Conference
|
2022 |
Lightweight Signature-based Range Proof
Kwantae Cho International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1862-1865 |
1 |
원문
|
Journal
|
2021 |
Evaluations of AI‐based malicious PowerShell detection with feature optimizations
Jihyeon Song ETRI Journal, v.43, no.3, pp.549-560 |
19 |
원문
|
Journal
|
2018 |
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage
Taek-Young Youn IEEE Access, v.6, pp.26578-26587 |
41 |
원문
|
Conference
|
2016 |
Group Signature-based Vehicular PKI without Thousands of Pseudonym Certificates
Lee Sokjoon International Conference on Computer Engineering and Information Technology (ICCEIT) 2016, pp.25-28 |
|
|
Journal
|
2016 |
Host-based Intrusion Detection System for Secure Human-centric Computing
Moon Dae Sung Journal of Supercomputing, v.72, no.7, pp.2520-2536 |
35 |
원문
|
Conference
|
2015 |
Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection
Kim Dae Won International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3 |
|
|
Conference
|
2014 |
Detection of SMS Mobile Malware
Yoon Seung Yong International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 |
1 |
원문
|
Journal
|
2013 |
Mobile Malware Detection Using Correlational Analysis
Yoon Seung Yong International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58 |
|
|
Conference
|
2010 |
Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File
Kim Dae Won International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 |
1 |
원문
|
Conference
|
2009 |
Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme
Yoon Seung Yong International Conference on Security and Management (SAM) 2009, pp.1-5 |
|
|
Conference
|
2009 |
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique
Kim Dae Won International Conference on Communications (ICC) 2009, pp.1-6 |
0 |
원문
|
Journal
|
2009 |
Validation Methods of Suspicious Network Flows for Unknown Attack Detection
Kim Ik Kyun International Journal of Computers, v.1, no.3, pp.104-114 |
|
|
Journal
|
2008 |
Signature-Based Hybrid Spill-Tree for Contents-Based Retrieval for Large Amounts of Video Data
이현조 데이타베이스연구, v.24, no.1, pp.33-49 |
|
|
Conference
|
2006 |
Computational Science and Its Applications - ICCSA 2006
Dong Ho Kang International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10 |
|
원문
|
Conference
|
2006 |
A Developing of Signature-based Network Security Tester for NGSS
Jeong Youn Seo International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 |
0 |
|
Conference
|
2005 |
A Memory-based Learning Approach to Reduce False Alarms in Intrusion Detection
Ill-Young Weon International Conference on Advanced Communication Technology (ICACT) 2005, pp.241-245 |
2 |
원문
|
Conference
|
2004 |
Design and Implementation of Detection Engine Against IDS Evasion with Unicode
Dong Ho Kang International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 |
|
원문
|