ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Choi Yangseo
Department
Intelligent Network Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2024 A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers   Jaehak Yu   Computer Networks, v.254, pp.1-12 1
Conference
2024 Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.427-428
Journal
2023 Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection   최양서   전자통신동향분석, v.38, no.5, pp.71-80
Conference
2022 Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2179-2181 2
Journal
2021 Trends of Hardware-based Trojan Detection Technologies   최양서   전자통신동향분석, v.36, no.6, pp.78-87
Conference
2020 Trends of Cyber Security Incidents and Vulnerability Assessment Tools for Nuclear Power Plant   최양서   원전계측제어 심포지엄 (NuPIC) 2020, pp.1-16
Conference
2020 Design of Fuzzing Status Judgment Function for One-way Protocol Software Fuzzing   안개일   한국정보처리학회 학술 발표 대회 (추계) 2020, pp.374-375
Journal
2020 Trends of Cyber Security Vulnerability Assessment Technology and Development for Nulcear Power Plant   최양서   정보보호학회지, v.30, no.5, pp.35-44
Conference
2019 Design of Security Vulnerability Analysis Target Monitoring Function for Effective Fuzzing Test in VxWorks Environment   안개일   한국정보처리학회 학술 발표 대회 (추계) 2019, pp.407-408
Conference
2019 2-Phase Risk Scoring System for ICS Vulnerabilities   최양서   통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2
Conference
2016 Network Signature Clustering   최선오   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264
Conference
2016 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence   Jong-Hyun Kim   International Conference on Security Technology (SecTech) 2016, pp.354-359
Conference
2016 Network Abnormal Behavior Analysis System   최선오   한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190
Conference
2016 Hierarchical Network Signature Clustering and Generation   Sunoh Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 2
Conference
2016 Traffic Storing and Related Information Generation System for Cyber Attack Analysis   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 1
Conference
2016 A Forensically Robust Data Acquisition from a 10G Line-rate Network   Jooyoung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 0
Conference
2016 Introduction to a Network Forensics System for Cyber Incidents Analysis   Yangseo Choi   International Conference on Advanced Communication Technology (ICACT) 2016, pp.50-55 4
Conference
2015 Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack   Jong-Hyun Kim   SRI Security Congress 2015, pp.104-110
Conference
2015 A Cyber Blackbox for Collecting Network Evidence   Jooyoung Lee   SRI Security Congress 2015, pp.141-147
Conference
2015 Transmitted File Extraction and Reconstruction from Network Packets   Yangseo Choi   World Congress on Internet Security (WorldCIS) 2015, pp.164-165 2
Journal
2015 10Gbps Network Traffic Capture and Runtime Indexing   최선오   전자통신동향분석, v.30, no.4, pp.181-190
Conference
2015 Design and Implementation of Network Forensic System for 2Gbps Network Traffic   최양서   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1597-1598
Conference
2015 Performance Comparison of Relational Databases and Columnar Databases for Fast Search of 10Gbps Network Flows   최선오   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1538-1539
Conference
2015 A Study on the Network Data with a Cyber Black System   이주영   한국통신학회 종합 학술 발표회 (하계) 2015, pp.1595-1596
Conference
2014 Secure Virtualised Environment   Pushpinder Kaur Chouhan  International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 0
Conference
2014 Attack Cause Analysis Algorithm using Cyber BlackBox   최선오   한국정보처리학회 학술 발표 대회 (추계) 2014, pp.392-394
Conference
2014 Software Integrity Authentication with Trusted Third Party   최양서   대한전자공학회 종합 학술 대회 (하계) 2014, pp.606-608
Conference
2013 Executable File Reconstruction on Virtualized Environment   Yangseo Choi   International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.264-267
Journal
2013 Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection   Yangseo Choi   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 0
Journal
2013 Software Authentication Method with Trusted Third Party   Yangseo Choi   Research Notes in Information Science, v.14, pp.102-105
Conference
2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Yang-seo Choi   International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 12
Conference
2011 Timeslot Monitoring Model for Application Layer DDoS Attack Detection   Y.S. Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679
Conference
2011 SVM based Packed Executable File Detection by PE File Header Analysis   최양서   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Conference
2010 Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention   Yang-Seo Choi   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-6 27
Journal
2009 Research on Distributed Denial of Service Attack Response Infrastructure   최양서   정보보호학회지, v.19, no.5, pp.11-20
Conference
2009 A Study on the PE File Header Analysis Technique for Packed PE File Detection   최양서   한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-4
Conference
2009 Optimal Position Searching for Automated Malware Signature Generation   Yang Seo Choi   International Symposium on Consumer Electronics (ISCE) 2009, pp.561-564 0
Conference
2009 Entropy based Signature Extraction Position Searching for PE file   최양서   통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4
Journal
2009 Encoded Executable File Detection Technique Via Executable File Header Analysis   Yang Seo Choi   International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference
2008 PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)   Yang-Seo Choi   International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 40
Conference
2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Dae Won Kim   International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3
Journal
2008 Executable Code Recognition in Network Flows Using Instruction Transition Probabilities   Ik Kyun Kim   IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 2
Journal
2008 PE Header Characteristics Analysis Technique for Malware Detection   최양서   정보보안논문지, v.8, no.2, pp.63-70
Conference
2007 A Practical Approach for Detecting Executable Codes in Network Traffic   Ik Kyun Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 1
Journal
2006 네트워크 보안을 위한 공격 분류법   김대원   주간기술동향, v.1249, pp.1-13
Journal
2006 사회공학적 공격방법을 통한 개인정보 유출기술 및 대응방안 분석   최양서   정보보호학회지, v.16, no.1, pp.40-48
Conference
2006 Security Points for BcN Infrastructure   Yang Seo Choi   International Conference on Advanced Communication Technology (ICACT) 2006, pp.293-297 1
Conference
2005 A Consideration about Information Security Points of BcN Infrastructure   최양서   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.328-332
Journal
2005 BcN 인프라 정보 보호   최양서   정보통신 : 한국통신학회지, v.22, no.8, pp.25-34
Conference
2005 An Research about ISPs' role as Managed Security Service Providers   Yang-seo Choi   International Conference on Control, Automation and Systems (ICCAS) 2005, pp.2513-2515
Conference
2005 The proposal of the Analysis Model for leveling Network Security   오승희   통신 정보 합동 학술 대회 (JCCI) 2005, pp.196-196
Conference
2005 An Analysis of ISPs’ role as Managed Security Service Providers (MSSPs)   Yang-seo Choi   International Conference on Advanced Communication Technology (ICACT) 2005, pp.624-626
Conference
2005 Design of Attack Generation Test-suite based Scenario for Security Solutions Testing   Hwan Kuk Kim  International Conference on Advanced Communication Technology (ICACT) 2005, pp.676-679
Conference
2004 A Consideration about ISP’s roll as a Managed Security Service Provider (MSSP)   최양서   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.540-544
Conference
2004 Design of Modified NRCTS to Reduce the Additional Network Path to External Network   Yang Sec Choi   International Conference on Advanced Communication Technology (ICACT) 2004, pp.846-850
Conference
2004 Implementation of real-time management system to control intruder trace-back system   wan-kuk Kim   International Conference on Advanced Communication Technology (ICACT) 2004, pp.488-491
Conference
2003 Design of Network-based Real-time Connection Traceback System with Connection Redirection Technology   Yang-Sec Choi   International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2101-2105
Conference
2003 Construction of S-ESM with Open Source   최양서   통신 정보 합동 학술 대회 (JCCI) 2003, pp.182-182
Conference
2003 Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology   Yang-Seo Choi   International Conference on Computational Science and Its Applications (ICCSA) 2003 (LNCS 2668), pp.31-40 2
Conference
2003 Design and Development of Real Time Honeypot System for Collecting the Information of Hacker Activity   서동일   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1941-1944
Conference
2002 Design for Network based Real Time Traceback System   최양서   통신 정보 합동 학술 대회 (JCCI) 2002, pp.50-50
Conference
2001 A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation   Yang Seo Choi   International Conference on Information Security and Cryptology (ICISC) 2001 (LNCS 2288), v.2288, pp.146-159 1
Journal
2001 네트워크 보안 평가를 위한 해커 및 해킹 기법 수준 분류   최양서   정보보호학회지, v.11, no.5, pp.63-74