Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | Applying Lightweight Cryptography to Enhance Drone RC Security Joungil Yun International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1367-1368 | ||
Conference
|
2023 | Implementation of PQC-based Secure Channel for Drone Services 윤승용 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2 | ||
Conference
|
2023 | A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data 윤정일 한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1185-1186 | ||
Conference
|
2023 | Security enhancement scheme for mobile device using H/W cryptographic module Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 | 2 | |
Conference
|
2022 | Enhancing IoT security with PUF-based authentication scheme Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 | 2 | |
Conference
|
2022 | Reinforcement of IoT Open Platform Security using PUF -based Device Authentication Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 | 3 | |
Conference
|
2021 | Multiple PUF-based Lightweight Authentication Method in the IoT Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 | 8 | |
Conference
|
2021 | PUF-based IoT Device Authentication Scheme on IoT Open Platform Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 | 7 | |
Conference
|
2020 | PUF-based Authentication Scheme for IoT Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 | 18 | |
Conference
|
2020 | Secure IoT Device Authentication Scheme using Key Hiding Technology Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 | 3 | |
Journal
|
2020 | Secure and reliable IoT device authentication technology using key hiding technique 김병구 정보보호학회지, v.30, no.1, pp.35-42 | ||
Conference
|
2019 | PUF based IoT Device Authentication Scheme Byoungkoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 | 26 | |
Conference
|
2019 | Security Enhancement for IoT Device using Physical Unclonable Functions Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 | 3 | |
Conference
|
2018 | Abnormal Traffic Detection Mechanism for Protecting IIoT Environments Byoung-Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 | 8 | |
Conference
|
2018 | Design of Unidirectional Security Gateway System for Secure Monitoring of Control Network based on Modbus/TCP Byoung-Koo Kim International Conference on Electronics, Information and Communication (ICEIC) 2018, pp.670-671 | ||
Conference
|
2017 | FEC based Data Transfer Reliability Guarantee Technique in Unidirectional Security Gateway System 김병구 한국통신학회 종합 학술 발표회 (추계) 2017, pp.721-722 | ||
Conference
|
2017 | An implementation of the unidirectional security gateway for multi service unidirectional data transfer 허영준 한국통신학회 종합 학술 발표회 (추계) 2017, pp.711-712 | ||
Conference
|
2017 | Design of Unidirectional Security Gateway System for Secure Monitoring of OPC-UA Data Byoung-Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1288-1290 | 6 | |
Conference
|
2016 | Unconstrained File Transfer Scheme in Unidirectional Security Gateway System Byoung-Koo Kim International Conference on Security Technology (SecTech) 2016, pp.360-363 | ||
Conference
|
2016 | A Design of Unidirectional Security Gateway for Enforcement Security and Reliability of Transfer Data 허영준 한국통신학회 종합 학술 발표회 (동계) 2016, pp.827-828 | ||
Conference
|
2016 | Abnormal Traffic Filtering Mechanism for Protecting ICS Networks Byoung-Koo Kim International Conference on Advanced Communication Technology (ICACT) 2016, pp.436-440 | 7 | |
Conference
|
2016 | A Design of Unidirectional Security Gateway for Enforcement Reliability and Security of Transmission Data in Industrial Control Systems Youngjun Heo International Conference on Advanced Communication Technology (ICACT) 2016, pp.310-313 | 11 | |
Conference
|
2014 | Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning Byoung-Koo Kim International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.121-126 | 9 | |
Journal
|
2014 | Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks DongHo Kang Journal of Applied Mathematics, v.2014, pp.1-7 | 13 | |
Conference
|
2014 | Cyber Threats and Defence Approaches in SCADA systems Dong-Ho Kang International Conference on Advanced Communication Technology (ICACT) 2014, pp.324-327 | 17 | |
Conference
|
2014 | Defenses against ICMP Flooding Attacks Byoungkoo Kim International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 | ||
Conference
|
2014 | Whitelist Generation Technique for Industrial Firewall in SCADA Networks Dong-Ho Kang International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.525-534 | 4 | |
Conference
|
2014 | Design of Industrial Firewall System based on Multiple Access Control Filter Byoungkoo Kim International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.535-544 | 1 | |
Conference
|
2013 | Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics Byoungkoo Kim Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340 | ||
Journal
|
2013 | GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection Hyunjoo Kim Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 | 0 | |
Conference
|
2013 | A DNS Flooding Attack Detection by Attack Traffic Characteristics Analysis Byoungkoo Kim International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.875-877 | ||
Conference
|
2012 | Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding Daewon Kim International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 | 1 | |
Journal
|
2012 | The NADIA: A Network Acceleration System with Defense against Network Invasion and Attack Sunwook Kim IETE Journal of Research, v.58, no.5, pp.398-410 | 0 | |
Conference
|
2012 | Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks Hyunjoo Kim International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 | 6 | |
Conference
|
2012 | Network-based Executable File Extraction and Analysis for Malware Detection Byoungkoo Kim International Conference on Security and Cryptography (SECRYPT) 2012, pp.430-433 | ||
Conference
|
2011 | Design and Implementation of Secure-NIC System for DDoS Attack Response 김병구 한국정보처리학회 학술 발표 (추계) 2011, pp.996-998 | ||
Conference
|
2011 | Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource Dae Won Kim International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145 | ||
Journal
|
2011 | Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card 김병구 정보보호학회논문지, v.21, no.2, pp.119-129 | ||
Conference
|
2009 | Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme Seung Yong Yoon International Conference on Security and Management (SAM) 2009, pp.1-5 | ||
Conference
|
2009 | Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection Byoung Koo Kim International Conference on Security and Management (SAM) 2009, pp.1-6 | ||
Conference
|
2009 | A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment Ik Kyun Kim International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 | ||
Journal
|
2009 | Multi-Hash based Pattern Matching Mechanism for High-Performance Intrusion Detection Byoung Koo Kim International Journal of Computers, v.3, no.1, pp.115-124 | ||
Conference
|
2008 | An Architecture of Unknown Attack Detection System against Zero-day Worm Ik Kyun Kim International Conference on Applied Computer Science (ACS) 2008, pp.205-211 | ||
Conference
|
2008 | Session Management Architecture for Implementing an FPGA-based Stateful Intrusion Detection System Seung Yong Yoon International Conference on Applied Computer Science (ACS) 2008, pp.1-6 | ||
Journal
|
2008 | H/W based Stateful Packet Inspection using a Novel Session Architecture Seung Yong Yoon International Journal of Computers, v.3, no.2, pp.310-319 | ||
Conference
|
2008 | An Efficient Multi-hash Pattern Matching Scheme for Intrusion Detection in FPGA-based Reconfiguring Hardware Byoung Koo Kim International Conference on Applied Computer Science (ACS) 2008, pp.199-204 | ||
Journal
|
2008 | A Novel Architecture and Mechanism for High-Performance RealTime Intrusion Detection and Response System Jin Tae Oh International Journal of Computer Science and Network Security, v.8, no.3, pp.155-162 | ||
Conference
|
2007 | High Performance Session State Management Scheme for Stateful Packet Inspection Seung Yong Yoon Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.591-594 | 6 | |
Conference
|
2007 | ATPS – Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response Byoung Koo Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.344-353 | 0 | |
Journal
|
2007 | Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System Jin-Tae Oh International Journal of Computer Science and Network Security, v.7, no.5, pp.110-117 | ||
Conference
|
2007 | Memory-efficient content filtering hardware for high-speed intrusion detection systems Sung Won Yi Symposium on Applied Computing (SAC) 2007, pp.264-269 | 15 | |
Journal
|
2007 | High-Performance Intrusion Detection Technology in FPGA-Based Reconfiguring Hardware 김병구 전자통신동향분석, v.22, no.1, pp.51-58 | ||
Conference
|
2006 | High-Performance Stateful Intrusion Detection System Seung Yong Yoon International Conference on Computational Intelligence and Security (CIS) 2006, pp.574-579 | 4 | |
Conference
|
2006 | Design and Implementation of High-Performance Security Gateway System Seung Yong Yoon Joint Workshop on Information Security (JWIS) 2006, pp.1-15 | ||
Conference
|
2006 | FPGA Based Intrusion Detection System Against Unknown and Known Attacks Dong Ho Kang Pacific Rim International Workshop on Multi-Agents (PRIMA) 2006 (LNCS 4088), v.4088, pp.801-806 | 3 | |
Conference
|
2006 | Computational Science and Its Applications - ICCSA 2006 Dong Ho Kang International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3980), v.3980, pp.1-10 | ||
Conference
|
2006 | Design and Implementation of FPGA Based High-Performance Intrusion Detection System Byoung Koo Kim International Conference on Intelligence and Security Informatics (ISI) 2006 (LNCS 3975), v.3975, pp.724-725 | 4 | |
Conference
|
2004 | Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System Hyeong Ju Kim International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 | 0 |