Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2024 | A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers Jaehak Yu Computer Networks, v.254, pp.1-12 | 1 | |
Conference
|
2024 | Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms Yangseo Choi International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.427-428 | ||
Journal
|
2023 | Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection 최양서 전자통신동향분석, v.38, no.5, pp.71-80 | ||
Conference
|
2022 | Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure Yangseo Choi International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2179-2181 | 2 | |
Journal
|
2021 | Trends of Hardware-based Trojan Detection Technologies 최양서 전자통신동향분석, v.36, no.6, pp.78-87 | ||
Conference
|
2020 | Trends of Cyber Security Incidents and Vulnerability Assessment Tools for Nuclear Power Plant 최양서 원전계측제어 심포지엄 (NuPIC) 2020, pp.1-16 | ||
Conference
|
2020 | Design of Fuzzing Status Judgment Function for One-way Protocol Software Fuzzing 안개일 한국정보처리학회 학술 발표 대회 (추계) 2020, pp.374-375 | ||
Journal
|
2020 | Trends of Cyber Security Vulnerability Assessment Technology and Development for Nulcear Power Plant 최양서 정보보호학회지, v.30, no.5, pp.35-44 | ||
Conference
|
2019 | Design of Security Vulnerability Analysis Target Monitoring Function for Effective Fuzzing Test in VxWorks Environment 안개일 한국정보처리학회 학술 발표 대회 (추계) 2019, pp.407-408 | ||
Conference
|
2019 | 2-Phase Risk Scoring System for ICS Vulnerabilities 최양서 통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2 | ||
Conference
|
2016 | Network Signature Clustering 최선오 한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264 | ||
Conference
|
2016 | Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim International Conference on Security Technology (SecTech) 2016, pp.354-359 | ||
Conference
|
2016 | Network Abnormal Behavior Analysis System 최선오 한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190 | ||
Conference
|
2016 | Hierarchical Network Signature Clustering and Generation Sunoh Choi International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 | 2 | |
Conference
|
2016 | Traffic Storing and Related Information Generation System for Cyber Attack Analysis Yangseo Choi International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 | 1 | |
Conference
|
2016 | A Forensically Robust Data Acquisition from a 10G Line-rate Network Jooyoung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 | 0 | |
Conference
|
2016 | Introduction to a Network Forensics System for Cyber Incidents Analysis Yangseo Choi International Conference on Advanced Communication Technology (ICACT) 2016, pp.50-55 | 4 | |
Conference
|
2015 | Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack Jong-Hyun Kim SRI Security Congress 2015, pp.104-110 | ||
Conference
|
2015 | A Cyber Blackbox for Collecting Network Evidence Jooyoung Lee SRI Security Congress 2015, pp.141-147 | ||
Conference
|
2015 | Transmitted File Extraction and Reconstruction from Network Packets Yangseo Choi World Congress on Internet Security (WorldCIS) 2015, pp.164-165 | 2 | |
Journal
|
2015 | 10Gbps Network Traffic Capture and Runtime Indexing 최선오 전자통신동향분석, v.30, no.4, pp.181-190 | ||
Conference
|
2015 | Design and Implementation of Network Forensic System for 2Gbps Network Traffic 최양서 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1597-1598 | ||
Conference
|
2015 | Performance Comparison of Relational Databases and Columnar Databases for Fast Search of 10Gbps Network Flows 최선오 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1538-1539 | ||
Conference
|
2015 | A Study on the Network Data with a Cyber Black System 이주영 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1595-1596 | ||
Conference
|
2014 | Secure Virtualised Environment Pushpinder Kaur Chouhan International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 | 0 | |
Conference
|
2014 | Attack Cause Analysis Algorithm using Cyber BlackBox 최선오 한국정보처리학회 학술 발표 대회 (추계) 2014, pp.392-394 | ||
Conference
|
2014 | Software Integrity Authentication with Trusted Third Party 최양서 대한전자공학회 종합 학술 대회 (하계) 2014, pp.606-608 | ||
Conference
|
2013 | Executable File Reconstruction on Virtualized Environment Yangseo Choi International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.264-267 | ||
Journal
|
2013 | Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection Yangseo Choi Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 | 0 | |
Journal
|
2013 | Software Authentication Method with Trusted Third Party Yangseo Choi Research Notes in Information Science, v.14, pp.102-105 | ||
Conference
|
2012 | AIGG Threshold Based HTTP GET Flooding Attack Detection Yang-seo Choi International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 | 12 | |
Conference
|
2011 | Timeslot Monitoring Model for Application Layer DDoS Attack Detection Y.S. Choi International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679 | ||
Conference
|
2011 | SVM based Packed Executable File Detection by PE File Header Analysis 최양서 통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 | ||
Conference
|
2010 | Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention Yang-Seo Choi International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 | 27 | |
Journal
|
2009 | Research on Distributed Denial of Service Attack Response Infrastructure 최양서 정보보호학회지, v.19, no.5, pp.11-20 | ||
Conference
|
2009 | A Study on the PE File Header Analysis Technique for Packed PE File Detection 최양서 한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-4 | ||
Conference
|
2009 | Optimal Position Searching for Automated Malware Signature Generation Yang Seo Choi International Symposium on Consumer Electronics (ISCE) 2009, pp.561-564 | 0 | |
Conference
|
2009 | Entropy based Signature Extraction Position Searching for PE file 최양서 통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4 | ||
Journal
|
2009 | Encoded Executable File Detection Technique Via Executable File Header Analysis Yang Seo Choi International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36 | ||
Journal
|
2009 | Validation Methods of Suspicious Network Flows for Unknown Attack Detection Ik Kyun Kim International Journal of Computers, v.1, no.3, pp.104-114 | ||
Conference
|
2009 | A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment Ik Kyun Kim International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 | ||
Conference
|
2008 | An Architecture of Unknown Attack Detection System against Zero-day Worm Ik Kyun Kim International Conference on Applied Computer Science (ACS) 2008, pp.205-211 | ||
Conference
|
2008 | PE File Header Analysis-Based Packed PE File Detection Technique (PHAD) Yang-Seo Choi International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 | 40 | |
Conference
|
2008 | Function Call Mechanism Based Executable Code Detection for the Network Security Dae Won Kim International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 | 3 | |
Journal
|
2008 | Executable Code Recognition in Network Flows Using Instruction Transition Probabilities Ik Kyun Kim IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 | 2 | |
Journal
|
2008 | PE Header Characteristics Analysis Technique for Malware Detection 최양서 정보보안논문지, v.8, no.2, pp.63-70 | ||
Conference
|
2007 | A Practical Approach for Detecting Executable Codes in Network Traffic Ik Kyun Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 | 1 | |
Journal
|
2006 | 네트워크 보안을 위한 공격 분류법 김대원 주간기술동향, v.1249, pp.1-13 | ||
Journal
|
2006 | 사회공학적 공격방법을 통한 개인정보 유출기술 및 대응방안 분석 최양서 정보보호학회지, v.16, no.1, pp.40-48 | ||
Conference
|
2006 | Security Points for BcN Infrastructure Yang Seo Choi International Conference on Advanced Communication Technology (ICACT) 2006, pp.293-297 | 1 | |
Conference
|
2005 | A Consideration about Information Security Points of BcN Infrastructure 최양서 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.328-332 | ||
Journal
|
2005 | BcN 인프라 정보 보호 최양서 정보통신 : 한국통신학회지, v.22, no.8, pp.25-34 | ||
Conference
|
2005 | An Research about ISPs' role as Managed Security Service Providers Yang-seo Choi International Conference on Control, Automation and Systems (ICCAS) 2005, pp.2513-2515 | ||
Conference
|
2005 | The proposal of the Analysis Model for leveling Network Security 오승희 통신 정보 합동 학술 대회 (JCCI) 2005, pp.196-196 | ||
Conference
|
2005 | An Analysis of ISPs’ role as Managed Security Service Providers (MSSPs) Yang-seo Choi International Conference on Advanced Communication Technology (ICACT) 2005, pp.624-626 | ||
Conference
|
2005 | Design of Attack Generation Test-suite based Scenario for Security Solutions Testing Hwan Kuk Kim International Conference on Advanced Communication Technology (ICACT) 2005, pp.676-679 | ||
Conference
|
2004 | A Consideration about ISP’s roll as a Managed Security Service Provider (MSSP) 최양서 차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.540-544 | ||
Conference
|
2004 | Design of Modified NRCTS to Reduce the Additional Network Path to External Network Yang Sec Choi International Conference on Advanced Communication Technology (ICACT) 2004, pp.846-850 | ||
Conference
|
2004 | Implementation of real-time management system to control intruder trace-back system wan-kuk Kim International Conference on Advanced Communication Technology (ICACT) 2004, pp.488-491 | ||
Conference
|
2003 | Design of Network-based Real-time Connection Traceback System with Connection Redirection Technology Yang-Sec Choi International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2101-2105 | ||
Conference
|
2003 | Construction of S-ESM with Open Source 최양서 통신 정보 합동 학술 대회 (JCCI) 2003, pp.182-182 | ||
Conference
|
2003 | Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology Yang-Seo Choi International Conference on Computational Science and Its Applications (ICCSA) 2003 (LNCS 2668), pp.31-40 | 2 | |
Conference
|
2003 | Design and Development of Real Time Honeypot System for Collecting the Information of Hacker Activity 서동일 한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1941-1944 | ||
Conference
|
2002 | Design for Network based Real Time Traceback System 최양서 통신 정보 합동 학술 대회 (JCCI) 2002, pp.50-50 | ||
Conference
|
2001 | A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation Yang Seo Choi International Conference on Information Security and Cryptology (ICISC) 2001 (LNCS 2288), v.2288, pp.146-159 | 1 | |
Journal
|
2001 | 네트워크 보안 평가를 위한 해커 및 해킹 기법 수준 분류 최양서 정보보호학회지, v.11, no.5, pp.63-74 |