Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | EO-VLM: VLM-Guided Energy Overload Attacks on Vision Models Minjae Seo Annual Computer Security Applications Conference (ACSAC) 2024, pp.1-2 | ||
Journal
|
2023 | Random Number Generation in PoS Blockchain 임종철 한국통신학회논문지, v.48, no.3, pp.362-373 | 0 | |
Conference
|
2022 | Sizing Blockchain Committee using Variable Fraction of Byzantine Nodes 이창현 전자 정보 통신 학술 대회 (CEIC) 2022, pp.122-123 | ||
Journal
|
2022 | Understanding of Blockchain and Classic Consensus Algorithms 임종철 전자공학회지, v.49, no.12, pp.45-56 | ||
Conference
|
2021 | Monitoring Technology of PoN-based Blockchain 진희상 한국소프트웨어 종합 학술 대회 2021, pp.1-3 | ||
Journal
|
2021 | Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology 최진영 품질경영학회지, v.49, no.4, pp.527-537 | ||
Conference
|
2021 | A Study on Asymmetric Blockchain Systems 임종철 한국통신학회 종합 학술 대회 (추계) 2021, pp.196-197 | ||
Conference
|
2021 | A Study on High-speed Synchronization of the PON-based Blockchain 김동오 한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321 | ||
Journal
|
2021 | Blockchain distributed consensus technology trend 진희상 전자공학회지, v.48, no.5, pp.63-74 | ||
Journal
|
2020 | Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm 김영창 산업경영시스템학회지, v.43, no.4, pp.168-177 | ||
Journal
|
2020 | Algorithm based on Byzantine Agreement among Decentralized Agents (BADA) Jintae Oh ETRI Journal, v.42, no.6, pp.872-885 | 1 | |
Journal
|
2018 | Past, Present and Future of Blockchain Technology 박정숙 전자통신동향분석, v.33, no.6, pp.139-153 | ||
Journal
|
2018 | Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items 김도균 산업경영시스템학회지, v.41, no.4, pp.179-188 | ||
Journal
|
2016 | Detecting Weak Signal of Emerging Technologies 최수길 전자통신동향분석, v.31, no.2, pp.18-27 | ||
Journal
|
2016 | Trends of Artificial Intelligence Technology and Policy 윤장우 전자통신동향분석, v.31, no.2, pp.9-17 | ||
Conference
|
2016 | Performance Analysis and Implementation of a DVB-C2 Transceiver Jaeho Lee International Conference on Advanced Communication Technology (ICACT) 2016, pp.612-616 | 1 | |
Conference
|
2015 | A Study on Reducing Spectrum Edge of OFDM Signal Jaeho LEE International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.874-876 | ||
Conference
|
2015 | A Channel Allocation Method for IEEE802.19.1 Coexistence Service to Mitigate Interferences among Heterogeneous Wireless Networks Hyunduk Kang International Conference on Ubiquitous and Future Networks (ICUFN) 2015, pp.778-783 | 1 | |
Conference
|
2014 | A Study on Video Recognition and Representation Service based on Smart Glass 김귀훈 한국정보처리학회 학술 발표 대회 (추계) 2014, pp.1191-1194 | ||
Conference
|
2014 | Flying Screen with Cooperative Flocking Quad-Rotors Jinkyeong Kim International Conference on Convergence Content (ICCC) 2014, pp.373-374 | ||
Conference
|
2014 | Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images Sang-Kwang Lee International Conference on Convergence Content (ICCC) 2014, pp.371-372 | ||
Conference
|
2013 | Heterogeneous Information Network for Person Recognition Hye-Jin Kim International Conference on Ubiquitous Robots and Ambient Intelligence (URAI) 2013, pp.723-724 | 0 | |
Conference
|
2013 | Reversible Data Hiding Based on the Histogram Modification Using a Rotated Difference Image 이상광 대한전자공학회 종합 학술 대회 (하계) 2013, pp.923-925 | ||
Journal
|
2013 | The Design of Vulnerability Management System GeonLyang Kim International Journal of Computer Science and Network Security, v.13, no.4, pp.19-25 | ||
Conference
|
2012 | AIGG Threshold Based HTTP GET Flooding Attack Detection Yang-seo Choi International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 | 12 | |
Conference
|
2012 | Defense against TCP Flooding Attack Seungyong Yoon International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 | 1 | |
Conference
|
2011 | Timeslot Monitoring Model for Application Layer DDoS Attack Detection Y.S. Choi International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679 | ||
Conference
|
2011 | Design and Implementation of ALADDIN System 윤승용 한국정보처리학회 학술 발표 (추계) 2011, pp.992-995 | ||
Conference
|
2011 | Design and Implementation of Secure-NIC System for DDoS Attack Response 김병구 한국정보처리학회 학술 발표 (추계) 2011, pp.996-998 | ||
Conference
|
2011 | Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource Dae Won Kim International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145 | ||
Conference
|
2011 | Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File 김대원 한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944 | ||
Journal
|
2011 | Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card 김병구 정보보호학회논문지, v.21, no.2, pp.119-129 | ||
Conference
|
2011 | SVM based Packed Executable File Detection by PE File Header Analysis 최양서 통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 | ||
Journal
|
2011 | A Novel Application-Layer DDoS Attack Detection Algorithm based on Client Intention 오진태 정보보호학회논문지, v.21, no.1, pp.39-52 | ||
Conference
|
2010 | Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File Dae Won Kim International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 | 1 | |
Conference
|
2010 | Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention Yang-Seo Choi International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 | 27 | |
Journal
|
2009 | Research on Distributed Denial of Service Attack Response Infrastructure 최양서 정보보호학회지, v.19, no.5, pp.11-20 | ||
Journal
|
2009 | Polymorphic Worm Detection Using A Fast Static Analysis Approach 오진태 정보보호학회논문지, v.19, no.4, pp.29-39 | ||
Conference
|
2009 | Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme Seung Yong Yoon International Conference on Security and Management (SAM) 2009, pp.1-5 | ||
Conference
|
2009 | Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks Young Jun Heo International Conference on Security and Cryptography (SECRYPT) 2009, pp.1-4 | ||
Conference
|
2009 | Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection Byoung Koo Kim International Conference on Security and Management (SAM) 2009, pp.1-6 | ||
Conference
|
2009 | A Study on the PE File Header Analysis Technique for Packed PE File Detection 최양서 한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-4 | ||
Conference
|
2009 | Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique Dae Won Kim International Conference on Communications (ICC) 2009, pp.1-6 | 0 | |
Conference
|
2009 | Optimal Position Searching for Automated Malware Signature Generation Yang Seo Choi International Symposium on Consumer Electronics (ISCE) 2009, pp.561-564 | 0 | |
Journal
|
2009 | Encoded Executable File Detection Technique Via Executable File Header Analysis Yang Seo Choi International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36 | ||
Conference
|
2009 | Entropy based Signature Extraction Position Searching for PE file 최양서 통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4 | ||
Journal
|
2009 | Validation Methods of Suspicious Network Flows for Unknown Attack Detection Ik Kyun Kim International Journal of Computers, v.1, no.3, pp.104-114 | ||
Conference
|
2009 | A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment Ik Kyun Kim International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 | ||
Journal
|
2009 | Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection Byoung Koo Kim International Journal of Computers, v.3, no.1, pp.115-124 | ||
Conference
|
2008 | An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware Byoung Koo Kim International Conference on Applied Computer Science (ACS) 2008, pp.199-204 | ||
Conference
|
2008 | Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System Seung Yong Yoon International Conference on Applied Computer Science (ACS) 2008, pp.1-6 | ||
Journal
|
2008 | H/W based Stateful Packet Inspection using a Novel Session Architecture Seung Yong Yoon International Journal of Computers, v.3, no.2, pp.310-319 | ||
Conference
|
2008 | An Architecture of Unknown Attack Detection System against Zero-day Worm Ik Kyun Kim International Conference on Applied Computer Science (ACS) 2008, pp.205-211 | ||
Conference
|
2008 | PE File Header Analysis-Based Packed PE File Detection Technique (PHAD) Yang-Seo Choi International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 | 40 | |
Journal
|
2008 | 제로 데이 어택 방지를 위한 실시간 대응 기술 오진태 인터넷정보학회지, v.9, no.3, pp.25-31 | ||
Conference
|
2008 | Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets Ryan Iwahashi International Conference on Information Security (ISC) 2008 (LNCS 5222), v.5222, pp.114-130 | 4 | |
Journal
|
2008 | Tracing Stored Program Counter to Detect Polymorphic Shellcode Dae Won Kim IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 | 3 | |
Journal
|
2008 | Technology and Standardization Trend of Security Information Sharing 정일안 전자통신동향분석, v.23, no.4, pp.30-38 | ||
Conference
|
2008 | Function Call Mechanism Based Executable Code Detection for the Network Security Dae Won Kim International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 | 3 | |
Journal
|
2008 | Executable Code Recognition in Network Flows Using Instruction Transition Probabilities Ik Kyun Kim IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 | 2 | |
Conference
|
2008 | Fast Static Analysis Method to Detect Polymorphic Worm 김대원 한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232 | ||
Journal
|
2008 | PE Header Characteristics Analysis Technique for Malware Detection 최양서 정보보안논문지, v.8, no.2, pp.63-70 | ||
Journal
|
2008 | A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System Jin Tae Oh International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162 | ||
Journal
|
2008 | The Recent Trends of Polymorphic Shellcodes Detection Technologies 김대원 전자통신동향분석, v.23, no.1, pp.145-152 | ||
Journal
|
2008 | 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트 김대원 주간기술동향, v.1329, pp.1-12 | ||
Journal
|
2007 | Zero-day 공격 대응을 위한 네트워크 보안의 지능화 기술 정일안 정보와 통신 : 한국통신학회지, v.24, no.11, pp.14-24 | ||
Conference
|
2007 | High Performance Session State Management Scheme for Stateful Packet Inspection Seung Yong Yoon Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 | 6 | |
Conference
|
2007 | A Practical Approach for Detecting Executable Codes in Network Traffic Ik Kyun Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 | 1 | |
Conference
|
2007 | ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response Byoung Koo Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 | 0 | |
Journal
|
2007 | Detection of DDoS and IDS Evasion Attacks in a High-Speed Networks Environment Sang-Kil Park International Journal of Computer Science and Network Security, v.7, no.6, pp.124-131 | ||
Journal
|
2007 | Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System Jin-Tae Oh International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117 | ||
Conference
|
2007 | Memory-efficient content filtering hardware for high-speed intrusion detection systems Sung Won Yi Symposium on Applied Computing (SAC) 2007, pp.264-269 | 15 | |
Conference
|
2007 | High-Speed Concurrent Attack Responding System using FPGA Supporting IPv4/IPv6 Sang-Kil Park International Conference on Advanced Communication Technology (ICACT) 2007, pp.1252-1257 | 0 | |
Journal
|
2007 | High-Performance Intrusion Detection Technology in FPGA-Based Reconfiguring Hardware 김병구 전자통신동향분석, v.22, no.1, pp.51-58 | ||
Conference
|
2006 | High-Performance SPI-based Intrusion Detection Engine 오진태 차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-5 | ||
Journal
|
2006 | 데이터베이스 보안 기술 동향 이호균 주간기술동향, v.1273, pp.1-14 | ||
Conference
|
2006 | High-Performance Stateful Intrusion Detection System Seung Yong Yoon International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 | 4 | |
Conference
|
2006 | Design and Implementation of High-Performance Security Gateway System Seung Yong Yoon Joint Workshop on Information Security (JWIS) 2006, pp.1-15 | ||
Conference
|
2006 | FPGA Based Intrusion Detection System Against Unknown and Known Attacks Dong Ho Kang Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 | 3 | |
Journal
|
2006 | A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm 김익균 전자공학회논문지 TC, v.43, no.7, pp.93-103 | ||
Conference
|
2006 | Hardware Supports for Network Traffic Anomaly Detection Dae Won Kim International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5 | ||
Journal
|
2006 | 네트워크 보안을 위한 공격 분류법 김대원 주간기술동향, v.1249, pp.1-13 | ||
Conference
|
2006 | Computational Science and Its Applications - ICCSA 2006 Dong Ho Kang International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10 | ||
Conference
|
2006 | Design and Implementation of FPGA Based High-Performance Intrusion Detection System Byoung Koo Kim International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 | 4 | |
Conference
|
2006 | Design of SPI Module in Large-Scale Network Seung Yong Yoon International Conference on Advanced Communication Technology (ICACT) 2006, pp.1706-1711 | 0 | |
Conference
|
2006 | High-Speed Attack Mitigation Engine by Packet Filtering and Rate-limiting using FPGA Sang Kil Park International Conference on Advanced Communication Technology (ICACT) 2006, pp.680-685 | 2 | |
Conference
|
2005 | Network Traffic Entropy Analysis for Worm Detection Young-Jun Heo International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.641-642 | ||
Conference
|
2005 | A study on the Selection of Continuous Network Features using Relative Entropy and Enhancement of Detection Efficiency 정일안 한국정보과학회 학술 발표 (하계) 2005, pp.1-4 | ||
Conference
|
2005 | The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks 오승희 한국해양정보통신학회 종합 학술 대회 (춘계) 2005, pp.848-851 | ||
Conference
|
2005 | Reconfigurable Bandwidth Controller for Responding the DDoS Attacks using Token Bucket Mechanism Sang Kil Park International Conference on Advanced Communication Technology (ICACT) 2005, pp.377-380 | ||
Journal
|
2004 | Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks 박상길 정보처리학회논문지 C, v.11, no.7, pp.951-958 | ||
Journal
|
2004 | 안전한 정보 통신 인프라용 고성능 침해 탐지 및 대응 기술 김기영 한국통신학회지, v.21, no.9, pp.48-57 | ||
Journal
|
2004 | A Trend of Security Processor Technology 김기영 전자공학회지, v.31, no.8, pp.52-60 | ||
Conference
|
2004 | Design and Implementation of Detection Engine Against IDS Evasion with Unicode Dong Ho Kang International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 |