Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2023 | A Design and Implementation of a Platform for Generating On-Demand Training Datasets Jooyoung Lee International Conference on Communication and Computer Research (ICCR) 2023, pp.1-3 | ||
Journal
|
2022 | Survey on Artificial Intelligence & Machine Learning Models and Datasets for Network Intelligence 이주영 한국통신학회논문지, v.47, no.4, pp.625-643 | 2 | |
Journal
|
2020 | Technological Trends in Cyber Attack Simulations 이주영 전자통신동향분석, v.35, no.1, pp.34-48 | ||
Journal
|
2019 | A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph Jooyoung Lee Journal of Supercomputing, v.75, no.6, pp.3028-3045 | 15 | |
Conference
|
2016 | Network Signature Clustering 최선오 한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264 | ||
Journal
|
2016 | PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording Seon-Ho Shin IEEE Network, v.30, no.6, pp.42-48 | 5 | |
Conference
|
2016 | Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim International Conference on Security Technology (SecTech) 2016, pp.354-359 | ||
Conference
|
2016 | Network Abnormal Behavior Analysis System 최선오 한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190 | ||
Conference
|
2016 | Traffic Storing and Related Information Generation System for Cyber Attack Analysis Yangseo Choi International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 | 1 | |
Conference
|
2016 | A Forensically Robust Data Acquisition from a 10G Line-rate Network Jooyoung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 | 0 | |
Conference
|
2016 | Hierarchical Network Signature Clustering and Generation Sunoh Choi International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 | 2 | |
Journal
|
2016 | Hash Table with Expanded-Key for High-Speed Networking Seon-Ho SHIN IEICE Transactions on Information and Systems, v.E99.D, no.3, pp.747-750 | 1 | |
Conference
|
2016 | Introduction to a Network Forensics System for Cyber Incidents Analysis Yangseo Choi International Conference on Advanced Communication Technology (ICACT) 2016, pp.50-55 | 4 | |
Conference
|
2015 | Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack Jong-Hyun Kim SRI Security Congress 2015, pp.104-110 | ||
Conference
|
2015 | A Cyber Blackbox for Collecting Network Evidence Jooyoung Lee SRI Security Congress 2015, pp.141-147 | ||
Conference
|
2015 | Transmitted File Extraction and Reconstruction from Network Packets Yangseo Choi World Congress on Internet Security (WorldCIS) 2015, pp.164-165 | 1 | |
Journal
|
2015 | 10Gbps Network Traffic Capture and Runtime Indexing 최선오 전자통신동향분석, v.30, no.4, pp.181-190 | ||
Conference
|
2015 | Performance Comparison of Relational Databases and Columnar Databases for Fast Search of 10Gbps Network Flows 최선오 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1538-1539 | ||
Conference
|
2015 | A Study on the Network Data with a Cyber Black System 이주영 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1595-1596 | ||
Conference
|
2015 | Design and Implementation of Network Forensic System for 2Gbps Network Traffic 최양서 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1597-1598 | ||
Conference
|
2014 | Attack Cause Analysis Algorithm using Cyber BlackBox 최선오 한국정보처리학회 학술 발표 대회 (추계) 2014, pp.392-394 | ||
Conference
|
2014 | Cyber Incident Forensics as a Forward Lean Security Jooyoung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.872-873 | 1 | |
Conference
|
2014 | Proposal of A Forensic Framework for Cyber Incident Investigation 이주영 정보 및 제어 학술 대회 (CICS) 2014, pp.449-451 | ||
Conference
|
2013 | Cyber Incident Forensics 이주영 디지털 포렌식 기술 워크샵 2013, pp.125-130 | ||
Conference
|
2012 | Digital Forensics as a Service : A Case Study of Forensic Indexed Search Jooyoung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.499-503 | 20 | |
Journal
|
2012 | A Study on Digital Forensics of Social Media Data 길연희 포렌식논문지, v.2, no.1 | ||
Conference
|
2012 | Social Media Data Analysis for Digital Evidence 길연희 한국포렌식학회 학술 대회 (춘계) 2012, pp.1-2 | ||
Conference
|
2011 | Pervasive Forensic Analysis based on Mobile Cloud Computing Joo Young Lee International Conference on Multimedia Information Networking and Security (MINES) 2011, pp.573-577 | 28 | |
Conference
|
2010 | New Paradigm of Digital Forensics: Forensic Cloud 이주영 디지털포렌식 기술 워크샵 2010, pp.101-107 | ||
Conference
|
2009 | Index based Search System for Digital Forensics 이주영 디지털 포렌식 기술 워크샵 2009, pp.37-43 | ||
Conference
|
2009 | Improving Performance in Digital Forensics : A Case using Pattern Matching Board Joo Young Lee International Conference on Availability, Reliability and Security (ARES) 2009, pp.1001-1005 | 3 | |
Journal
|
2008 | High Speed Search Using Tarari Content Processor in Digital Forensics 이주영 디지털포렌식연구, v.3, pp.1-11 | ||
Conference
|
2008 | Index Search Technique for Digital Forensic System 조수형 안티포렌식 대응 기술 워크샵 2008, pp.1-4 | ||
Conference
|
2008 | High-speed Search using Tarari Content Processor in Digital Forensics Joo Young Lee Digital Forensic Research Workshop (DFRWS) 2008, pp.S91-S95 | 9 | |
Conference
|
2008 | Proposal for Efficient Searching and Presentation in Digital Forensics Joo Young Lee International Conference on Availability, Reliability and Security (ARES) 2008, pp.1377-1381 | 8 | |
Conference
|
2008 | High Speed Search for Large-Scale Digital Forensic Investigation Hyung Keun Jee International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics) 2008, pp.1-4 | ||
Conference
|
2007 | 디지털 포렌식 시스템을 위한 고속 검색 Hyungkeun Jee CESSE 2007, pp.1130-1133 | ||
Conference
|
2006 | A Framework for Ensuring Security in Ubiquitous Computing Environment Based on Security Engineering Approach HoWon Kim International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.1250-1258 | 0 | |
Conference
|
2006 | Practical Privacy Protection Mechanism for Networked RFID Environment Joo Young Lee International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.1-12 | ||
Conference
|
2006 | A Layered Approach to Design of Light-Weight Middleware Systems for Mobile RFID Security (SMRM: Secure Mobile RFID Middleware System) Nam Je Park Network Operations and Management Symposium (NOMS) 2006, pp.1-4 | 1 | |
Conference
|
2005 | Building secure agents on the semantic web Joo-Young Lee International Conference on Advanced Communication Technology (ICACT) 2005, pp.386-389 | ||
Journal
|
2005 | Standardization and Market Trends of Web Services Security Technologies 김주한 전자통신동향분석, v.20, no.1, pp.43-53 | ||
Journal
|
2002 | Development of the XML Security Platform for E-Commerce 문기영 전자통신동향분석, v.17, no.6, pp.29-38 | ||
Conference
|
2001 | Implementation of RSA Algorithm Based on JavaCard 김성준 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.839-842 | ||
Journal
|
2001 | Implementing the ESES for Secure Electronic Commerce Platform 이주영 정보처리학회논문지 C, v.8C, no.5, pp.551-556 | ||
Conference
|
2001 | ESES/j-Crypto and its application Joo-Young Lee International Symposium on Industrial Electronics (ISIE) 2001, pp.1373-1377 |