|
Conference
|
2024 |
EO-VLM: VLM-Guided Energy Overload Attacks on Vision Models
Minjae Seo
Annual Computer Security Applications Conference (ACSAC) 2024, pp.1-2 |
|
|
|
Journal
|
2023 |
Random Number Generation in PoS Blockchain
임종철
한국통신학회논문지, v.48, no.3, pp.362-373 |
0 |
|
|
Conference
|
2022 |
Sizing Blockchain Committee using Variable Fraction of Byzantine Nodes
이창현
전자 정보 통신 학술 대회 (CEIC) 2022, pp.122-123 |
|
|
|
Journal
|
2022 |
Understanding of Blockchain and Classic Consensus Algorithms
임종철
전자공학회지, v.49, no.12, pp.45-56 |
|
|
|
Journal
|
2021 |
Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology
최진영
품질경영학회지, v.49, no.4, pp.527-537 |
|
|
|
Conference
|
2021 |
Monitoring Technology of PoN-based Blockchain
진희상
한국소프트웨어 종합 학술 대회 2021, pp.1-3 |
|
|
|
Conference
|
2021 |
A Study on Asymmetric Blockchain Systems
임종철
한국통신학회 종합 학술 대회 (추계) 2021, pp.196-197 |
|
|
|
Conference
|
2021 |
A Study on High-speed Synchronization of the PON-based Blockchain
김동오
한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321 |
|
|
|
Journal
|
2021 |
Blockchain distributed consensus technology trend
진희상
전자공학회지, v.48, no.5, pp.63-74 |
|
|
|
Journal
|
2020 |
Algorithm based on Byzantine Agreement among Decentralized Agents (BADA)
Jintae Oh
ETRI Journal, v.42, no.6, pp.872-885 |
3 |
|
|
Journal
|
2020 |
Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm
김영창
산업경영시스템학회지, v.43, no.4, pp.168-177 |
|
|
|
Journal
|
2018 |
Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items
김도균
산업경영시스템학회지, v.41, no.4, pp.179-188 |
|
|
|
Journal
|
2018 |
Past, Present and Future of Blockchain Technology
박정숙
전자통신동향분석, v.33, no.6, pp.139-153 |
|
|
|
Journal
|
2016 |
Trends of Artificial Intelligence Technology and Policy
윤장우
전자통신동향분석, v.31, no.2, pp.9-17 |
|
|
|
Journal
|
2016 |
Detecting Weak Signal of Emerging Technologies
최수길
전자통신동향분석, v.31, no.2, pp.18-27 |
|
|
|
Conference
|
2016 |
Performance Analysis and Implementation of a DVB-C2 Transceiver
Jaeho Lee
International Conference on Advanced Communication Technology (ICACT) 2016, pp.612-616 |
1 |
|
|
Conference
|
2015 |
A Study on Reducing Spectrum Edge of OFDM Signal
Jaeho LEE
International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.874-876 |
|
|
|
Conference
|
2015 |
A Channel Allocation Method for IEEE802.19.1 Coexistence Service to Mitigate Interferences among Heterogeneous Wireless Networks
Hyunduk Kang
International Conference on Ubiquitous and Future Networks (ICUFN) 2015, pp.778-783 |
1 |
|
|
Conference
|
2014 |
A Study on Video Recognition and Representation Service based on Smart Glass
김귀훈
한국정보처리학회 학술 발표 대회 (추계) 2014, pp.1191-1194 |
|
|
|
Conference
|
2014 |
Flying Screen with Cooperative Flocking Quad-Rotors
Jinkyeong Kim
International Conference on Convergence Content (ICCC) 2014, pp.373-374 |
|
|
|
Conference
|
2014 |
Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images
Sang-Kwang Lee
International Conference on Convergence Content (ICCC) 2014, pp.371-372 |
|
|
|
Conference
|
2013 |
Heterogeneous Information Network for Person Recognition
Hye-Jin Kim
International Conference on Ubiquitous Robots and Ambient Intelligence (URAI) 2013, pp.723-724 |
0 |
|
|
Conference
|
2013 |
Reversible Data Hiding Based on the Histogram Modification Using a Rotated Difference Image
이상광
대한전자공학회 종합 학술 대회 (하계) 2013, pp.923-925 |
|
|
|
Journal
|
2013 |
The Design of Vulnerability Management System
GeonLyang Kim
International Journal of Computer Science and Network Security, v.13, no.4, pp.19-25 |
|
|
|
Conference
|
2012 |
AIGG Threshold Based HTTP GET Flooding Attack Detection
Yang-seo Choi
International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 |
14 |
|
|
Conference
|
2012 |
Defense against TCP Flooding Attack
Seungyong Yoon
International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 |
1 |
|
|
Conference
|
2011 |
Design and Implementation of ALADDIN System
윤승용
한국정보처리학회 학술 발표 (추계) 2011, pp.992-995 |
|
|
|
Conference
|
2011 |
Timeslot Monitoring Model for Application Layer DDoS Attack Detection
Y.S. Choi
International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679 |
|
|
|
Conference
|
2011 |
Design and Implementation of Secure-NIC System for DDoS Attack Response
김병구
한국정보처리학회 학술 발표 (추계) 2011, pp.996-998 |
|
|
|
Conference
|
2011 |
Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource
Dae Won Kim
International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145 |
|
|
|
Conference
|
2011 |
Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File
김대원
한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944 |
|
|
|
Conference
|
2011 |
SVM based Packed Executable File Detection by PE File Header Analysis
최양서
통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 |
|
|
|
Journal
|
2011 |
Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card
김병구
정보보호학회논문지, v.21, no.2, pp.119-129 |
|
|
|
Journal
|
2011 |
A Novel Application-Layer DDoS Attack Detection Algorithm based on Client Intention
오진태
정보보호학회논문지, v.21, no.1, pp.39-52 |
|
|
|
Conference
|
2010 |
Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File
Dae Won Kim
International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 |
1 |
|
|
Conference
|
2010 |
Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention
Yang-Seo Choi
International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 |
27 |
|
|
Journal
|
2009 |
Research on Distributed Denial of Service Attack Response Infrastructure
최양서
정보보호학회지, v.19, no.5, pp.11-20 |
|
|
|
Journal
|
2009 |
Polymorphic Worm Detection Using A Fast Static Analysis Approach
오진태
정보보호학회논문지, v.19, no.4, pp.29-39 |
|
|
|
Conference
|
2009 |
Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection
Byoung Koo Kim
International Conference on Security and Management (SAM) 2009, pp.1-6 |
|
|
|
Conference
|
2009 |
A Study on the PE File Header Analysis Technique for Packed PE File Detection
최양서
한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-4 |
|
|
|
Conference
|
2009 |
Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks
Young Jun Heo
International Conference on Security and Cryptography (SECRYPT) 2009, pp.1-4 |
|
|
|
Conference
|
2009 |
Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme
Seung Yong Yoon
International Conference on Security and Management (SAM) 2009, pp.1-5 |
|
|
|
Conference
|
2009 |
Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique
Dae Won Kim
International Conference on Communications (ICC) 2009, pp.1-6 |
0 |
|
|
Conference
|
2009 |
Optimal Position Searching for Automated Malware Signature Generation
Yang Seo Choi
International Symposium on Consumer Electronics (ISCE) 2009, pp.561-564 |
0 |
|
|
Conference
|
2009 |
Entropy based Signature Extraction Position Searching for PE file
최양서
통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4 |
|
|
|
Journal
|
2009 |
Encoded Executable File Detection Technique Via Executable File Header Analysis
Yang Seo Choi
International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36 |
|
|
|
Journal
|
2009 |
Validation Methods of Suspicious Network Flows for Unknown Attack Detection
Ik Kyun Kim
International Journal of Computers, v.1, no.3, pp.104-114 |
|
|
|
Conference
|
2009 |
A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment
Ik Kyun Kim
International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 |
|
|
|
Journal
|
2009 |
Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection
Byoung Koo Kim
International Journal of Computers, v.3, no.1, pp.115-124 |
|
|
|
Conference
|
2008 |
An Architecture of Unknown Attack Detection System against Zero-day Worm
Ik Kyun Kim
International Conference on Applied Computer Science (ACS) 2008, pp.205-211 |
|
|