Conference
|
2017 |
Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android
Lee Sung-Hoon International Symposium on Software Reliability Engineering Workshops (ISSREW) 2017, pp.36-39 |
4 |
원문
|
Conference
|
2016 |
Abnormal Traffic Filtering Mechanism for Protecting ICS Networks
Byoung Koo Kim International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 |
7 |
원문
|
Conference
|
2016 |
A Study of Cyber Security Policy in Industrial Control System using Data Diodes
Boo-Sun Jeon International Conference on Advanced Communication Technology (ICACT) 2016, pp.314-317 |
19 |
원문
|
Conference
|
2014 |
Design of Industrial Firewall System based on Multiple Access Control Filter
Byoung Koo Kim International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 |
1 |
원문
|
Conference
|
2013 |
A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion
Kwon Hyeok Chan International Conference on Information Science and Industrial Applications (ISI) 2013, pp.317-321 |
|
|
Conference
|
2011 |
Building Secure Execution Environment for Mobile Platform
Young Ho Kim International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI) 2011, pp.119-122 |
4 |
원문
|
Conference
|
2009 |
Framework for Security Management of Mobile Devices
Park Won-Joo International Symposium on Communications and Information Technology (ISCIT) 2009, pp.1219-1222 |
0 |
원문
|
Journal
|
2009 |
Security Policy Specification for Home Network
Kim Geonwoo International Journal Ad Hoc and Ubiquitous Computing, v.4, no.6, pp.372-378 |
1 |
원문
|
Journal
|
2009 |
Security technologies based on a home gateway for making smart homes secure
Kim Geonwoo Internet Research, v.19, no.2, pp.209-226 |
2 |
원문
|
Conference
|
2008 |
Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network
Lee Deok Gyu International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 |
3 |
원문
|
Conference
|
2008 |
An Effective Information Systems Security Policy Implementation
Rosslin John Robles 한국정보기술학회 학술 발표회 (하계) 2008, pp.1-4 |
|
|
Conference
|
2008 |
Malware and Antivirus Deployment for Enterprise Security
Lee Deok Gyu 한국정보기술학회 학술 발표회 (하계) 2008, pp.1-4 |
|
|
Conference
|
2007 |
Implementation of Multi-thread based Intrusion Prevention System for IPv6
Lim Jae Deok International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 |
5 |
원문
|
Conference
|
2007 |
Security Framework for Home Network: Authentication, Authorization, and Security Policy
Kim Geonwoo Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 |
7 |
원문
|
Conference
|
2006 |
A Study of Security Policy Enforcement using Priority
Su Hyung Jo SICE-ICASE International Joint Conference 2006, pp.3726-3729 |
0 |
원문
|
Conference
|
2006 |
A Method for Security Policy Enforcement of Security Router Platform
Su Hyung Jo Asia-Pacific Network Operations and Management Symposium (APNOMS) 2006, pp.1-9 |
|
|
Conference
|
2005 |
Design of network security policy information model for policy-based network management
Seon-Gyoung Sohn International Conference on Advanced Communication Technology (ICACT) 2005, pp.701-705 |
|
원문
|
Conference
|
2004 |
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network
Park So Hee International Conference on AI, Simulation, and Planning in High Autonomy Systems (AIS) 2004 (LNCS 3397), v.3397, pp.109-116 |
0 |
원문
|
Conference
|
2004 |
Security Flow Control by Dynamic Stack Allocation
Kim Geonwoo International Conference on Advanced Communication Technology (ICACT) 2004, pp.309-311 |
|
원문
|
Conference
|
2002 |
Policy-Based Intrusion Detection and Automated Response Mechanism
Kim Jin Oh International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.399-408 |
3 |
원문
|
Journal
|
2002 |
The Implementation of Policy Management Tool Based on Network Security Policy Information Model
Kim Geon Lyang 정보처리학회논문지 C, v.9C, no.5, pp.775-782 |
|
|
Conference
|
2002 |
SPS-ALG : Security Policy Negotiation a NAT
Kim Geonwoo 한국정보과학회 학술 발표 (가을) 2002, pp.613-615 |
|
|
Conference
|
2002 |
Information Model for Policy-Based Network Security Management
Kim Sook Yeon International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 |
3 |
원문
|
Conference
|
2002 |
Security Policy Deployment in IPsec
Kim Geonwoo International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.453-464 |
0 |
원문
|
Conference
|
2001 |
Policy Core Information Model in Policy-Based Management far Network Security
Kim Sook Yeon 한국정보과학회 학술 발표 (가을) 2001, pp.652-654 |
|
|