Journal
|
2024 |
SITRAN: Self-Supervised IDS With Transferable Techniques for 5G Industrial Environments
Kimhyunjin IEEE Internet of Things Journal, v.11, no.21, pp.35465-35476 |
0 |
원문
|
Conference
|
2024 |
Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms
Choi Yangseo International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.427-428 |
0 |
원문
|
Journal
|
2021 |
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
Song-Yi Hwang Sensors, v.21, no.21, pp.1-23 |
8 |
원문
|
Journal
|
2019 |
Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing
Kim Hyun Joo Cluster Computing, v.22, no.Supp.1, pp.2341-2350 |
38 |
원문
|
Journal
|
2018 |
Secure Mobile Device Structure for Trust IoT
Lee Yun-Kyung Journal of Supercomputing, v.74, no.12, pp.6646-6664 |
7 |
원문
|
Conference
|
2017 |
Secure Voice Communication Service Based on Security Platform for Mobile Devices
Kim Geon Lyang International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1191-1193 |
1 |
원문
|
Conference
|
2017 |
Mobile Security Solution for Sensitive Data Leakage Prevention
Kim Geon Lyang International Conference on Communications and Broadband Networking (ICCBN) 2017, pp.59-64 |
2 |
원문
|
Conference
|
2015 |
A Study on the Hardware-based Security Solutions for Smart Devices
Ju Hong Il International Conference on Computational Science and Computational Intelligence (CSCI) 2015, pp.51-51 |
|
|
Journal
|
2015 |
Analyzing User Awareness of Privacy Data Leak in Mobile Applications
Young Ho Kim Mobile Information Systems, v.2015, pp.1-12 |
23 |
원문
|
Conference
|
2015 |
Trusted Military Services Based on the Secure Domain of the Mobile Security Solution
Kim Geon Lyang International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131 |
|
|
Conference
|
2015 |
The Secure Urgent Situation Propagation System Using the Mobile Security Solution
Kim Geon Lyang International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) 2015, pp.109-114 |
2 |
원문
|
Conference
|
2015 |
Host Behavior Characteristic Description Method Against APT Attack Detection
Moon Dae Sung World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7 |
|
|
Conference
|
2014 |
Secure Virtualised Environment
Pushpinder Kaur Chouhan International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 |
0 |
원문
|
Conference
|
2014 |
Mobile Device Security Framework Based on Domain Separation and Use Case
Lee Yun-Kyung Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4 |
|
|
Conference
|
2014 |
A Secure Message Service Using the Secure Domain of a Mobile Security Solution
Kim Geon Lyang International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.619-620 |
1 |
원문
|
Conference
|
2014 |
Cyber Incident Forensics as a Forward Lean Security
Jooyoung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.872-873 |
1 |
원문
|
Journal
|
2014 |
Automated and Coupled Services of Advanced Smart Surveillance Systems Toward Green IT: Tracking, Retrieval and Digital Evidence
Su Wan Park Journal of Supercomputing, v.69, no.3, pp.1215-1234 |
1 |
원문
|
Conference
|
2013 |
Geo-Location based QR-Code Authentication Scheme to Defeat Active Real-time Phishing Attack
Kim Seung-Hyun Workshop on Digital Identity Management (DIM) 2013, pp.51-61 |
10 |
원문
|
Conference
|
2012 |
Security Architecture for Smart Devices
Ju Hong Il International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.94-95 |
1 |
원문
|
Journal
|
2010 |
Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems
Yousung Kang 정보보호학회논문지, v.20, no.4, pp.117-134 |
|
|
Conference
|
2009 |
Secure Overlay for Multicast IPTV Streaming using Trust Rendezvous Point
권혁찬 International Conference on New Trends in Information and Service Science (NISS) 2009, pp.419-422 |
0 |
원문
|
Conference
|
2009 |
Secure Overlay Multicast Infrastructure for P2P-based IPTV Service
Kwon Hyeok Chan International Conference on Advanced Communication Technology (ICACT) 2009, pp.2041-2043 |
|
|
Conference
|
2007 |
Implementation of LSM-Based RBAC Module for Embedded System
Lim Jae Deok International Workshop on Information Security Applications (WISA) 2007 (LNCS 4867), v.4867, pp.91-101 |
2 |
원문
|
Conference
|
2005 |
Design of Attack Generation Test-suite based Scenario for Security Solutions Testing
김환국 International Conference on Advanced Communication Technology (ICACT) 2005, pp.676-679 |
|
원문
|
Conference
|
2001 |
The group security association for secure multicasting
Park Won-Joo International Conference on Networks (ICON) 2001, pp.130-133 |
1 |
원문
|