ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Oh Jintae
Department
Trustworthy Network Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2023 Random Number Generation in PoS Blockchain   임종철   한국통신학회논문지, v.48, no.3, pp.362-373 0
Conference
2022 Sizing Blockchain Committee using Variable Fraction of Byzantine Nodes   이창현   전자 정보 통신 학술 대회 (CEIC) 2022, pp.122-123
Journal
2022 Understanding of Blockchain and Classic Consensus Algorithms   임종철   전자공학회지, v.49, no.12, pp.45-56
Journal
2021 Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology   최진영  품질경영학회지, v.49, no.4, pp.527-537
Conference
2021 Monitoring Technology of PoN-based Blockchain   진희상   한국소프트웨어 종합 학술 대회 2021, pp.1-3
Conference
2021 A Study on Asymmetric Blockchain Systems   임종철   한국통신학회 종합 학술 대회 (추계) 2021, pp.196-197
Conference
2021 A Study on High-speed Synchronization of the PON-based Blockchain   김동오   한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321
Journal
2021 Blockchain distributed consensus technology trend   진희상   전자공학회지, v.48, no.5, pp.63-74
Journal
2020 Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm   김영창   산업경영시스템학회지, v.43, no.4, pp.168-177
Journal
2020 Algorithm based on Byzantine Agreement among Decentralized Agents (BADA)   Jintae Oh   ETRI Journal, v.42, no.6, pp.872-885 1
Journal
2018 Past, Present and Future of Blockchain Technology   박정숙   전자통신동향분석, v.33, no.6, pp.139-153
Journal
2018 Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items   김도균  산업경영시스템학회지, v.41, no.4, pp.179-188
Journal
2016 Trends of Artificial Intelligence Technology and Policy   윤장우   전자통신동향분석, v.31, no.2, pp.9-17
Journal
2016 Detecting Weak Signal of Emerging Technologies   최수길   전자통신동향분석, v.31, no.2, pp.18-27
Conference
2016 Performance Analysis and Implementation of a DVB-C2 Transceiver   Jaeho Lee   International Conference on Advanced Communication Technology (ICACT) 2016, pp.612-616 1
Conference
2015 A Study on Reducing Spectrum Edge of OFDM Signal   Jaeho LEE   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.874-876
Conference
2015 A Channel Allocation Method for IEEE802.19.1 Coexistence Service to Mitigate Interferences among Heterogeneous Wireless Networks   Hyunduk Kang   International Conference on Ubiquitous and Future Networks (ICUFN) 2015, pp.778-783 1
Conference
2014 A Study on Video Recognition and Representation Service based on Smart Glass   김귀훈   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.1191-1194
Conference
2014 Flying Screen with Cooperative Flocking Quad-Rotors   Jinkyeong Kim   International Conference on Convergence Content (ICCC) 2014, pp.373-374
Conference
2014 Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images   Sang-Kwang Lee   International Conference on Convergence Content (ICCC) 2014, pp.371-372
Conference
2013 Heterogeneous Information Network for Person Recognition   Hye-Jin Kim   International Conference on Ubiquitous Robots and Ambient Intelligence (URAI) 2013, pp.723-724 0
Conference
2013 Reversible Data Hiding Based on the Histogram Modification Using a Rotated Difference Image   이상광   대한전자공학회 종합 학술 대회 (하계) 2013, pp.923-925
Journal
2013 The Design of Vulnerability Management System   GeonLyang Kim   International Journal of Computer Science and Network Security, v.13, no.4, pp.19-25
Conference
2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Yang-seo Choi   International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 12
Conference
2012 Defense against TCP Flooding Attack   Seungyong Yoon   International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 1
Conference
2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   김병구   한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Conference
2011 Timeslot Monitoring Model for Application Layer DDoS Attack Detection   Y.S. Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679
Conference
2011 Design and Implementation of ALADDIN System   윤승용   한국정보처리학회 학술 발표 (추계) 2011, pp.992-995
Conference
2011 Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource   Dae Won Kim   International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145
Conference
2011 Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File   김대원   한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944
Conference
2011 SVM based Packed Executable File Detection by PE File Header Analysis   최양서   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Journal
2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   김병구   정보보호학회논문지, v.21, no.2, pp.119-129
Journal
2011 A Novel Application-Layer DDoS Attack Detection Algorithm based on Client Intention   오진태   정보보호학회논문지, v.21, no.1, pp.39-52
Conference
2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Dae Won Kim   International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1
Conference
2010 Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention   Yang-Seo Choi   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 27
Journal
2009 Research on Distributed Denial of Service Attack Response Infrastructure   최양서   정보보호학회지, v.19, no.5, pp.11-20
Journal
2009 Polymorphic Worm Detection Using A Fast Static Analysis Approach   오진태   정보보호학회논문지, v.19, no.4, pp.29-39
Conference
2009 A Study on the PE File Header Analysis Technique for Packed PE File Detection   최양서   한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-4
Conference
2009 Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks   Young Jun Heo   International Conference on Security and Cryptography (SECRYPT) 2009, pp.1-4
Conference
2009 Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection   Byoung Koo Kim   International Conference on Security and Management (SAM) 2009, pp.1-6
Conference
2009 Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme   Seung Yong Yoon   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Dae Won Kim   International Conference on Communications (ICC) 2009, pp.1-6 0
Conference
2009 Optimal Position Searching for Automated Malware Signature Generation   Yang Seo Choi   International Symposium on Consumer Electronics (ISCE) 2009, pp.561-564 0
Conference
2009 Entropy based Signature Extraction Position Searching for PE file   최양서   통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4
Journal
2009 Encoded Executable File Detection Technique Via Executable File Header Analysis   Yang Seo Choi   International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Journal
2009 Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection   Byoung Koo Kim   International Journal of Computers, v.3, no.1, pp.115-124
Conference
2008 An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware   Byoung Koo Kim   International Conference on Applied Computer Science (ACS) 2008, pp.199-204
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Journal
2008 H/W based Stateful Packet Inspection using a Novel Session Architecture   Seung Yong Yoon   International Journal of Computers, v.3, no.2, pp.310-319
Conference
2008 Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Applied Computer Science (ACS) 2008, pp.1-6
Conference
2008 PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)   Yang-Seo Choi   International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 39
Conference
2008 Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets   Ryan Iwahashi  International Conference on Information Security (ISC) 2008 (LNCS 5222), v.5222, pp.114-130 4
Journal
2008 제로 데이 어택 방지를 위한 실시간 대응 기술   오진태   인터넷정보학회지, v.9, no.3, pp.25-31
Journal
2008 Tracing Stored Program Counter to Detect Polymorphic Shellcode   Dae Won Kim   IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 3
Journal
2008 Technology and Standardization Trend of Security Information Sharing   정일안   전자통신동향분석, v.23, no.4, pp.30-38
Conference
2008 Fast Static Analysis Method to Detect Polymorphic Worm   김대원   한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232
Journal
2008 Executable Code Recognition in Network Flows Using Instruction Transition Probabilities   Ik Kyun Kim   IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 2
Conference
2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Dae Won Kim   International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3
Journal
2008 PE Header Characteristics Analysis Technique for Malware Detection   최양서   정보보안논문지, v.8, no.2, pp.63-70
Journal
2008 A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System   Jin Tae Oh   International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162
Journal
2008 The Recent Trends of Polymorphic Shellcodes Detection Technologies   김대원   전자통신동향분석, v.23, no.1, pp.145-152
Journal
2008 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트(NoAH 와 ZASMIN 프로젝트)   김대원   주간기술동향, v.알수없음, no.1329, pp.1-12
Journal
2007 Zero-day 공격 대응을 위한 네트워크 보안의 지능화 기술   정일안   정보와 통신 : 한국통신학회지, v.24, no.11, pp.14-24
Conference
2007 High Performance Session State Management Scheme for Stateful Packet Inspection   Seung Yong Yoon   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 6
Conference
2007 ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response   Byoung Koo Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 0
Conference
2007 A Practical Approach for Detecting Executable Codes in Network Traffic   Ik Kyun Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 1
Journal
2007 Detection of DDoS and IDS Evasion Attacks in a High-Speed Networks Environment   Sang-Kil Park   International Journal of Computer Science and Network Security, v.7, no.6, pp.124-131
Journal
2007 Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System   Jin-Tae Oh   International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117
Conference
2007 Memory-Efficient Content Filtering Hardware for High-Speed Intrusion Detection System   Sung Won Yi   Symposium on Applied Computing (SAC) 2007, pp.264-269 15
Journal
2007 High-Performance Intrusion Detection Technology in FPGA-Based Reconfiguring Hardware   김병구   전자통신동향분석, v.22, no.1, pp.51-58
Conference
2007 High-Speed Concurrent Attack Responding System using FPGA Supporting IPv4/IPv6   Sang-Kil Park   International Conference on Advanced Communication Technology (ICACT) 2007, pp.1252-1257 0
Conference
2006 High-Performance SPI-based Intrusion Detection Engine   오진태   차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-5
Journal
2006 데이터베이스 보안 기술 동향   이호균   주간기술동향, v.알수없음, no.1273, pp.1-14
Conference
2006 High-Performance Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 4
Conference
2006 Design and Implementation of High-Performance Security Gateway System   Seung Yong Yoon   Joint Workshop on Information Security (JWIS) 2006, pp.1-15
Conference
2006 FPGA Based Intrusion Detection System Against Unknown and Known Attacks   Dong Ho Kang   Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 3
Journal
2006 A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm   김익균   전자공학회논문지 TC, v.43, no.7, pp.93-103
Journal
2006 네트워크 보안을 위한 공격 분류법   김대원   주간기술동향, pp.1-13
Conference
2006 Hardware Supports for Network Traffic Anomaly Detection   Dae Won Kim   International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5
Conference
2006 Design and Implementation of FPGA Based High-Performance Intrusion Detection System   Byoung-Koo Kim   International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 4
Conference
2006 Design and Implementation of FPGA Based High-Performance Intrusion Detection System   Byoung Koo Kim   International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 4
Conference
2006 FPGA based Protocol Anomaly and Pattern Matching Detection System   Dong Ho Kang   International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10
Conference
2006 High-Speed Attack Mitigation Engine by Packet Filtering and Rate-limiting using FPGA   Sang Kil Park   International Conference on Advanced Communication Technology (ICACT) 2006, pp.680-685 2
Conference
2006 Design of SPI Module in Large-Scale Network   Seung Yong Yoon   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1706-1711 0
Conference
2005 A study on the Selection of Continuous Network Features using Relative Entropy and Enhancement of Detection Efficiency   정일안   한국정보과학회 학술 발표 (하계) 2005, pp.1-4
Conference
2005 Network Traffic Entropy Analysis for Worm Detection   Young-Jun Heo   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.641-642
Conference
2005 The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks   오승희   한국해양정보통신학회 종합 학술 대회 (춘계) 2005, pp.848-851
Conference
2005 Reconfigurable Bandwidth Controller for Responding the DDoS Attacks using Token Bucket Mechanism   Sang Kil Park   International Conference on Advanced Communication Technology (ICACT) 2005, pp.377-380
Journal
2004 Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks   박상길   정보처리학회논문지 C, v.11, no.7, pp.951-958
Journal
2004 안전한 정보 통신 인프라용 고성능 침해 탐지 및 대응 기술   김기영   한국통신학회지, v.21, no.9, pp.48-57
Journal
2004 A Trend of Security Processor Technology   김기영   전자공학회지, v.31, no.8, pp.52-60
Conference
2004 Design and Implementation of Detection Engine Against IDS Evasion with Unicode   Dong Ho Kang   International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337