Journal
|
2024 |
SITRAN: Self-Supervised IDS With Transferable Techniques for 5G Industrial Environments
Kimhyunjin IEEE Internet of Things Journal, v.11, no.21, pp.35465-35476 |
0 |
원문
|
Journal
|
2022 |
Technological Trends in Intelligent Cyber Range
Yu Jae Hak 전자통신동향분석, v.37, no.4, pp.36-45 |
|
원문
|
Journal
|
2022 |
Attack Graph Generation with Machine Learning for Network Security
Koo Ki Jong Electronics, v.11, no.9, pp.1-25 |
9 |
원문
|
Conference
|
2021 |
Network Anomaly Detection based on GAN with Scaling Properties
Kimhyunjin International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-5 |
5 |
원문
|
Journal
|
2019 |
Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles
Jong-Hoon Lee IEEE Access, v.7, pp.165607-165626 |
120 |
원문
|
Conference
|
2018 |
Cyber Threat Analyses of a UAS Traffic Management System
Wang/Kicheoul Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-8 |
0 |
|
Conference
|
2017 |
Building a Big Data Platform for Large-scale Security Data Analysis
Jong-Hoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 |
5 |
원문
|
Conference
|
2015 |
A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology
Lim Kyung Soo International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 |
3 |
원문
|
Conference
|
2014 |
Cyber Threats and Defence Approaches in SCADA systems
Dong Ho Kang International Conference on Advanced Communication Technology (ICACT) 2014, pp.324-327 |
17 |
원문
|
Journal
|
2013 |
GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection
Kim Hyun Joo Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 |
0 |
|
Conference
|
2013 |
Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis
Lim Sun Hee International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507 |
|
|
Journal
|
2013 |
Cyber Attacks and Security Intelligence
Kim Youngsoo Research Notes in Information Science, v.14, pp.106-108 |
0 |
|
Conference
|
2012 |
Prediction Model for Botnet-based Cyber Threats
Lim Sun Hee International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.340-341 |
3 |
원문
|
Conference
|
2012 |
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks
김현주 International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 |
6 |
원문
|
Journal
|
2012 |
A Rule Based Event Correlation Approach for Physical and Logical Security Convergence
Dong Ho Kang International Journal of Computer Science and Network Security, v.12, no.1, pp.28-31 |
|
|
Conference
|
2008 |
Performance Evaluation of TCAM Based Pattern-Matching Algorithm
Sung Jung Sik Vehicular Technology Conference (VTC) 2008 (Fall), pp.1-5 |
1 |
원문
|
Conference
|
2005 |
A Multi-gigabit Rate Deep Packet Inspection Algorithm using TCAM
Sung Jung Sik GLOBECOM 2005, pp.453-457 |
28 |
원문
|