communication Technology (ICACT) 2005, pp.251-254 |
|
|
Conference
|
2005 |
A Memory-based Learning Approach to Reduce False Alarms in Intrusion Detection
Ill-Young Weon International Conference on Advanced Communication Technology (ICACT) 2005, pp.241-245 |
2 |
원문
|
Conference
|
2004 |
A Study on Intrusion Detection of ARP Poisoning Attack on Wireless LAN
Ham Young Hwan International Conference on Electronics, Informations and Communications (ICEIC) 2004, pp.540-543 |
|
|
Conference
|
2004 |
Design and Implementation of Detection Engine Against IDS Evasion with Unicode
Dong Ho Kang International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 |
|
원문
|
Journal
|
2004 |
네트워크-기반 침입방지 시스템 성능 평가 기술 동향
Jeon Yong Hee 주간기술동향, v.1158, pp.16-31 |
|
|
Journal
|
2004 |
네트워크-기반 침입방지 시스템 성능 평가 기술 동향
Jeon Yong Hee 주간기술동향, v.1158, pp.16-31 |
|
|
Conference
|
2004 |
Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System
김형주 International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 |
0 |
원문
|
Journal
|
2004 |
침입탐지시스템과 침입방지시스템의 기술 비교 및 동향
Jeon Yong Hee 주간기술동향, v.1149, pp.1-7 |
|
|
Conference
|
2004 |
Design and Implementation of High-Performance Intrusion Detection System
Kim Byoung Koo International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 |
2 |
원문
|
Conference
|
2004 |
Two-step Rule Estimation (TRE) - Intrusion Detection Method against Eluding NIDS
Choi Byeong Cheol International Conference on Advanced Communication Technology (ICACT) 2004, pp.504-507 |
|
원문
|
Conference
|
2004 |
Kernel-level Intrusion Detection System for Minimum Packet Loss
Chung Bo-Heung International Conference on Advanced Communication Technology (ICACT) 2004, pp.207-212 |
|
원문
|
Journal
|
2004 |
Giga급 보안 프로세서 및 VPN 장비 기술 동향
김기현 주간기술동향, v.1131, pp.1-13 |
|
|
Conference
|
2003 |
CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection
Kim Jin Suk International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.84-96 |
5 |
원문
|
Conference
|
2002 |
Policy-Based Intrusion Detection and Automated Response Mechanism
Kim Jin Oh International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.399-408 |
3 |
원문
|
Conference
|
2002 |
Design of Network Security Control System for Cooperative Intrusion Detection
Kim Byoung Koo Information Networking: Wireless Communications Technologies and Network Applications (ICOIN) 2002 (LNCS 2344), v.2344, pp.389-398 |
4 |
원문
|
Conference
|
2002 |
Information Model for Policy-Based Network Security Management
Kim Sook Yeon International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 |
3 |
원문
|