Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2021 | Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology 최진영 품질경영학회지, v.49, no.4, pp.527-537 | ||
Conference
|
2021 | A Study on High-speed Synchronization of the PON-based Blockchain 김동오 한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321 | ||
Journal
|
2021 | Blockchain distributed consensus technology trend 진희상 전자공학회지, v.48, no.5, pp.63-74 | ||
Journal
|
2020 | Algorithm based on Byzantine Agreement among Decentralized Agents (BADA) Jintae Oh ETRI Journal, v.42, no.6, pp.872-885 | 1 | |
Journal
|
2020 | Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm 김영창 산업경영시스템학회지, v.43, no.4, pp.168-177 | ||
Journal
|
2018 | Past, Present and Future of Blockchain Technology 박정숙 전자통신동향분석, v.33, no.6, pp.139-153 | ||
Journal
|
2018 | Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items 김도균 산업경영시스템학회지, v.41, no.4, pp.179-188 | ||
Journal
|
2016 | Detecting Weak Signal of Emerging Technologies 최수길 전자통신동향분석, v.31, no.2, pp.18-27 | ||
Journal
|
2015 | System Architecture for Real-Time Face Detection on Analog Video Camera Mooseop Kim International Journal of Distributed Sensor Networks, v.2015, pp.1-12 | 9 | |
Conference
|
2014 | Hardware Architecture for Real-Time Face Detection on Embedded Analog Video Cameras Mooseop Kim International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.311-316 | 1 | |
Conference
|
2014 | Data Forgery Detection for Vehicle Black Box Mooseop Kim International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.636-637 | 6 | |
Conference
|
2014 | Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images Sang-Kwang Lee International Conference on Convergence Content (ICCC) 2014, pp.371-372 | ||
Conference
|
2014 | Flying Screen with Cooperative Flocking Quad-Rotors Jinkyeong Kim International Conference on Convergence Content (ICCC) 2014, pp.373-374 | ||
Journal
|
2013 | A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure 김기영 전자공학회논문지, v.50, no.2, pp.60-69 | ||
Conference
|
2010 | Context-based Remote Security Control for Mobile Communication Device Gae Il An International Symposium on Communications and Information Technologies (ISCIT) 2010, pp.815-820 | 2 | |
Journal
|
2010 | 모바일 인터넷 및 스마트폰 보안 기술 김기영 OSIA Standards & Technology Review, v.38, no.1, pp.62-71 | ||
Conference
|
2009 | The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device Bo Heung Chung Communications in Computer and Information Science (CCIS) 2009, pp.51-56 | 0 | |
Conference
|
2009 | Domain-based Information Control to Enhance Security in Mobile Platforms Gun Tae Bae International Conference on Internet (ICONI) 2009, pp.1-7 | ||
Conference
|
2009 | Hardware Based Data Inspection for USB Data Leakage Prevention Dong Ho Kang Communications in Computer and Information Science (CCIS) 2009, pp.57-63 | 1 | |
Journal
|
2009 | Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device 안개일 정보처리학회논문지 C, v.16C, no.6, pp.1-11 | ||
Conference
|
2009 | Context-Aware Dynamic Security Configuration for Mobile Communication Device Gae Il An International Conference on New Technologies, Mobility and Security (NTMS) 2009, pp.1-5 | 3 | |
Journal
|
2009 | 개방형 모바일 환경에서 스마트폰 보안기술 김기영 정보보호학회지, v.19, no.5, pp.21-28 | ||
Conference
|
2009 | USB Data Leakage Prevention Using Hardware based Data Inspection Technique Dong Ho Kang International Conference on Security and Management (SAM) 2009, pp.1-5 | ||
Conference
|
2009 | The Design and Implementation of Security Management Prototype for All-in-one Mobile Devices 박원주 통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4 | ||
Journal
|
2008 | The Trends of Secure Operating System Technology for Mobile Platform 배근태 전자통신동향분석, v.23, no.4, pp.39-47 | ||
Conference
|
2008 | Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN Gae Il An International Conference on Autonomic and Trusted Computing (ATC) 2008 (LNCS 5060), v.5060, pp.36-46 | 4 | |
Journal
|
2008 | Trend Analysis of the Operating System for Handheld Devices Based Linux System 오승희 전자통신동향분석, v.23, no.3, pp.152-162 | ||
Conference
|
2008 | Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals Youn Seo Jeong International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 | 2 | |
Conference
|
2008 | Just-on-Time Data Leakage Protection for Mobile Devices Bo-Heung Chung International Conference on Advanced Communication Technology (ICACT) 2008, pp.1914-1915 | 2 | |
Conference
|
2007 | Implementation of RBAC using LSM Framework 정연서 차세대 통신 소프트웨어 학술 대회 (NCS) 2007, pp.1-4 | ||
Conference
|
2007 | A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles Won Joo Park International Conference on Information Security and Privacy (ISP) 2007, pp.1-5 | ||
Conference
|
2007 | Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor Young-Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 | 1 | |
Conference
|
2007 | Analysis of SEND Protocol through Implementation and Simulation Gae Il An International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676 | 16 | |
Journal
|
2007 | A Periodical Key Refreshment Scheme for Compromise-prone Sensor Nodes 왕기철 전자공학회논문지 TC, v.44, no.11, pp.67-77 | ||
Journal
|
2007 | Recent Trends in Research and Technology of Secure Execution Environment 백광호 전자통신동향분석, v.22, no.5, pp.152-158 | ||
Conference
|
2007 | Implementation of Multi-thread based Intrusion Prevention System for IPv6 Jae-Deok Lim International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 | 5 | |
Journal
|
2007 | 모바일 데이터 보안 제품 동향 박원주 주간기술동향, v.1309, pp.1-11 | ||
Conference
|
2007 | FPGA based light-weight Security Gateway System Dong-Ho Kang International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387 | ||
Conference
|
2007 | Hardware Implementation of Block Cipher ARIA 이상우 통신 정보 합동 학술 대회 (JCCI) 2007, pp.1-5 | ||
Conference
|
2007 | The Proposal of Anomaly Traffic Detection Mechanism 오승희 한국정보처리학회 학술 발표 (춘계) 2007, pp.1031-1034 | ||
Conference
|
2007 | Implementation of 10Gb Ethernet Switch Hardware Platform with a Network Processor and a 10Gb EMAC Sang-Woo Lee International Conference on Advanced Communication Technology (ICACT) 2007, pp.563-566 | 3 | |
Journal
|
2007 | An Analysis of Security Threat and Network Attack in IPv6 정보흥 전자통신동향분석, v.22, no.1, pp.37-50 | ||
Conference
|
2006 | Implementation of IPsec VPN Hardware Platform 이상우 차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4 | ||
Conference
|
2006 | Analysis of Security Requirements on Embedded Operating System for Portable Terminal 정연서 한국정보처리학회 학술 대회 (추계) 2006, pp.1653-1656 | ||
Conference
|
2006 | Evaluation of Internet Worms Propagation in IPv6 Network Hwan Kuk Kim International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9 | ||
Conference
|
2006 | IPv6 Duplicate Address Detection DoS Attack Detector Seung Ho Ryu International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-10 | ||
Journal
|
2006 | 무선 확대와 모바일 보안위협 김기영 주간기술동향, v.1271, pp.1-9 | ||
Conference
|
2006 | A Study of Security Policy Enforcement using Priority Su Hyung Jo SICE-ICASE International Joint Conference 2006, pp.3726-3729 | 0 | |
Conference
|
2006 | Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6 Jae Deok Lim SICE-ICASE International Joint Conference 2006, pp.3924-3927 | 1 | |
Conference
|
2006 | A Method for Security Policy Enforcement of Security Router Platform Su-hyung Jo Asia-Pacific Network Operations and Management Symposium (APNOMS) 2006, pp.1-9 | ||
Journal
|
2006 | IPv6 침입 탐지 및 차단 기술 김기영 정보통신 : 한국통신학회지, v.23, no.9, pp.65-74 | ||
Conference
|
2006 | Implementation of IPv4 Packet Forwarding Application on Network Processors Sang Woo Lee International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2006, pp.1-3 | ||
Conference
|
2006 | The Implementation of IPSec Application using IXP2850 Network Processor Min Ho Han World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI) 2006, pp.92-97 | ||
Conference
|
2006 | Implementation of VPN Router Hardware Platform using Network Processor Sang Woo Lee International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 | 2 | |
Conference
|
2006 | An Efficient Design of High Speed Network Security Platform using Network Processor Yong Sung Jeon International Conference on Embedded Systems and Applications (ESA) 2006, pp.121-123 | ||
Conference
|
2006 | Threat Analysis of Mobile Environment 정연서 한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.749-753 | ||
Conference
|
2006 | The Design of IPSec Application for 1XDP2851 Min Ho Han International Conference on Advanced Communication Technology (ICACT) 2006, pp.309-313 | 2 | |
Conference
|
2006 | Design of Giga Performance VPN Router Sang Su Lee International Conference on Advanced Communication Technology (ICACT) 2006, pp.1011-1013 | 0 | |
Conference
|
2006 | Protection Algorithm Against Security Holes of IPv6 Routing Header Jae Deok Lim International Conference on Advanced Communication Technology (ICACT) 2006, pp.2004-2007 | 2 | |
Conference
|
2006 | Incorporating Intrusion Detection Functionality into 1XP2800 Network Processor based Router Seung Ho Ryu International Conference on Advanced Communication Technology (ICACT) 2006, pp.797-800 | 1 | |
Conference
|
2006 | Fragment Packet Partial Re-assembly Method for Intrusion Detection Bo Heung Chung International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 | 0 | |
Conference
|
2006 | Implementation of VPN Router Hardware Platform using Netwvor Processor Sang Woo Lee International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 | 2 | |
Conference
|
2005 | IXP2800 네트워크 프로세서 기반 침입 탐지 기능 개발 류승호 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.3-6 | ||
Conference
|
2005 | A study on the Enforcement of Security Policy using Priority 조수형 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.353-355 | ||
Conference
|
2005 | IXP2400 Network Processor Architecture for IPSec Application Minho Han Internet and Multimedia Systems and Applications (IMSA) 2005, pp.28-31 | ||
Conference
|
2005 | Design and Implementation of Gigabit Router using Network Processor Sang-Woo Lee Internet and Multimedia Systems and Applications (IMSA) 2005, pp.32-35 | ||
Conference
|
2005 | Security Engine Management with GUI Suhyung Jo International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.681-682 | ||
Conference
|
2005 | The Implementation of IPSec Application using IXP2400 Network Processor Minho Han International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.725-726 | ||
Conference
|
2005 | Implementation of Gigabit Router with Network Porcesskr 이상우 한국통신학회 종합 학술 발표회 (하계) 2005, pp.110-113 | ||
Conference
|
2005 | Design of Access Router Hardware Platform using the IXP2800 Network Processor Yong-Sung Jeon International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1439-1440 | ||
Journal
|
2005 | 리눅스 시스템 기반의 IPv6 네트워크 보안 방법 임재덕 정보보호학회지, v.15, no.2, pp.8-17 | ||
Conference
|
2005 | A Study of the efficient management of IPsec Protocol JaeDeok Lim International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1415-1416 | ||
Conference
|
2005 | Reconfigurable Bandwidth Controller for Responding the DDoS Attacks using Token Bucket Mechanism Sang Kil Park International Conference on Advanced Communication Technology (ICACT) 2005, pp.377-380 | ||
Conference
|
2005 | A Memory-based Learning Approach to Reduce False Alarms in Intrusion Detection Ill-Young Weon International Conference on Advanced Communication Technology (ICACT) 2005, pp.241-245 | 2 | |
Conference
|
2004 | Secure QoS and Security SLAs for Broadband convergence Networks 전용희 차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.491-495 | ||
Conference
|
2004 | Security features and architecture required in a BcN 전용희 전자 정보 통신 학술 대회 (CEIC) 2004, pp.255-258 | ||
Journal
|
2004 | Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks 박상길 정보처리학회논문지 C, v.11, no.7, pp.951-958 | ||
Journal
|
2004 | 안전한 정보 통신 인프라용 고성능 침해 탐지 및 대응 기술 김기영 한국통신학회지, v.21, no.9, pp.48-57 | ||
Journal
|
2004 | A Trend of Security Processor Technology 김기영 전자공학회지, v.31, no.8, pp.52-60 | ||
Conference
|
2004 | Design and Implementation of Detection Engine Against IDS Evasion with Unicode Dong Ho Kang International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337 | ||
Journal
|
2004 | 네트워크-기반 침입방지 시스템 성능 평가 기술 동향 전용희 주간기술동향, v.1158, pp.16-31 | ||
Conference
|
2004 | Design and Implementation of High-Performance Intrusion Detection System Byoung Koo Kim International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 | 2 | |
Conference
|
2004 | Mechanism for Determining Rate-limit of Abnormal Traffic 안개일 통신 정보 합동 학술 대회 (JCCI) 2004, pp.992-995 | ||
Conference
|
2003 | Securing Reverse Proxy Server for detecting DDOS attack 신승원 전자 정보 통신 학술 대회 (CEIC) 2003, pp.430-433 | ||
Conference
|
2003 | MF (Minority First) scheme for defeating distributed denial of service attacks Gaeil Ahn International Symposium on Computers and Communications (ISCC) 2003, pp.1-6 | 7 | |
Conference
|
2003 | Design of Security Policy Server based on PBNM Architecture 안개일 통신 정보 합동 학술 대회 (JCCI) 2003, pp.401-401 | ||
Conference
|
2003 | Desing and Implementation of Alert Exchange Mechanism for Policy-Based Intrusion Detection & Response System 윤승용 통신 정보 합동 학술 대회 (JCCI) 2003, pp.331-331 | ||
Conference
|
2003 | The Method of Managing Security Policy for Secure Network 김건량 통신 정보 합동 학술 대회 (JCCI) 2003, pp.392-392 | ||
Conference
|
2003 | Suggestion of Mobile Telecommunication Network Management System by Policy based Network management 이호균 통신 정보 합동 학술 대회 (JCCI) 2003, pp.365-365 | ||
Conference
|
2003 | Policy Caching Technique in Multi Domain Policy Based Network Architecture 신승원 통신 정보 합동 학술 대회 (JCCI) 2003, pp.400-400 | ||
Conference
|
2002 | Policy-Based Intrusion Detection and Automated Response Mechanism Jin Oh Kim International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.399-408 | 3 | |
Conference
|
2002 | Proposal of Integrated Policy Information Model for Policy Based Network Security Management 김건량 한국통신학회 종합 학술 발표회 (추계) 2002, pp.1521-1524 | ||
Conference
|
2002 | Design of Network Topology Map Generator for Management of Security System 안개일 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1293-1296 | ||
Journal
|
2002 | 안전한 정보 보호 인프라 제공을 위한 글로벌 네트워크 보안 제어 프레임워크 장종수 한국통신학회지, v.19, no.8, pp.30-40 | ||
Conference
|
2002 | Implementation of Simulator for Performance Evaluation of Security Management System based on Policy Architecture 안개일 통신 정보 합동 학술 대회 (JCCI) 2002, pp.127-127 | ||
Conference
|
2002 | Architecture and Design of Policy-Based Network Security 김기영 통신 정보 합동 학술 대회 (JCCI) 2002, pp.89-89 | ||
Conference
|
2002 | Network intrusion detection & respond mechanism based on hierarchical traffic analysis in a Policy-based network security management framework 방효찬 통신 정보 합동 학술 대회 (JCCI) 2002, pp.51-51 | ||
Conference
|
2002 | Information Model for Policy-Based Network Security Management Sook Yeon Kim International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 | 3 | |
Conference
|
2001 | Policy Core Information Model in Policy-Based Management far Network Security 김숙연 한국정보과학회 학술 발표 (가을) 2001, pp.652-654 | ||
Journal
|
2001 | Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service 김기영 정보처리학회논문지 C, v.8C, no.5, pp.565-572 | ||
Conference
|
2001 | The Variable Definition of Packet Header Fields for Network Security Policy Information Model 김건량 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.1021-1024 | ||
Conference
|
2001 | Architecture of Network Security Control Server for applying Security Policy Model 방효찬 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.993-996 | ||
Conference
|
2001 | Design of Intrusion Detection System on PC using On/Off-line Technologies 서동일 통신 정보 합동 학술 대회 (JCCI) 2001, pp.607-611 |