ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Oh Jintae
Department
Trustworthy Network Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 EO-VLM: VLM-Guided Energy Overload Attacks on Vision Models   Minjae Seo   Annual Computer Security Applications Conference (ACSAC) 2024, pp.1-2
Journal
2023 Random Number Generation in PoS Blockchain   임종철   한국통신학회논문지, v.48, no.3, pp.362-373 0
Conference
2022 Sizing Blockchain Committee using Variable Fraction of Byzantine Nodes   이창현   전자 정보 통신 학술 대회 (CEIC) 2022, pp.122-123
Journal
2022 Understanding of Blockchain and Classic Consensus Algorithms   임종철   전자공학회지, v.49, no.12, pp.45-56
Conference
2021 Monitoring Technology of PoN-based Blockchain   진희상   한국소프트웨어 종합 학술 대회 2021, pp.1-3
Journal
2021 Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology   최진영  품질경영학회지, v.49, no.4, pp.527-537
Conference
2021 A Study on Asymmetric Blockchain Systems   임종철   한국통신학회 종합 학술 대회 (추계) 2021, pp.196-197
Conference
2021 A Study on High-speed Synchronization of the PON-based Blockchain   김동오   한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321
Journal
2021 Blockchain distributed consensus technology trend   진희상   전자공학회지, v.48, no.5, pp.63-74
Journal
2020 Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm   김영창   산업경영시스템학회지, v.43, no.4, pp.168-177
Journal
2020 Algorithm based on Byzantine Agreement among Decentralized Agents (BADA)   Jintae Oh   ETRI Journal, v.42, no.6, pp.872-885 1
Journal
2018 Past, Present and Future of Blockchain Technology   박정숙   전자통신동향분석, v.33, no.6, pp.139-153
Journal
2018 Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items   김도균  산업경영시스템학회지, v.41, no.4, pp.179-188
Journal
2016 Detecting Weak Signal of Emerging Technologies   최수길   전자통신동향분석, v.31, no.2, pp.18-27
Journal
2016 Trends of Artificial Intelligence Technology and Policy   윤장우   전자통신동향분석, v.31, no.2, pp.9-17
Conference
2016 Performance Analysis and Implementation of a DVB-C2 Transceiver   Jaeho Lee   International Conference on Advanced Communication Technology (ICACT) 2016, pp.612-616 1
Conference
2015 A Study on Reducing Spectrum Edge of OFDM Signal   Jaeho LEE   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.874-876
Conference
2015 A Channel Allocation Method for IEEE802.19.1 Coexistence Service to Mitigate Interferences among Heterogeneous Wireless Networks   Hyunduk Kang   International Conference on Ubiquitous and Future Networks (ICUFN) 2015, pp.778-783 1
Conference
2014 A Study on Video Recognition and Representation Service based on Smart Glass   김귀훈   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.1191-1194
Conference
2014 Flying Screen with Cooperative Flocking Quad-Rotors   Jinkyeong Kim   International Conference on Convergence Content (ICCC) 2014, pp.373-374
Conference
2014 Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images   Sang-Kwang Lee   International Conference on Convergence Content (ICCC) 2014, pp.371-372
Conference
2013 Heterogeneous Information Network for Person Recognition   Hye-Jin Kim   International Conference on Ubiquitous Robots and Ambient Intelligence (URAI) 2013, pp.723-724 0
Conference
2013 Reversible Data Hiding Based on the Histogram Modification Using a Rotated Difference Image   이상광   대한전자공학회 종합 학술 대회 (하계) 2013, pp.923-925
Journal
2013 The Design of Vulnerability Management System   GeonLyang Kim   International Journal of Computer Science and Network Security, v.13, no.4, pp.19-25
Conference
2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Yang-seo Choi   International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 12
Conference
2012 Defense against TCP Flooding Attack   Seungyong Yoon   International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 1
Conference
2011 Timeslot Monitoring Model for Application Layer DDoS Attack Detection   Y.S. Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679
Conference
2011 Design and Implementation of ALADDIN System   윤승용   한국정보처리학회 학술 발표 (추계) 2011, pp.992-995
Conference
2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   김병구   한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Conference
2011 Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource   Dae Won Kim   International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145
Conference
2011 Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File   김대원   한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944
Journal
2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   김병구   정보보호학회논문지, v.21, no.2, pp.119-129
Conference
2011 SVM based Packed Executable File Detection by PE File Header Analysis   최양서   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Journal
2011 A Novel Application-Layer DDoS Attack Detection Algorithm based on Client Intention   오진태   정보보호학회논문지, v.21, no.1, pp.39-52
Conference
2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Dae Won Kim   International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1
Conference
2010 Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention   Yang-Seo Choi   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 27
Journal
2009 Research on Distributed Denial of Service Attack Response Infrastructure   최양서   정보보호학회지, v.19, no.5, pp.11-20
Journal
2009 Polymorphic Worm Detection Using A Fast Static Analysis Approach   오진태   정보보호학회논문지, v.19, no.4, pp.29-39
Conference
2009 Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme   Seung Yong Yoon   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks   Young Jun Heo   International Conference on Security and Cryptography (SECRYPT) 2009, pp.1-4
Conference
2009 Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection   Byoung Koo Kim   International Conference on Security and Management (SAM) 2009, pp.1-6
Conference
2009 A Study on the PE File Header Analysis Technique for Packed PE File Detection   최양서   한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-4
Conference
2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Dae Won Kim   International Conference on Communications (ICC) 2009, pp.1-6 0
Conference
2009 Optimal Position Searching for Automated Malware Signature Generation   Yang Seo Choi   International Symposium on Consumer Electronics (ISCE) 2009, pp.561-564 0
Journal
2009 Encoded Executable File Detection Technique Via Executable File Header Analysis   Yang Seo Choi   International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36
Conference
2009 Entropy based Signature Extraction Position Searching for PE file   최양서   통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Journal
2009 Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection   Byoung Koo Kim   International Journal of Computers, v.3, no.1, pp.115-124
Conference
2008 An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware   Byoung Koo Kim   International Conference on Applied Computer Science (ACS) 2008, pp.199-204
Conference
2008 Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Applied Computer Science (ACS) 2008, pp.1-6
Journal
2008 H/W based Stateful Packet Inspection using a Novel Session Architecture   Seung Yong Yoon   International Journal of Computers, v.3, no.2, pp.310-319
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference
2008 PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)   Yang-Seo Choi   International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 40
Journal
2008 제로 데이 어택 방지를 위한 실시간 대응 기술   오진태   인터넷정보학회지, v.9, no.3, pp.25-31
Conference
2008 Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets   Ryan Iwahashi  International Conference on Information Security (ISC) 2008 (LNCS 5222), v.5222, pp.114-130 4
Journal
2008 Tracing Stored Program Counter to Detect Polymorphic Shellcode   Dae Won Kim   IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 3
Journal
2008 Technology and Standardization Trend of Security Information Sharing   정일안   전자통신동향분석, v.23, no.4, pp.30-38
Conference
2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Dae Won Kim   International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3
Journal
2008 Executable Code Recognition in Network Flows Using Instruction Transition Probabilities   Ik Kyun Kim   IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 2
Conference
2008 Fast Static Analysis Method to Detect Polymorphic Worm   김대원   한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232
Journal
2008 PE Header Characteristics Analysis Technique for Malware Detection   최양서   정보보안논문지, v.8, no.2, pp.63-70
Journal
2008 A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System   Jin Tae Oh   International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162
Journal
2008 The Recent Trends of Polymorphic Shellcodes Detection Technologies   김대원   전자통신동향분석, v.23, no.1, pp.145-152
Journal
2008 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트   김대원   주간기술동향, v.1329, pp.1-12
Journal
2007 Zero-day 공격 대응을 위한 네트워크 보안의 지능화 기술   정일안   정보와 통신 : 한국통신학회지, v.24, no.11, pp.14-24
Conference
2007 High Performance Session State Management Scheme for Stateful Packet Inspection   Seung Yong Yoon   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 6
Conference
2007 A Practical Approach for Detecting Executable Codes in Network Traffic   Ik Kyun Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 1
Conference
2007 ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response   Byoung Koo Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 0
Journal
2007 Detection of DDoS and IDS Evasion Attacks in a High-Speed Networks Environment   Sang-Kil Park   International Journal of Computer Science and Network Security, v.7, no.6, pp.124-131
Journal
2007 Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System   Jin-Tae Oh   International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117
Conference
2007 Memory-efficient content filtering hardware for high-speed intrusion detection systems   Sung Won Yi   Symposium on Applied Computing (SAC) 2007, pp.264-269 15
Conference
2007 High-Speed Concurrent Attack Responding System using FPGA Supporting IPv4/IPv6   Sang-Kil Park   International Conference on Advanced Communication Technology (ICACT) 2007, pp.1252-1257 0
Journal
2007 High-Performance Intrusion Detection Technology in FPGA-Based Reconfiguring Hardware   김병구   전자통신동향분석, v.22, no.1, pp.51-58
Conference
2006 High-Performance SPI-based Intrusion Detection Engine   오진태   차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-5
Journal
2006 데이터베이스 보안 기술 동향   이호균   주간기술동향, v.1273, pp.1-14
Conference
2006 High-Performance Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 4
Conference
2006 Design and Implementation of High-Performance Security Gateway System   Seung Yong Yoon   Joint Workshop on Information Security (JWIS) 2006, pp.1-15
Conference
2006 FPGA Based Intrusion Detection System Against Unknown and Known Attacks   Dong Ho Kang   Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 3
Journal
2006 A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm   김익균   전자공학회논문지 TC, v.43, no.7, pp.93-103
Conference
2006 Hardware Supports for Network Traffic Anomaly Detection   Dae Won Kim   International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5
Journal
2006 네트워크 보안을 위한 공격 분류법   김대원   주간기술동향, v.1249, pp.1-13
Conference
2006 Computational Science and Its Applications - ICCSA 2006   Dong Ho Kang   International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10
Conference
2006 Design and Implementation of FPGA Based High-Performance Intrusion Detection System   Byoung Koo Kim   International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 4
Conference
2006 Design of SPI Module in Large-Scale Network   Seung Yong Yoon   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1706-1711 0
Conference
2006 High-Speed Attack Mitigation Engine by Packet Filtering and Rate-limiting using FPGA   Sang Kil Park   International Conference on Advanced Communication Technology (ICACT) 2006, pp.680-685 2
Conference
2005 Network Traffic Entropy Analysis for Worm Detection   Young-Jun Heo   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.641-642
Conference
2005 A study on the Selection of Continuous Network Features using Relative Entropy and Enhancement of Detection Efficiency   정일안   한국정보과학회 학술 발표 (하계) 2005, pp.1-4
Conference
2005 The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks   오승희   한국해양정보통신학회 종합 학술 대회 (춘계) 2005, pp.848-851
Conference
2005 Reconfigurable Bandwidth Controller for Responding the DDoS Attacks using Token Bucket Mechanism   Sang Kil Park   International Conference on Advanced Communication Technology (ICACT) 2005, pp.377-380
Journal
2004 Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks   박상길   정보처리학회논문지 C, v.11, no.7, pp.951-958
Journal
2004 안전한 정보 통신 인프라용 고성능 침해 탐지 및 대응 기술   김기영   한국통신학회지, v.21, no.9, pp.48-57
Journal
2004 A Trend of Security Processor Technology   김기영   전자공학회지, v.31, no.8, pp.52-60
Conference
2004 Design and Implementation of Detection Engine Against IDS Evasion with Unicode   Dong Ho Kang   International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337