Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2024 | Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series Youngbeom Kim IEEE Access, v.12, pp.104414-104428 | 0 | |
Conference
|
2023 | A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data 윤정일 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1185-1186 | ||
Conference
|
2023 | Implementation of PQC-based Secure Channel for Drone Services 윤승용 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2 | ||
Conference
|
2023 | Security enhancement scheme for mobile device using H/W cryptographic module Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 | 2 | |
Conference
|
2022 | Enhancing IoT security with PUF-based authentication scheme Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 | 2 | |
Conference
|
2022 | Reinforcement of IoT Open Platform Security using PUF-based Device Authentication Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 | 3 | |
Conference
|
2021 | Multiple PUF-based Lightweight Authentication Method in the IoT Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 | 8 | |
Conference
|
2021 | PUF-based IoT Device Authentication Scheme on IoT Open Platform Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 | 7 | |
Conference
|
2020 | PUF-based Authentication Scheme for IoT Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 | 18 | |
Conference
|
2020 | Secure IoT Device Authentication Scheme using Key Hiding Technology Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 | 3 | |
Journal
|
2020 | Secure and reliable IoT device authentication technology using key hiding technique 김병구 정보보호학회지, v.30, no.1, pp.35-42 | ||
Conference
|
2019 | Security Enhancement for IoT Device using Physical Unclonable Functions Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 | 3 | |
Conference
|
2019 | PUF based IoT Device Authentication Scheme Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 | 26 | |
Conference
|
2018 | Design and Implementation of Lightweight Mutual Authentication Method in IoT 윤승용 통신 정보 합동 학술 대회 (JCCI) 2018, pp.378-379 | ||
Conference
|
2018 | Design of an LPWAN Communication Module Based on Secure Element for Smart Parking Application YongSung Jeon International Conference on Consumer Electronics (ICCE) 2018, pp.1-2 | 13 | |
Conference
|
2017 | Remote Security Management Server for IoT Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 | 21 | |
Conference
|
2017 | Mutual Authentication Scheme for Lightweight IoT Devices Seungyong Yoon International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017 | ||
Conference
|
2017 | Security Considerations Based on Classification of IoT Device Capabilities Seungyong Yoon International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15 | ||
Conference
|
2016 | Analyzing Security Threats of Android-based Mobile Malware Seungyong Yoon International Conference on Security Technology (SecTech) 2016, pp.310-315 | ||
Conference
|
2015 | Supporting a Variety of Secure Services Based on MTM Seungyong Yoon International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20 | ||
Conference
|
2015 | Mobile Security Technology for Smart Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176 | ||
Conference
|
2015 | Improving MTM-Based Session & Key Management Seungyong Yoon International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334 | ||
Conference
|
2014 | Security Threats Analysis for Android based Mobile Device Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.775-776 | 6 | |
Conference
|
2014 | Detection and Response against Mobile Attack using SMS 윤승용 통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2 | ||
Conference
|
2014 | Defenses against ICMP Flooding Attacks Byoungkoo Kim International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 | ||
Conference
|
2014 | Detection of SMS Mobile Malware Seungyong Yoon International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 | 1 | |
Journal
|
2013 | Mobile Malware Detection Using Correlational Analysis Seungyong Yoon International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58 | ||
Conference
|
2013 | Malware Detection on Smartphones Seungyong Yoon International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.272-275 | ||
Conference
|
2013 | Detecting Application Layer-based Slow DDoS Attack Seungyong Yoon Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.319-322 | ||
Conference
|
2013 | Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics Byoungkoo Kim Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340 | ||
Conference
|
2012 | Defense against TCP Flooding Attack Seungyong Yoon International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 | 1 | |
Conference
|
2011 | Design and Implementation of ALADDIN System 윤승용 한국정보처리학회 학술 발표 (추계) 2011, pp.992-995 | ||
Conference
|
2009 | Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme Seung Yong Yoon International Conference on Security and Management (SAM) 2009, pp.1-5 | ||
Conference
|
2009 | Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection Byoung Koo Kim International Conference on Security and Management (SAM) 2009, pp.1-6 | ||
Conference
|
2009 | A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment Ik Kyun Kim International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 | ||
Journal
|
2009 | Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection Byoung Koo Kim International Journal of Computers, v.3, no.1, pp.115-124 | ||
Conference
|
2008 | An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware Byoung Koo Kim International Conference on Applied Computer Science (ACS) 2008, pp.199-204 | ||
Journal
|
2008 | H/W based Stateful Packet Inspection using a Novel Session Architecture Seung Yong Yoon International Journal of Computers, v.3, no.2, pp.310-319 | ||
Conference
|
2008 | Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System Seung Yong Yoon International Conference on Applied Computer Science (ACS) 2008, pp.1-6 | ||
Conference
|
2008 | An Architecture of Unknown Attack Detection System against Zero-day Worm Ik Kyun Kim International Conference on Applied Computer Science (ACS) 2008, pp.205-211 | ||
Journal
|
2008 | A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System Jin Tae Oh International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162 | ||
Conference
|
2007 | ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response Byoung Koo Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 | 0 | |
Conference
|
2007 | High Performance Session State Management Scheme for Stateful Packet Inspection Seung Yong Yoon Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 | 6 | |
Journal
|
2007 | Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System Jin-Tae Oh International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117 | ||
Journal
|
2007 | High-Performance Intrusion Detection Technology in FPGA-Based Reconfiguring Hardware 김병구 전자통신동향분석, v.22, no.1, pp.51-58 | ||
Conference
|
2006 | High-Performance SPI-based Intrusion Detection Engine 오진태 차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-5 | ||
Conference
|
2006 | High-Performance Stateful Intrusion Detection System Seung Yong Yoon International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 | 4 | |
Conference
|
2006 | Design and Implementation of High-Performance Security Gateway System Seung Yong Yoon Joint Workshop on Information Security (JWIS) 2006, pp.1-15 | ||
Conference
|
2006 | Design of SPI Module in Large-Scale Network Seung Yong Yoon International Conference on Advanced Communication Technology (ICACT) 2006, pp.1706-1711 | 0 | |
Conference
|
2003 | Design of Security Policy Server based on PBNM Architecture 안개일 통신 정보 합동 학술 대회 (JCCI) 2003, pp.401-401 | ||
Conference
|
2003 | Desing and Implementation of Alert Exchange Mechanism for Policy-Based Intrusion Detection & Response System 윤승용 통신 정보 합동 학술 대회 (JCCI) 2003, pp.331-331 | ||
Conference
|
2001 | COPS-SECURITY Protocol for Security Policy Information 윤승용 한국정보과학회 학술 발표 (가을) 2001, pp.784-786 |