ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Ki Young
Department
Trustworthy Network Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2021 Improvement of Consensus Quality for PoN Blockchain System Using Response Surface Methodology   최진영  품질경영학회지, v.49, no.4, pp.527-537
Conference
2021 A Study on High-speed Synchronization of the PON-based Blockchain   김동오   한국정보처리학회 학술 발표 대회 (추계) 2021, pp.320-321
Journal
2021 Blockchain distributed consensus technology trend   진희상   전자공학회지, v.48, no.5, pp.63-74
Journal
2020 Algorithm based on Byzantine Agreement among Decentralized Agents (BADA)   Jintae Oh   ETRI Journal, v.42, no.6, pp.872-885 1
Journal
2020 Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm   김영창   산업경영시스템학회지, v.43, no.4, pp.168-177
Journal
2018 Past, Present and Future of Blockchain Technology   박정숙   전자통신동향분석, v.33, no.6, pp.139-153
Journal
2018 Performance Improvement of Distributed Consensus Algorithms for Blockchain through Suggestion and Analysis of Assessment Items   김도균  산업경영시스템학회지, v.41, no.4, pp.179-188
Journal
2016 Detecting Weak Signal of Emerging Technologies   최수길   전자통신동향분석, v.31, no.2, pp.18-27
Journal
2015 System Architecture for Real-Time Face Detection on Analog Video Camera   Mooseop Kim   International Journal of Distributed Sensor Networks, v.2015, pp.1-12 9
Conference
2014 Hardware Architecture for Real-Time Face Detection on Embedded Analog Video Cameras   Mooseop Kim   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.311-316 1
Conference
2014 Data Forgery Detection for Vehicle Black Box   Mooseop Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.636-637 6
Conference
2014 Multilingual Sentence Hiding and Displaying System for Digital Cartoon Images   Sang-Kwang Lee   International Conference on Convergence Content (ICCC) 2014, pp.371-372
Conference
2014 Flying Screen with Cooperative Flocking Quad-Rotors   Jinkyeong Kim   International Conference on Convergence Content (ICCC) 2014, pp.373-374
Journal
2013 A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure   김기영   전자공학회논문지, v.50, no.2, pp.60-69
Conference
2010 Context-based Remote Security Control for Mobile Communication Device   Gae Il An   International Symposium on Communications and Information Technologies (ISCIT) 2010, pp.815-820 2
Journal
2010 모바일 인터넷 및 스마트폰 보안 기술   김기영   OSIA Standards & Technology Review, v.38, no.1, pp.62-71
Conference
2009 The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device   Bo Heung Chung   Communications in Computer and Information Science (CCIS) 2009, pp.51-56 0
Conference
2009 Domain-based Information Control to Enhance Security in Mobile Platforms   Gun Tae Bae   International Conference on Internet (ICONI) 2009, pp.1-7
Conference
2009 Hardware Based Data Inspection for USB Data Leakage Prevention   Dong Ho Kang   Communications in Computer and Information Science (CCIS) 2009, pp.57-63 1
Journal
2009 Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device   안개일   정보처리학회논문지 C, v.16C, no.6, pp.1-11
Conference
2009 Context-Aware Dynamic Security Configuration for Mobile Communication Device   Gae Il An   International Conference on New Technologies, Mobility and Security (NTMS) 2009, pp.1-5 3
Journal
2009 개방형 모바일 환경에서 스마트폰 보안기술   김기영   정보보호학회지, v.19, no.5, pp.21-28
Conference
2009 USB Data Leakage Prevention Using Hardware based Data Inspection Technique   Dong Ho Kang   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 The Design and Implementation of Security Management Prototype for All-in-one Mobile Devices   박원주   통신 정보 합동 학술 대회 (JCCI) 2009, pp.1-4
Journal
2008 The Trends of Secure Operating System Technology for Mobile Platform   배근태   전자통신동향분석, v.23, no.4, pp.39-47
Conference
2008 Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN   Gae Il An   International Conference on Autonomic and Trusted Computing (ATC) 2008 (LNCS 5060), v.5060, pp.36-46 4
Journal
2008 Trend Analysis of the Operating System for Handheld Devices Based Linux System   오승희   전자통신동향분석, v.23, no.3, pp.152-162
Conference
2008 Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals   Youn Seo Jeong   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 2
Conference
2008 Just-on-Time Data Leakage Protection for Mobile Devices   Bo-Heung Chung   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1914-1915 2
Conference
2007 Implementation of RBAC using LSM Framework   정연서   차세대 통신 소프트웨어 학술 대회 (NCS) 2007, pp.1-4
Conference
2007 A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles   Won Joo Park   International Conference on Information Security and Privacy (ISP) 2007, pp.1-5
Conference
2007 Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor   Young-Ho Kim   International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 1
Conference
2007 Analysis of SEND Protocol through Implementation and Simulation   Gae Il An   International Conference on Convergence Information Technology (ICCIT) 2007, pp.670-676 16
Journal
2007 A Periodical Key Refreshment Scheme for Compromise-prone Sensor Nodes   왕기철  전자공학회논문지 TC, v.44, no.11, pp.67-77
Journal
2007 Recent Trends in Research and Technology of Secure Execution Environment   백광호   전자통신동향분석, v.22, no.5, pp.152-158
Conference
2007 Implementation of Multi-thread based Intrusion Prevention System for IPv6   Jae-Deok Lim   International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 5
Journal
2007 모바일 데이터 보안 제품 동향   박원주   주간기술동향, v.1309, pp.1-11
Conference
2007 FPGA based light-weight Security Gateway System   Dong-Ho Kang   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2007, pp.386-387
Conference
2007 Hardware Implementation of Block Cipher ARIA   이상우   통신 정보 합동 학술 대회 (JCCI) 2007, pp.1-5
Conference
2007 The Proposal of Anomaly Traffic Detection Mechanism   오승희   한국정보처리학회 학술 발표 (춘계) 2007, pp.1031-1034
Conference
2007 Implementation of 10Gb Ethernet Switch Hardware Platform with a Network Processor and a 10Gb EMAC   Sang-Woo Lee   International Conference on Advanced Communication Technology (ICACT) 2007, pp.563-566 3
Journal
2007 An Analysis of Security Threat and Network Attack in IPv6   정보흥   전자통신동향분석, v.22, no.1, pp.37-50
Conference
2006 Implementation of IPsec VPN Hardware Platform   이상우   차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4
Conference
2006 Analysis of Security Requirements on Embedded Operating System for Portable Terminal   정연서   한국정보처리학회 학술 대회 (추계) 2006, pp.1653-1656
Conference
2006 Evaluation of Internet Worms Propagation in IPv6 Network   Hwan Kuk Kim   International Conference on Hybrid Information Technology (ICHIT) 2006 (LNCS 4413), v.4413, pp.1-9
Conference
2006 IPv6 Duplicate Address Detection DoS Attack Detector   Seung Ho Ryu  International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-10
Journal
2006 무선 확대와 모바일 보안위협   김기영   주간기술동향, v.1271, pp.1-9
Conference
2006 A Study of Security Policy Enforcement using Priority   Su Hyung Jo   SICE-ICASE International Joint Conference 2006, pp.3726-3729 0
Conference
2006 Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6   Jae Deok Lim   SICE-ICASE International Joint Conference 2006, pp.3924-3927 1
Conference
2006 A Method for Security Policy Enforcement of Security Router Platform   Su-hyung Jo   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2006, pp.1-9
Journal
2006 IPv6 침입 탐지 및 차단 기술   김기영   정보통신 : 한국통신학회지, v.23, no.9, pp.65-74
Conference
2006 Implementation of IPv4 Packet Forwarding Application on Network Processors   Sang Woo Lee   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2006, pp.1-3
Conference
2006 The Implementation of IPSec Application using IXP2850 Network Processor   Min Ho Han   World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI) 2006, pp.92-97
Conference
2006 Implementation of VPN Router Hardware Platform using Network Processor   Sang Woo Lee   International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 2
Conference
2006 An Efficient Design of High Speed Network Security Platform using Network Processor   Yong Sung Jeon   International Conference on Embedded Systems and Applications (ESA) 2006, pp.121-123
Conference
2006 Threat Analysis of Mobile Environment   정연서   한국해양정보통신학회 종합 학술 대회 (춘계) 2006, pp.749-753
Conference
2006 The Design of IPSec Application for 1XDP2851   Min Ho Han   International Conference on Advanced Communication Technology (ICACT) 2006, pp.309-313 2
Conference
2006 Design of Giga Performance VPN Router   Sang Su Lee   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1011-1013 0
Conference
2006 Protection Algorithm Against Security Holes of IPv6 Routing Header   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2006, pp.2004-2007 2
Conference
2006 Incorporating Intrusion Detection Functionality into 1XP2800 Network Processor based Router   Seung Ho Ryu   International Conference on Advanced Communication Technology (ICACT) 2006, pp.797-800 1
Conference
2006 Fragment Packet Partial Re-assembly Method for Intrusion Detection   Bo Heung Chung   International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 0
Conference
2006 Implementation of VPN Router Hardware Platform using Netwvor Processor   Sang Woo Lee   International Conference on Advanced Communication Technology (ICACT) 2006, pp.670-674 2
Conference
2005 IXP2800 네트워크 프로세서 기반 침입 탐지 기능 개발   류승호   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.3-6
Conference
2005 A study on the Enforcement of Security Policy using Priority   조수형   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.353-355
Conference
2005 IXP2400 Network Processor Architecture for IPSec Application   Minho Han   Internet and Multimedia Systems and Applications (IMSA) 2005, pp.28-31
Conference
2005 Design and Implementation of Gigabit Router using Network Processor   Sang-Woo Lee   Internet and Multimedia Systems and Applications (IMSA) 2005, pp.32-35
Conference
2005 Security Engine Management with GUI   Suhyung Jo   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.681-682
Conference
2005 The Implementation of IPSec Application using IXP2400 Network Processor   Minho Han   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.725-726
Conference
2005 Implementation of Gigabit Router with Network Porcesskr   이상우   한국통신학회 종합 학술 발표회 (하계) 2005, pp.110-113
Conference
2005 Design of Access Router Hardware Platform using the IXP2800 Network Processor   Yong-Sung Jeon   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1439-1440
Journal
2005 리눅스 시스템 기반의 IPv6 네트워크 보안 방법   임재덕   정보보호학회지, v.15, no.2, pp.8-17
Conference
2005 A Study of the efficient management of IPsec Protocol   JaeDeok Lim   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1415-1416
Conference
2005 Reconfigurable Bandwidth Controller for Responding the DDoS Attacks using Token Bucket Mechanism   Sang Kil Park   International Conference on Advanced Communication Technology (ICACT) 2005, pp.377-380
Conference
2005 A Memory-based Learning Approach to Reduce False Alarms in Intrusion Detection   Ill-Young Weon  International Conference on Advanced Communication Technology (ICACT) 2005, pp.241-245 2
Conference
2004 Secure QoS and Security SLAs for Broadband convergence Networks   전용희   차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.491-495
Conference
2004 Security features and architecture required in a BcN   전용희   전자 정보 통신 학술 대회 (CEIC) 2004, pp.255-258
Journal
2004 Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks   박상길   정보처리학회논문지 C, v.11, no.7, pp.951-958
Journal
2004 안전한 정보 통신 인프라용 고성능 침해 탐지 및 대응 기술   김기영   한국통신학회지, v.21, no.9, pp.48-57
Journal
2004 A Trend of Security Processor Technology   김기영   전자공학회지, v.31, no.8, pp.52-60
Conference
2004 Design and Implementation of Detection Engine Against IDS Evasion with Unicode   Dong Ho Kang   International Conference on High Performance Computing and Applications (ICHPCA) 2004, pp.333-337
Journal
2004 네트워크-기반 침입방지 시스템 성능 평가 기술 동향   전용희   주간기술동향, v.1158, pp.16-31
Conference
2004 Design and Implementation of High-Performance Intrusion Detection System   Byoung Koo Kim   International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 2
Conference
2004 Mechanism for Determining Rate-limit of Abnormal Traffic   안개일   통신 정보 합동 학술 대회 (JCCI) 2004, pp.992-995
Conference
2003 Securing Reverse Proxy Server for detecting DDOS attack   신승원   전자 정보 통신 학술 대회 (CEIC) 2003, pp.430-433
Conference
2003 MF (Minority First) scheme for defeating distributed denial of service attacks   Gaeil Ahn   International Symposium on Computers and Communications (ISCC) 2003, pp.1-6 7
Conference
2003 Design of Security Policy Server based on PBNM Architecture   안개일   통신 정보 합동 학술 대회 (JCCI) 2003, pp.401-401
Conference
2003 Desing and Implementation of Alert Exchange Mechanism for Policy-Based Intrusion Detection & Response System   윤승용   통신 정보 합동 학술 대회 (JCCI) 2003, pp.331-331
Conference
2003 The Method of Managing Security Policy for Secure Network   김건량   통신 정보 합동 학술 대회 (JCCI) 2003, pp.392-392
Conference
2003 Suggestion of Mobile Telecommunication Network Management System by Policy based Network management   이호균   통신 정보 합동 학술 대회 (JCCI) 2003, pp.365-365
Conference
2003 Policy Caching Technique in Multi Domain Policy Based Network Architecture   신승원   통신 정보 합동 학술 대회 (JCCI) 2003, pp.400-400
Conference
2002 Policy-Based Intrusion Detection and Automated Response Mechanism   Jin Oh Kim   International Conference on Information Networking (ICOIN) 2002 (LNCS 2344), v.2344, pp.399-408 3
Conference
2002 Proposal of Integrated Policy Information Model for Policy Based Network Security Management   김건량   한국통신학회 종합 학술 발표회 (추계) 2002, pp.1521-1524
Conference
2002 Design of Network Topology Map Generator for Management of Security System   안개일   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1293-1296
Journal
2002 안전한 정보 보호 인프라 제공을 위한 글로벌 네트워크 보안 제어 프레임워크   장종수   한국통신학회지, v.19, no.8, pp.30-40
Conference
2002 Implementation of Simulator for Performance Evaluation of Security Management System based on Policy Architecture   안개일   통신 정보 합동 학술 대회 (JCCI) 2002, pp.127-127
Conference
2002 Architecture and Design of Policy-Based Network Security   김기영   통신 정보 합동 학술 대회 (JCCI) 2002, pp.89-89
Conference
2002 Network intrusion detection & respond mechanism based on hierarchical traffic analysis in a Policy-based network security management framework   방효찬   통신 정보 합동 학술 대회 (JCCI) 2002, pp.51-51
Conference
2002 Information Model for Policy-Based Network Security Management   Sook Yeon Kim   International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.662-672 3
Conference
2001 Policy Core Information Model in Policy-Based Management far Network Security   김숙연   한국정보과학회 학술 발표 (가을) 2001, pp.652-654
Journal
2001 Design and Simulation of Policy Based Integrated Server System Capable to Provide Real-time Internet Security Service   김기영   정보처리학회논문지 C, v.8C, no.5, pp.565-572
Conference
2001 The Variable Definition of Packet Header Fields for Network Security Policy Information Model   김건량   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.1021-1024
Conference
2001 Architecture of Network Security Control Server for applying Security Policy Model   방효찬   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.993-996
Conference
2001 Design of Intrusion Detection System on PC using On/Off-line Technologies   서동일   통신 정보 합동 학술 대회 (JCCI) 2001, pp.607-611