Journal
|
2024 |
A Study of the Relationship of Malware Detection Mechanisms using Artificial Intelligence
Jihyeon Song ICT EXPRESS, v.10, no.3, pp.632-649 |
5 |
원문
|
Conference
|
2023 |
A device driver for the AB21 SoC in Supreme-K system
Kim Young Ho International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1781-1784 |
0 |
원문
|
Conference
|
2022 |
Design of the scheduler of accelerator device driver supporting OpenCL application for heterogeneous accelerator in Supreme-K system
Kim Young Ho International Conference on Internet (ICONI) 2022, pp.297-299 |
|
|
Conference
|
2018 |
Abnormal Traffic Detection Mechanism for Protecting IIoT Environments
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 |
8 |
원문
|
Journal
|
2016 |
Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
Kim Hyun Joo IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 |
6 |
원문
|
Conference
|
2015 |
Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device
Kwon Hyeok Chan International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 |
0 |
원문
|
Conference
|
2014 |
Detecting Cloned Devices in Wireless Network using RSSI and RF Features
Kwon Hyeok Chan International Conference on Internet (ICONI) 2014, pp.1-4 |
|
|
Conference
|
2014 |
Analysis of Mobile Malware based on User Awareness
Young Ho Kim Conference on Research in Information Technology (RIIT) 2014, pp.51-51 |
0 |
원문
|
Journal
|
2014 |
A Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router
Park Pyung-Koo Multimedia Tools and Applications, v.74, no.16, pp.6341-6363 |
1 |
원문
|
Conference
|
2014 |
Hidden Evasive Server-Side Polymorphic Malicious Apps Detection Mechanism on Android based Smart Phone Devices
문대열 International Conference on Convergence Technology (ICCT) 2014, pp.819-820 |
|
|
Conference
|
2014 |
Defenses against ICMP Flooding Attacks
Byoung Koo Kim International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 |
|
|
Conference
|
2013 |
Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router
Park Pyung-Koo International Conference on Information Science and Applications (ICISA) 2013, pp.1-4 |
0 |
원문
|
Conference
|
2012 |
A Pseudo State-based Distributed DoS Detection Mechanism using Dynamic Hashing
Park Pyung-Koo International Conference on Security Technology (SecTech) 2012 (CCIS 339), v.339, pp.22-29 |
1 |
원문
|
Journal
|
2008 |
Bio-information scanning technology using an optical pick-up head
Kang-Ho Park Ultramicroscopy, v.108, no.10, pp.1319-1324 |
6 |
원문
|
Conference
|
2007 |
ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response
Byoung Koo Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 |
0 |
원문
|
Conference
|
2006 |
Privileged Tracking and Clone Detection for RFIDEnabled Banknotes
Yousung Kang Applied Cryptography and Network Security, pp.1-13 |
|
|
Conference
|
2006 |
Design and Implementation of FPGA Based High-Performance Intrusion Detection System
Byoung Koo Kim International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 |
4 |
원문
|
Conference
|
2006 |
Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis
Kim Hyun Joo International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.726-727 |
1 |
원문
|
Conference
|
2004 |
Design and Implementation of High-Performance Intrusion Detection System
Kim Byoung Koo International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 |
2 |
원문
|
Conference
|
2001 |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation
Choi Yangseo International Conference on Information Security and Cryptology (ICISC) 2001 (LNCS 2288), v.2288, pp.146-159 |
1 |
|