ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Oh Jintae Principal Researcher
Department
Trustworthy Network Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 EO-VLM: VLM-Guided Energy Overload Attacks on Vision Models   Minjae Seo   Annual Computer Security Applications Conference (ACSAC) 2024, pp.1-2
Journal
2023 Random Number Generation in PoS Blockchain   임종철   한국통신학회논문지, v.48, no.3, pp.362-373 0
Conference
2022 Sizing Blockchain Committee using Variable Fraction of Byzantine Nodes   이창현   전자 정보 통신 학술 대회 (CEIC) 2022, pp.122-123
Journal
2022 Understanding of Blockchain and Classic Consensus Algorithms   임종철   전자공학회지, v.49, no.12, pp.45-56
Journal
2021 Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology   최진영  품질경영학회지, v.49, no.4, pp.527-537
Conference
2021 Monitoring Technology of PoN-based Blockchain   진희상   한국소프트웨어 종합 학술 대회 2021, pp.1-3
Conference
2021 A Study on Asymmetric Blockchain Systems   임종철   한국통신학회 종합 학술 대회 (추계) 2021, pp.196-197
Conference
2021 A Study on High-speed Synchronization of the PON-based Blockchain   김동오   한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321
Journal
2021 Blockchain distributed consensus technology trend   진희상   전자공학회지, v.48, no.5, pp.63-74
Journal
2020 Algorithm based on Byzantine Agreement among Decentralized Agents (BADA)   Jintae Oh   ETRI Journal, v.42, no.6, pp.872-885 3
Journal
2020 Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm   김영창   산업경영시스템학회지, v.43, no.4, pp.168-177
Journal
2018 Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items   김도균  산업경영시스템학회지, v.41, no.4, pp.179-188
Journal
2018 Past, Present and Future of Blockchain Technology   박정숙   전자통신동향분석, v.33, no.6, pp.139-153
Journal
2016 Trends of Artificial Intelligence Technology and Policy   윤장우   전자통신동향분석, v.31, no.2, pp.9-17
Journal
2016 Detecting Weak Signal of Emerging Technologies   최수길   전자통신동향분석, v.31, no.2, pp.18-27
Conference
2016 Performance Analysis and Implementation of a DVB-C2 Transceiver   Jaeho Lee   International Conference on Advanced Communication Technology (ICACT) 2016, pp.612-616 1
Conference
2015 A Study on Reducing Spectrum Edge of OFDM Signal   Jaeho LEE   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.874-876
Conference
2015 A Channel Allocation Method for IEEE802.19.1 Coexistence Service to Mitigate Interferences among Heterogeneous Wireless Networks   Hyunduk Kang   International Conference on Ubiquitous and Future Networks (ICUFN) 2015, pp.778-783 1
Conference
2014 A Study on Video Recognition and Representation Service based on Smart Glass   김귀훈   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.1191-1194
Conference
2014 Flying Screen with Cooperative Flocking Quad-Rotors   Jinkyeong Kim   International Conference on Convergence Content (ICCC) 2014, pp.373-374
Conference
2014 Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images   Sang-Kwang Lee   International Conference on Convergence Content (ICCC) 2014, pp.371-372
Conference
2013 Heterogeneous Information Network for Person Recognition   Hye-Jin Kim   International Conference on Ubiquitous Robots and Ambient Intelligence (URAI) 2013, pp.723-724 0
Conference
2013 Reversible Data Hiding Based on the Histogram Modification Using a Rotated Difference Image   이상광   대한전자공학회 종합 학술 대회 (하계) 2013, pp.923-925
Journal
2013 The Design of Vulnerability Management System   GeonLyang Kim   International Journal of Computer Science and Network Security, v.13, no.4, pp.19-25
Conference
2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Yang-seo Choi   International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 14
Conference
2012 Defense against TCP Flooding Attack   Seungyong Yoon   International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 1
Conference
2011 Design and Implementation of ALADDIN System   윤승용   한국정보처리학회 학술 발표 (추계) 2011, pp.992-995
Conference
2011 Timeslot Monitoring Model for Application Layer DDoS Attack Detection   Y.S. Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679
Conference
2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   김병구   한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Conference
2011 Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource   Dae Won Kim   International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145
Conference
2011 Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File   김대원   한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944
Conference
2011 SVM based Packed Executable File Detection by PE File Header Analysis   최양서   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Journal
2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   김병구   정보보호학회논문지, v.21, no.2, pp.119-129
Journal
2011 A Novel Application-Layer DDoS Attack Detection Algorithm based on Client Intention   오진태   정보보호학회논문지, v.21, no.1, pp.39-52
Conference
2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Dae Won Kim   International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1
Conference
2010 Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention   Yang-Seo Choi   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 27
Journal
2009 Research on Distributed Denial of Service Attack Response Infrastructure   최양서   정보보호학회지, v.19, no.5, pp.11-20
Journal
2009 Polymorphic Worm Detection Using A Fast Static Analysis Approach   오진태   정보보호학회논문지, v.19, no.4, pp.29-39
Conference
2009 Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection   Byoung Koo Kim   International Conference on Security and Management (SAM) 2009, pp.1-6
Conference
2009 A Study on the PE File Header Analysis Technique for Packed PE File Detection   최양서   한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-4
Conference
2009 Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks   Young Jun Heo   International Conference on Security and Cryptography (SECRYPT) 2009, pp.1-4
Conference
2009 Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme   Seung Yong Yoon   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Dae Won Kim   International Conference on Communications (ICC) 2009, pp.1-6 0
Conference
2009 Optimal Position Searching for Automated Malware Signature Generation   Yang Seo Choi   International Symposium on Consumer Electronics (ISCE) 2009, pp.561-564 0
Conference
2009 Entropy based Signature Extraction Position Searching for PE file   최양서   통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4
Journal
2009 Encoded Executable File Detection Technique Via Executable File Header Analysis   Yang Seo Choi   International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Journal
2009 Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection   Byoung Koo Kim   International Journal of Computers, v.3, no.1, pp.115-124
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211