Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | A Study on Training a Time-series Neural Network for Predicting Mask ROM Firmware Restoration 김대원 한국 인공지능 학술대회 2024, pp.210-211 | ||
Conference
|
2024 | An Analysis of Physical Features for Constructing Neural Network Training Data for Mask ROM Restoration 김대원 한국통신학회 종합 학술 발표회 (하계) 2024, pp.1956-1957 | ||
Conference
|
2023 | Research on Automated Binary Restoration of Firmware Bit Information on Mask ROM 김대원 한국 인공지능 학술대회 2023, pp.384-385 | ||
Conference
|
2016 | A Design of Unidirectional Security Gateway for Enforcement Reliability and Security of Transmission Data in Industrial Control Systems Youngjun Heo International Conference on Advanced Communication Technology (ICACT) 2016, pp.310-313 | 11 | |
Conference
|
2016 | A Design of Unidirectional Security Gateway for Enforcement Security and Reliability of Transfer Data 허영준 한국통신학회 종합 학술 발표회 (동계) 2016, pp.827-828 | ||
Conference
|
2016 | Abnormal Traffic Filtering Mechanism for Protecting ICS Networks Byoung-Koo Kim International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 | 7 | |
Conference
|
2014 | Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning Byoung-Koo Kim International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.121-126 | 9 | |
Journal
|
2014 | Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks DongHo Kang Journal of Applied Mathematics, v.2014, pp.1-7 | 13 | |
Conference
|
2014 | Cyber Threats and Defence Approaches in SCADA systems Dong-Ho Kang International Conference on Advanced Communication Technology (ICACT) 2014, pp.324-327 | 17 | |
Conference
|
2014 | Design of Industrial Firewall System based on Multiple Access Control Filter Byoungkoo Kim International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 | 1 | |
Conference
|
2014 | Whitelist Generation Technique for Industrial Firewall in SCADA Networks Dong-Ho Kang International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.525-534 | 4 | |
Journal
|
2012 | Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process : focus on Information Security 강구홍 정보보호학회논문지, v.22, no.3, pp.553-564 | ||
Journal
|
2012 | Utilization of Physical Security Events for the Converged Security Using Analytic Hierarchy Process : Focus on Information Security 강구홍 정보보호학회논문지, v.22, no.3, pp.553-564 | ||
Journal
|
2012 | A Rule Based Event Correlation Approach for Physical and Logical Security Convergence Dongho Kang International Journal of Computer Science and Network Security, v.12, no.1, pp.28-31 | ||
Journal
|
2010 | Smartphone Threats and Security Technology 강동호 전자통신동향분석, v.25, no.3, pp.72-80 | ||
Journal
|
2010 | 모바일 보안 위협 및 보안 서비스 기술 동향 강동호 정보과학회지, v.28, no.6, pp.51-56 | ||
Journal
|
2010 | 모바일 인터넷 및 스마트폰 보안 기술 김기영 OSIA Standards & Technology Review, v.38, no.1, pp.62-71 | ||
Conference
|
2009 | Hardware Based Data Inspection for USB Data Leakage Prevention Dong Ho Kang Communications in Computer and Information Science (CCIS) 2009, pp.57-63 | 1 | |
Journal
|
2009 | 개방형 모바일 환경에서 스마트폰 보안기술 김기영 정보보호학회지, v.19, no.5, pp.21-28 | ||
Conference
|
2009 | USB Data Leakage Prevention Using Hardware based Data Inspection Technique Dong Ho Kang International Conference on Security and Management (SAM) 2009, pp.1-5 | ||
Conference
|
2007 | A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles Won Joo Park International Conference on Information Security and Privacy (ISP) 2007, pp.1-5 | ||
Journal
|
2007 | Recent Trends in Research and Technology of Secure Execution Environment 백광호 전자통신동향분석, v.22, no.5, pp.152-158 | ||
Conference
|
2007 | FPGA based light-weight Security Gateway System Dong-Ho Kang International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387 | ||
Conference
|
2006 | Design and Implementation of High-Performance Security Gateway System Seung Yong Yoon Joint Workshop on Information Security (JWIS) 2006, pp.1-15 | ||
Conference
|
2006 | FPGA Based Intrusion Detection System Against Unknown and Known Attacks Dong Ho Kang Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 | 3 | |
Conference
|
2006 | Computational Science and Its Applications - ICCSA 2006 Dong Ho Kang International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10 | ||
Conference
|
2004 | Design and Implementation of Detection Engine Against IDS Evasion with Unicode Dong Ho Kang International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 | ||
Conference
|
2003 | IP based Traceback technology Using Packet Marking 강동호 한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.2141-2144 | ||
Conference
|
2002 | Design for Network based Real Time Traceback System 최양서 통신 정보 합동 학술 대회 (JCCI) 2002, pp.50-50 | ||
Conference
|
2001 | Design and Implementation of Network Trouble Ticket System 강동호 통신 정보 합동 학술 대회 (JCCI) 2001, pp.671-674 |