ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Choi Yangseo
Department
Intelligent Network Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2023 Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection   최양서   전자통신동향분석, v.38, no.5, pp.71-80
Conference
2022 Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2179-2181 2
Journal
2021 Trends of Hardware-based Trojan Detection Technologies   최양서   전자통신동향분석, v.36, no.6, pp.78-87
Conference
2020 Trends of Cyber Security Incidents and Vulnerability Assessment Tools for Nuclear Power Plant   최양서   원전계측제어 심포지엄 (NuPIC) 2020, pp.1-16
Conference
2020 Design of Fuzzing Status Judgment Function for One-way Protocol Software Fuzzing   안개일   한국정보처리학회 학술 발표 대회 (추계) 2020, pp.374-375
Journal
2020 Trends of Cyber Security Vulnerability Assessment Technology and Development for Nulcear Power Plant   최양서   정보보호학회지, v.30, no.5, pp.35-44
Conference
2019 Design of Security Vulnerability Analysis Target Monitoring Function for Effective Fuzzing Test in VxWorks Environment   안개일   한국정보처리학회 학술 발표 대회 (추계) 2019, pp.407-408
Conference
2019 2-Phase Risk Scoring System for ICS Vulnerabilities   최양서   통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2
Conference
2016 Network Signature Clustering   최선오   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264
Conference
2016 Network Abnormal Behavior Analysis System   최선오   한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190
Conference
2016 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence   Jong-Hyun Kim   International Conference on Security Technology (SecTech) 2016, pp.354-359
Conference
2016 Traffic Storing and Related Information Generation System for Cyber Attack Analysis   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 1
Conference
2016 Hierarchical Network Signature Clustering and Generation   Sunoh Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 2
Conference
2016 A Forensically Robust Data Acquisition from a 10G Line-rate Network   Jooyoung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 0
Conference
2016 Introduction to a Network Forensics System for Cyber Incidents Analysis   Yangseo Choi   International Conference on Advanced Communication Technology (ICACT) 2016, pp.50-55 4
Conference
2015 Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack   Jong-Hyun Kim   SRI Security Congress 2015, pp.104-110
Conference
2015 A Cyber Blackbox for Collecting Network Evidence   Jooyoung Lee   SRI Security Congress 2015, pp.141-147
Conference
2015 Transmitted File Extraction and Reconstruction from Network Packets   Yangseo Choi   World Congress on Internet Security (WorldCIS) 2015, pp.164-165 1
Journal
2015 10Gbps Network Traffic Capture and Runtime Indexing   최선오   전자통신동향분석, v.30, no.4, pp.181-190
Conference
2015 A Study on the Network Data with a Cyber Black System   이주영   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1595-1596
Conference
2015 Design and Implementation of Network Forensic System for 2Gbps Network Traffic   최양서   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1597-1598
Conference
2015 Performance Comparison of Relational Databases and Columnar Databases for Fast Search of 10Gbps Network Flows   최선오   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1538-1539
Conference
2014 Secure Virtualised Environment   Pushpinder Kaur Chouhan  International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 0
Conference
2014 Attack Cause Analysis Algorithm using Cyber BlackBox   최선오   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.392-394
Conference
2014 Software Integrity Authentication with Trusted Third Party   최양서   대한전자공학회 종합 학술 대회 (하계) 2014, pp.606-608
Conference
2013 Executable File Reconstruction on Virtualized Environment   Yangseo Choi   International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.264-267
Journal
2013 Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection   Yangseo Choi   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 0
Journal
2013 Software Authentication Method with Trusted Third Party   Yangseo Choi   Research Notes in Information Science, v.14, pp.102-105
Conference
2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Yang-seo Choi   International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 12
Conference
2011 Timeslot Monitoring Model for Application Layer DDoS Attack Detection   Y.S. Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679
Conference
2011 SVM based Packed Executable File Detection by PE File Header Analysis   최양서   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Conference
2010 Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention   Yang-Seo Choi   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 27
Journal
2009 Research on Distributed Denial of Service Attack Response Infrastructure   최양서   정보보호학회지, v.19, no.5, pp.11-20
Conference
2009 A Study on the PE File Header Analysis Technique for Packed PE File Detection   최양서   한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-4
Conference
2009 Optimal Position Searching for Automated Malware Signature Generation   Yang Seo Choi   International Symposium on Consumer Electronics (ISCE) 2009, pp.561-564 0
Conference
2009 Entropy based Signature Extraction Position Searching for PE file   최양서   통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4
Journal
2009 Encoded Executable File Detection Technique Via Executable File Header Analysis   Yang Seo Choi   International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference
2008 PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)   Yang-Seo Choi   International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 39
Journal
2008 Executable Code Recognition in Network Flows Using Instruction Transition Probabilities   Ik Kyun Kim   IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 2
Conference
2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Dae Won Kim   International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3
Journal
2008 PE Header Characteristics Analysis Technique for Malware Detection   최양서   정보보안논문지, v.8, no.2, pp.63-70
Conference
2007 A Practical Approach for Detecting Executable Codes in Network Traffic   Ik Kyun Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 1
Journal
2006 네트워크 보안을 위한 공격 분류법   김대원   주간기술동향, pp.1-13
Journal
2006 사회 공학적 공격 방법을 통한 개인 정보 유출 기술 및 대응 방안 분석   최양서   정보보호학회지, v.16, no.1, pp.40-48
Conference
2006 Security Points for BcN Infrastructure   Yang Seo Choi   International Conference on Advanced Communication Technology (ICACT) 2006, pp.293-297 1
Conference
2005 A Consideration about Information Security Points of BcN Infrastructure   최양서   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.328-332
Journal
2005 BcN 인프라 정보 보호   최양서   정보통신 : 한국통신학회지, v.22, no.8, pp.25-34
Conference
2005 An Research about ISPs' role as Managed Security Service Providers   Yang-seo Choi   International Conference on Control, Automation and Systems (ICCAS) 2005, pp.2513-2515
Conference
2005 The proposal of the Analysis Model for leveling Network Security   오승희   통신 정보 합동 학술 대회 (JCCI) 2005, pp.196-196
Conference
2005 An Analysis of ISPs’ role as Managed Security Service Providers (MSSPs)   Yang-seo Choi   International Conference on Advanced Communication Technology (ICACT) 2005, pp.624-626
Conference
2005 Design of Attack Generation Test-suite based Scenario for Security Solutions Testing   Hwan Kuk Kim  International Conference on Advanced Communication Technology (ICACT) 2005, pp.676-679
Conference
2004 A Consideration about ISP’s roll as a Managed Security Service Provider (MSSP)   최양서   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.540-544
Conference
2004 Implementation of real-time management system to control intruder trace-back system   wan-kuk Kim   International Conference on Advanced Communication Technology (ICACT) 2004, pp.488-491
Conference
2004 Design of Modified NRCTS to Reduce the Additional Network Path to External Network   Yang Sec Choi   International Conference on Advanced Communication Technology (ICACT) 2004, pp.846-850
Conference
2003 Design of Network-based Real-time Connection Traceback System with Connection Redirection Technology   Yang-Sec Choi   International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2101-2105
Conference
2003 Construction of S-ESM with Open Source   최양서   통신 정보 합동 학술 대회 (JCCI) 2003, pp.182-182
Conference
2003 Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology   Yang-Seo Choi   International Conference on Computational Science and Its Applications (ICCSA) 2003 (LNCS 2668), pp.31-40 2
Conference
2003 Design and Development of Real Time Honeypot System for Collecting the Information of Hacker Activity   서동일   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1941-1944
Conference
2002 Design for Network based Real Time Traceback System   최양서   통신 정보 합동 학술 대회 (JCCI) 2002, pp.50-50
Conference
2001 A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation   Yang Seo Choi   International Conference on Information Security and Cryptology (ICISC) 2001 (LNCS 2288), v.2288, pp.146-159 1
Journal
2001 네트워크 보안 평가를 위한 해커 및 해킹 기법 수준 분류   최양서   정보보호학회지, v.11, no.5, pp.63-74