학술지
|
2023 |
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks
박철희 IEEE Internet of Things Journal, v.10 no.3, pp.2330-2345 |
25 |
원문
|
학술대회
|
2022 |
AI-based Network Security Enhancement for 5G Industrial IoT Environments
이종훈 International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.971-975 |
2 |
원문
|
학술대회
|
2022 |
Network Security in 5G Cloud Native MEC Environments
신용윤 International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.965-967 |
0 |
원문
|
학술대회
|
2022 |
Network Anomaly Detection based on Domain Adaptation for 5G Network Security
김현진 International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.976-980 |
1 |
원문
|
학술지
|
2022 |
Stabilizing Adversarially Learned One-Class Novelty Detection Using Pseudo Anomalies
무함마드 IEEE Transactions on Image Processing, v.31, pp.5963-5975 |
1 |
원문
|
학술지
|
2022 |
Attack Graph Generation with Machine Learning for Network Security
구기종 Electronics, v.11 no.9, pp.1-25 |
3 |
원문
|
학술대회
|
2021 |
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset
이겨울 International Conference on Advanced Communications Technology (ICACT) 2021, pp.254-258 |
0 |
원문
|
학술대회
|
2020 |
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
우승원 Conference on Computer Communications (INFOCOM) 2020, pp.1788-1797 |
6 |
원문
|
학술대회
|
2020 |
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks
이승수 Conference on Computer Communications (INFOCOM) 2020, pp.1788-1797 |
6 |
원문
|
학술대회
|
2019 |
Canary: a Scalable Content Integrity Verifying Protocol for ICN
신용윤 Conference on Information-Centric Networking (ICN) 2019, pp.167-168 |
1 |
원문
|
학술지
|
2019 |
A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph
이주영 Journal of Supercomputing, v.75 no.6, pp.3028-3045 |
14 |
원문
|
학술대회
|
2018 |
Implementation of TLS and DTLS on Zephyr OS for IoT Devices
이윤경 International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1292-1294 |
11 |
원문
|
학술지
|
2017 |
Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma
김다진 Scientific Reports, v.7, pp.1-8 |
11 |
원문
|
학술지
|
2017 |
Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma
박장순 Scientific Reports, v.7, pp.1-8 |
11 |
원문
|
학술지
|
2017 |
Reconfigurable Yagi-Uda Antenna based on a Silicon Reflector with a Solid-State Plasma
김철호 Scientific Reports, v.7, pp.1-8 |
11 |
원문
|
학술대회
|
2017 |
Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security
김현주 iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 |
3 |
원문
|
학술지
|
2016 |
RTNSS: A Routing Trace-based Network Security System for Preventing ARP Spoofing Attacks
문대성 Journal of Supercomputing, v.72 no.5, pp.1740-1756 |
8 |
원문
|
학술대회
|
2016 |
Abnormal Traffic Filtering Mechanism for Protecting ICS Networks
김병구 International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 |
7 |
원문
|
학술대회
|
2015 |
Transmitted File Extraction and Reconstruction from Network Packets
최양서 World Congress on Internet Security (WorldCIS) 2015, pp.164-165 |
1 |
원문
|
학술대회
|
2014 |
Design of Industrial Firewall System based on Multiple Access Control Filter
김병구 International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 |
1 |
원문
|
학술대회
|
2013 |
SCADA Network Security System Using NSM Data Objects
허영준 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.1145-1147 |
|
|
학술대회
|
2012 |
Novel Compositing Method for Quantification of Wireless Network Security
정성모 International Conference on Security Technology (SecTech) 2012 (CCIS 339), v.339, pp.1-6 |
0 |
원문
|
학술지
|
2012 |
The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack
김선욱 IETE Journal of Research, v.58 no.5, pp.398-410 |
0 |
원문
|
학술대회
|
2012 |
Security Architecture of Inter VTS Exchange Format Protocol for Secure u-Navigation
이병길 International Conference on Embedded and Multimedia Computing (EMC) 2012 (LNEE 181), v.181, pp.229-236 |
6 |
원문
|
학술지
|
2011 |
ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services
서대희 보안공학연구논문지, v.8 no.6, pp.673-692 |
|
|
학술대회
|
2011 |
Scalable Wireless Network Security for Bluetooth in Global Collaborative Environment
서대희 International Conference on Ubi-media Computing (U-Media) 2011, pp.1-6 |
1 |
원문
|
학술지
|
2010 |
An Efficient Network Attack Visualization Using Security Quad and Cube
장범환 ETRI Journal, v.33 no.5, pp.770-779 |
7 |
원문
|
학술대회
|
2010 |
High Performance DFA-based String Matching
김정학 International Telecommunications Network Strategy and Planning Symposium (Networks) 2010, pp.1-6 |
0 |
원문
|
학술대회
|
2009 |
High Speed Pattern Matching for Deep Packet Inspection
김정학 International Symposium on Communications and Information Technology (ISCIT) 2009, pp.1310-1315 |
6 |
원문
|
학술대회
|
2009 |
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique
김대원 International Conference on Communications (ICC) 2009, pp.1-6 |
0 |
원문
|
학술지
|
2009 |
Security Technologies based on Home Gateway for Making Smart Home Secure
김건우 Internet Research, v.19 no.2, pp.209-226 |
2 |
원문
|
학술대회
|
2009 |
Intelligent Pervasive Network Authentication : S/Key based Device Authentication
이덕규 Consumer Communications and Networking Conference (CCNC) 2009, pp.1-5 |
5 |
원문
|
학술대회
|
2008 |
Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network
이덕규 International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 |
3 |
원문
|
학술지
|
2008 |
Tracing Stored Program Counter to Detect Polymorphic Shellcode
김대원 IEICE Transactions on Information and Systems, v.E91-D no.8, pp.2192-2195 |
3 |
원문
|
학술대회
|
2008 |
Function Call Mechanism Based Executable Code Detection for the Network Security
김대원 International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 |
3 |
원문
|
학술지
|
2008 |
Technique for Estimating the Number of Active Flows in High-Speed Networks
이성원 ETRI Journal, v.30 no.2, pp.194-204 |
4 |
원문
|
학술대회
|
2007 |
Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor
김영호 International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 |
1 |
원문
|
학술대회
|
2007 |
Intelligent Home Network Authentication: Home Device Authentication Using Device Certification
이덕규 OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007 (LNCS 4804), v.4804, pp.1688-1700 |
1 |
원문
|
학술대회
|
2007 |
Intelligent Home Network Authentication: S/Key-Based Home Device Authentication
이덕규 International Symposium on Parallel and Distributed Processing and Applications (ISPA) 2007 (LNCS 4743), v.4743, pp.214-223 |
5 |
원문
|
학술대회
|
2007 |
Development of Role Based Network Security Management System
김건량 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.374-375 |
|
|
학술대회
|
2007 |
Home Device Authentication Method in Ubiquitous Environment
이윤경 International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 |
5 |
원문
|
학술대회
|
2007 |
Security Framework for Home Network: Authentication, Authorization, and Security Policy
김건우 Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 |
7 |
원문
|
학술대회
|
2007 |
A Design and Implementation of Wireless Sensor Network Security on Nano-Qplus Platform
김진원 International Conference on Advanced Communication Technology (ICACT) 2007, pp.684-688 |
0 |
원문
|
학술지
|
2006 |
The Development of Policy Proxy Agent in Policy-Based Network Security Management System
김건량 WSEAS Transactions on Communications, v.6 no.1, pp.236-240 |
|
|
학술대회
|
2006 |
The Development of Policy Proxy Agent in Policy-Based Network Security Management System
김건량 International Conference on Information Security and Privacy (ISP) 2006, pp.41-45 |
|
|
학술대회
|
2006 |
High-Performance Stateful Intrusion Detection System
윤승용 International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 |
4 |
원문
|
학술지
|
2006 |
Cost Optimization in SIS Model of Worm Infection
김종현 ETRI Journal, v.28 no.5, pp.692-695 |
34 |
원문
|
학술대회
|
2006 |
Implementation of VPN Router Hardware Platform using Network Processor
이상우 International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 |
2 |
|
학술대회
|
2006 |
An Efficient Design of High Speed Network Security Platform using Network Processor
전용성 International Conference on Embedded Systems and Applications (ESA) 2006, pp.121-123 |
|
|
학술대회
|
2006 |
A Security Model for Home Networks with Authority Delegation
황진범 International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.360-369 |
5 |
원문
|
학술대회
|
2006 |
Home Network Security Description Language
김건우 한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.741-744 |
|
|
학술대회
|
2006 |
A Developing of Signature-based Network Security Tester for NGSS
정연서 International Conference on Advanced Communication Technology (ICACT) 2006, pp.1543-1546 |
0 |
|
학술대회
|
2006 |
Considerations on Security Model of Home Network
김건우 International Conference on Advanced Communication Technology (ICACT) 2006, pp.109-112 |
6 |
|
학술대회
|
2006 |
On the Study of Service Security Model for Privacy using Global User Management Framework
최병철 International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 |
2 |
|
학술대회
|
2006 |
Implementation of VPN Router Hardware Platform using Netwvor Processor
이상우 International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 |
2 |
|
학술대회
|
2005 |
A Study on Establishment of Secure RFID Network Using DNS Security Extension
함영환 Asia-Pacific Conference on Communications (APCC) 2005, pp.525-529 |
5 |
원문
|
학술대회
|
2005 |
Design of Network Security Policy Infomation Model for Policy-based Network Management
손선경 International Conference on Advanced Communication Technology (ICACT) 2005, pp.701-705 |
|
원문
|
학술대회
|
2004 |
Design and Implementation of High-Performance Intrusion Detection System
김병구 International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 |
2 |
원문
|
학술대회
|
2002 |
Design of Network Security Control System for Cooperative Intrusion Detection
김병구 Information Networking: Wireless Communications Technologies and Network Applications (ICOIN) 2002 (LNCS 2344), v.2344, pp.389-398 |
4 |
원문
|
학술대회
|
2002 |
Security Policy Deployment in IPsec
김건우 International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.453-464 |
0 |
원문
|
학술대회
|
2002 |
Information Model for Policy-Based Network Security Management
김숙연 International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 |
3 |
원문
|