ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Byoung Koo Kim
Department
Cryptography Engineering Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 Applying Lightweight Cryptography to Enhance Drone RC Security   Joungil Yun   International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1367-1368
Conference
2023 Implementation of PQC-based Secure Channel for Drone Services   윤승용   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2
Conference
2023 A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data   윤정일   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1185-1186
Conference
2023 Security enhancement scheme for mobile device using H/W cryptographic module   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 2
Conference
2022 Enhancing IoT security with PUF-based authentication scheme   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 2
Conference
2022 Reinforcement of IoT Open Platform Security using PUF -based Device Authentication   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 3
Conference
2021 Multiple PUF-based Lightweight Authentication Method in the IoT   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 8
Conference
2021 PUF-based IoT Device Authentication Scheme on IoT Open Platform   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 7
Conference
2020 PUF-based Authentication Scheme for IoT Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 18
Conference
2020 Secure IoT Device Authentication Scheme using Key Hiding Technology   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 3
Journal
2020 Secure and reliable IoT device authentication technology using key hiding technique   김병구   정보보호학회지, v.30, no.1, pp.35-42
Conference
2019 PUF based IoT Device Authentication Scheme   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 26
Conference
2019 Security Enhancement for IoT Device using Physical Unclonable Functions   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 3
Conference
2018 Abnormal Traffic Detection Mechanism for Protecting IIoT Environments   Byoung-Koo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 8
Conference
2018 Design of Unidirectional Security Gateway System for Secure Monitoring of Control Network based on Modbus/TCP   Byoung-Koo Kim   International Conference on Electronics, Information and Communication (ICEIC) 2018, pp.670-671
Conference
2017 FEC based Data Transfer Reliability Guarantee Technique in Unidirectional Security Gateway System   김병구   한국통신학회 종합 학술 발표회 (추계) 2017, pp.721-722
Conference
2017 An implementation of the unidirectional security gateway for multi service unidirectional data transfer   허영준   한국통신학회 종합 학술 발표회 (추계) 2017, pp.711-712
Conference
2017 Design of Unidirectional Security Gateway System for Secure Monitoring of OPC-UA Data   Byoung-Koo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1288-1290 6
Conference
2016 Unconstrained File Transfer Scheme in Unidirectional Security Gateway System   Byoung-Koo Kim   International Conference on Security Technology (SecTech) 2016, pp.360-363
Conference
2016 A Design of Unidirectional Security Gateway for Enforcement Security and Reliability of Transfer Data   허영준   한국통신학회 종합 학술 발표회 (동계) 2016, pp.827-828
Conference
2016 Abnormal Traffic Filtering Mechanism for Protecting ICS Networks   Byoung-Koo Kim   International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 7
Conference
2016 A Design of Unidirectional Security Gateway for Enforcement Reliability and Security of Transmission Data in Industrial Control Systems   Youngjun Heo   International Conference on Advanced Communication Technology (ICACT) 2016, pp.310-313 11
Conference
2014 Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning   Byoung-Koo Kim   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.121-126 9
Journal
2014 Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks   DongHo Kang   Journal of Applied Mathematics, v.2014, pp.1-7 13
Conference
2014 Cyber Threats and Defence Approaches in SCADA systems   Dong-Ho Kang   International Conference on Advanced Communication Technology (ICACT) 2014, pp.324-327 17
Conference
2014 Defenses against ICMP Flooding Attacks   Byoungkoo Kim   International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2
Conference
2014 Whitelist Generation Technique for Industrial Firewall in SCADA Networks   Dong-Ho Kang   International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.525-534 4
Conference
2014 Design of Industrial Firewall System based on Multiple Access Control Filter   Byoungkoo Kim   International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 1
Conference
2013 Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics   Byoungkoo Kim   Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340
Journal
2013 GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection   Hyunjoo Kim   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 0
Conference
2013 A DNS Flooding Attack Detection by Attack Traffic Characteristics Analysis   Byoungkoo Kim   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.875-877
Conference
2012 Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding   Daewon Kim   International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 1
Journal
2012 The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack   Sunwook Kim   IETE Journal of Research, v.58, no.5, pp.398-410 0
Conference
2012 Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks   Hyunjoo Kim  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 6
Conference
2012 Network-based Executable File Extraction and Analysis for Malware Detection   Byoungkoo Kim   International Conference on Security and Cryptography (SECRYPT) 2012, pp.430-433
Conference
2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   김병구   한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Conference
2011 Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource   Dae Won Kim   International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145
Journal
2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   김병구   정보보호학회논문지, v.21, no.2, pp.119-129
Conference
2009 Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme   Seung Yong Yoon   International Conference on Security and Management (SAM) 2009, pp.1-5
Conference
2009 Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection   Byoung Koo Kim   International Conference on Security and Management (SAM) 2009, pp.1-6
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Journal
2009 Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection   Byoung Koo Kim   International Journal of Computers, v.3, no.1, pp.115-124
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Conference
2008 Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Applied Computer Science (ACS) 2008, pp.1-6
Journal
2008 H/W based Stateful Packet Inspection using a Novel Session Architecture   Seung Yong Yoon   International Journal of Computers, v.3, no.2, pp.310-319
Conference
2008 An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware   Byoung Koo Kim   International Conference on Applied Computer Science (ACS) 2008, pp.199-204
Journal
2008 A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System   Jin Tae Oh   International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162
Conference
2007 High Performance Session State Management Scheme for Stateful Packet Inspection   Seung Yong Yoon   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 6
Conference
2007 ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response   Byoung Koo Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 0
Journal
2007 Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System   Jin-Tae Oh   International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117
Conference
2007 Memory-efficient content filtering hardware for high-speed intrusion detection systems   Sung Won Yi   Symposium on Applied Computing (SAC) 2007, pp.264-269 15
Journal
2007 High-Performance Intrusion Detection Technology in FPGA-Based Reconfiguring Hardware   김병구   전자통신동향분석, v.22, no.1, pp.51-58
Conference
2006 High-Performance Stateful Intrusion Detection System   Seung Yong Yoon   International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 4
Conference
2006 Design and Implementation of High-Performance Security Gateway System   Seung Yong Yoon   Joint Workshop on Information Security (JWIS) 2006, pp.1-15
Conference
2006 FPGA Based Intrusion Detection System Against Unknown and Known Attacks   Dong Ho Kang   Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 3
Conference
2006 Computational Science and Its Applications - ICCSA 2006   Dong Ho Kang   International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10
Conference
2006 Design and Implementation of FPGA Based High-Performance Intrusion Detection System   Byoung Koo Kim   International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 4
Conference
2004 Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System   Hyeong Ju Kim  International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 0