ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Dong Ho Kang
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 A Study on Training a Time-series Neural Network for Predicting Mask ROM Firmware Restoration   김대원   한국 인공지능 학술대회 2024, pp.210-211
Conference
2024 An Analysis of Physical Features for Constructing Neural Network Training Data for Mask ROM Restoration   김대원   한국통신학회 종합 학술 발표회 (하계) 2024, pp.1956-1957
Conference
2023 Research on Automated Binary Restoration of Firmware Bit Information on Mask ROM   김대원   한국 인공지능 학술대회 2023, pp.384-385
Conference
2016 A Design of Unidirectional Security Gateway for Enforcement Security and Reliability of Transfer Data   허영준   한국통신학회 종합 학술 발표회 (동계) 2016, pp.827-828
Conference
2016 A Design of Unidirectional Security Gateway for Enforcement Reliability and Security of Transmission Data in Industrial Control Systems   Youngjun Heo   International Conference on Advanced Communication Technology (ICACT) 2016, pp.310-313 11
Conference
2016 Abnormal Traffic Filtering Mechanism for Protecting ICS Networks   Byoung-Koo Kim   International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 7
Conference
2014 Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning   Byoung-Koo Kim   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.121-126 9
Journal
2014 Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks   DongHo Kang   Journal of Applied Mathematics, v.2014, pp.1-7 13
Conference
2014 Cyber Threats and Defence Approaches in SCADA systems   Dong-Ho Kang   International Conference on Advanced Communication Technology (ICACT) 2014, pp.324-327 17
Conference
2014 Design of Industrial Firewall System based on Multiple Access Control Filter   Byoungkoo Kim   International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 1
Conference
2014 Whitelist Generation Technique for Industrial Firewall in SCADA Networks   Dong-Ho Kang   International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.525-534 4
Journal
2012 Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process : focus on Information Security   강구홍  정보보호학회논문지, v.22, no.3, pp.553-564
Journal
2012 Utilization of Physical Security Events for the Converged Security Using Analytic Hierarchy Process : Focus on Information Security   강구홍  정보보호학회논문지, v.22, no.3, pp.553-564
Journal
2012 A Rule Based Event Correlation Approach for Physical and Logical Security Convergence   Dongho Kang   International Journal of Computer Science and Network Security, v.12, no.1, pp.28-31
Journal
2010 모바일 보안 위협 및 보안 서비스 기술 동향   강동호   정보과학회지, v.28, no.6, pp.51-56
Journal
2010 Smartphone Threats and Security Technology   강동호   전자통신동향분석, v.25, no.3, pp.72-80
Journal
2010 모바일 인터넷 및 스마트폰 보안 기술   김기영   OSIA Standards & Technology Review, v.38, no.1, pp.62-71
Conference
2009 Hardware Based Data Inspection for USB Data Leakage Prevention   Dong Ho Kang   Communications in Computer and Information Science (CCIS) 2009, pp.57-63 1
Journal
2009 개방형 모바일 환경에서 스마트폰 보안기술   김기영   정보보호학회지, v.19, no.5, pp.21-28
Conference
2009 USB Data Leakage Prevention Using Hardware based Data Inspection Technique   Dong Ho Kang   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2007 A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles   Won Joo Park   International Conference on Information Security and Privacy (ISP) 2007, pp.1-5
Journal
2007 Recent Trends in Research and Technology of Secure Execution Environment   백광호   전자통신동향분석, v.22, no.5, pp.152-158
Conference
2007 FPGA based light-weight Security Gateway System   Dong-Ho Kang   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387
Conference
2006 Design and Implementation of High-Performance Security Gateway System   Seung Yong Yoon   Joint Workshop on Information Security (JWIS) 2006, pp.1-15
Conference
2006 FPGA Based Intrusion Detection System Against Unknown and Known Attacks   Dong Ho Kang   Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 3
Conference
2006 FPGA based Protocol Anomaly and Pattern Matching Detection System   Dong Ho Kang   International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10
Conference
2004 Design and Implementation of Detection Engine Against IDS Evasion with Unicode   Dong Ho Kang   International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337
Conference
2003 IP based Traceback technology Using Packet Marking   강동호   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.2141-2144
Conference
2002 Design for Network based Real Time Traceback System   최양서   통신 정보 합동 학술 대회 (JCCI) 2002, pp.50-50
Conference
2001 Design and Implementation of Network Trouble Ticket System   강동호   통신 정보 합동 학술 대회 (JCCI) 2001, pp.671-674