
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
|
Conference
|
2025 | XDP-FlowOpt: Lightweight Flow Optimization for 5G Private Networks Yongyoon Shin International Symposium on Mobile Internet Security (MobiSec) 2025, pp.1-7 | ||
|
Journal
|
2025 | A Case Study Review of Initial Access Technologies for Cyber Attacks 장종수 주간기술동향, v.2202, pp.14-28 | ||
|
Conference
|
2025 | Enhanced Security Architecture for Direct Interworking between Commercial 5G and Defense Networks Jisoo Shin International Symposium on Mobile Internet Security (MobiSec) 2025, pp.1-2 | ||
|
Conference
|
2025 | AI-Based Deobfuscation-Free Detection of Obfuscated Malicious Python Scripts 김국진 한국인터넷정보학회 학술 발표 대회 (추계) 2025, pp.111-112 | ||
|
Conference
|
2025 | An eBPF-First Datapath for CNF Chains on Commodity NICs Yongyoon Shin International Conference on Information and Communication Technology Convergence (ICTC) 2025, pp.1-2 | ||
|
Conference
|
2024 | A Study on Planning of the Network Data Management for Intelligent Private 5G Security 이훈기 한국통신학회 종합 학술 발표회 (추계) 2024, pp.1-2 | ||
|
Journal
|
2024 | SITRAN: Self-Supervised IDS With Transferable Techniques for 5G Industrial Environments Hyunjin Kim IEEE Internet of Things Journal, v.11, no.21, pp.35465-35476 | 6 | |
|
Journal
|
2023 | Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals 정병호 전자통신동향분석, v.38, no.5, pp.61-70 | ||
|
Journal
|
2023 | Private 5G Network Trends and Security Technologies 박종근 정보와 통신: 한국통신학회지, v.40, no.9, pp.21-29 | ||
|
Journal
|
2023 | An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks Cheolhee Park IEEE Internet of Things Journal, v.10, no.3, pp.2330-2345 | 218 | |
|
Conference
|
2022 | Security Requirements and Countermeasures in a Cloud-native Environment Youngsoo Kim International Symposium on Mobile Internet Security (MobiSec) 2022, pp.1-10 | ||
|
Conference
|
2022 | Network Anomaly Detection based on Domain Adaptation for 5G Network Security Hyun-Jin Kim International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.976-980 | 2 | |
|
Conference
|
2022 | Network Detection of Fake Base Station using Automatic Neighbour Relation in Self-Organizing Networks Jisoo Shin International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.968-970 | 6 | |
|
Conference
|
2022 | AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments Jonghoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.971-975 | 12 | |
|
Journal
|
2022 | eBPF Technology Trends for Networking and Security in Cloud-native 신용윤 전자통신동향분석, v.37, no.5, pp.62-69 | ||
|
Conference
|
2022 | Network Security in 5G Cloud Native MEC Environments Yongyoon Shin International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.965-967 | 0 | |
|
Journal
|
2022 | An Analysis of Security Vulnerabilities Using 5G NAS COUNT 김민재 정보보호학회논문지, v.32, no.3, pp.565-573 | ||
|
Journal
|
2022 | Review of Cyber Attack and Response System for Smart Factory 장종수 주간기술동향, v.2029, pp.17-30 | ||
|
Journal
|
2021 | Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack Cheolhee Park IEEE Access, v.9, pp.167412-167425 | 10 | |
|
Conference
|
2021 | Network Anomaly Detection based on GAN with Scaling Properties Hyun-Jin Kim International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1-5 | 5 | |
|
Journal
|
2021 | Analysis of Incarceration Attacks with RRCReject and RRCRelease in 5G Standalone Non-Public Network Keewon Kim 한국컴퓨터정보학회논문지, v.26, no.10, pp.93-100 | ||
|
Journal
|
2021 | Analysis of Current 5G Open-Source Projects 김민재 전자통신동향분석, v.36, no.2, pp.83-92 | ||
|
Conference
|
2021 | Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset Gyeoul Lee International Conference on Advanced Communications Technology (ICACT) 2021, pp.254-258 | 5 | |
|
Journal
|
2020 | 5G Edge Security Technology Trend 박종근 정보보호학회지, v.30, no.6, pp.7-16 | ||
|
Journal
|
2020 | Analysis of Security Issues for False Base Station in 5G 박훈용 정보보호학회지, v.30, no.6, pp.23-30 | ||
|
Journal
|
2020 | Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications Tae-Keun Park 한국컴퓨터정보학회논문지, v.25, no.11, pp.105-114 | ||
|
Conference
|
2020 | Long-Term Evolution Vulnerability Focusing on System Information Block Messages Minjae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.837-842 | 1 | |
|
Conference
|
2020 | Security Threats in 5G Edge Computing Environments Youngsoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.905-907 | 15 | |
|
Journal
|
2020 | Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments 김영수 정보과학회지, v.38, no.9, pp.16-24 | ||
|
Journal
|
2019 | Security Threats and Challenges for 5G Era 박종근 ICT 산업 HOT CLIPS, v.32, pp.4-7 | ||
|
Journal
|
2019 | 5G Security Architectural Features and Key Improvements in 3GPP Standard 박종근 정보보호학회지, v.29, no.5, pp.21-30 | ||
|
Journal
|
2019 | Mobile Network Security Issues regarding 5G Security 박종근 전자통신동향분석, v.34, no.1, pp.36-48 | ||
|
Conference
|
2018 | A Study on Fault Management for NFV 이상민 한국소프트웨어 종합 학술 대회 2018, pp.1147-1148 | ||
|
Conference
|
2018 | Cloud based Customized Network Security as a Service for Small and Medium sized Business 박종근 한국통신학회 종합 학술 발표회 (추계) 2018, pp.511-512 | ||
|
Conference
|
2018 | A Study on Monitoring and Fault Management for NFV using OpenStack 이상민 한국통신학회 종합 학술 발표회 (추계) 2018, pp.498-499 | ||
|
Conference
|
2016 | A Surrogate Gateway supporting Network Proximity in a Distributed Clouds 박종근 한국통신학회 종합 학술 발표회 (하계) 2016, pp.1071-1072 | ||
|
Journal
|
2015 | Analysis of OPNFV Project and its ARNO Release 박종근 전자통신동향분석, v.30, no.3, pp.105-114 | ||
|
Conference
|
2015 | Study on Distributed Virtual Router Technology in OpenStack Neutron 박종근 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1445-1449 | ||
|
Journal
|
2015 | Analysis of OpenStack Neutron Distributed Virtual Router Technology 박종근 전자통신동향분석, v.30, no.3, pp.105-114 | ||
|
Conference
|
2015 | Inter Cloud Networking between Distributed Micro Data Centers Jong-Geun Park International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.185-186 | ||
|
Journal
|
2014 | Trends on Development of the Open Platform for Network Functions Virtualisation 박종근 전자통신동향분석, v.29, no.6, pp.93-101 | ||
|
Conference
|
2014 | A Study on Traffic Optimization in Distributed Cloud Environment 윤승현 한국통신학회 종합 학술 발표회 (추계) 2014, pp.524-525 | ||
|
Conference
|
2014 | Extending Tenant Networks across Geographically Distributed Clouds Jong-Geun Park International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.486-487 | 0 | |
|
Journal
|
2014 | Features of OpenStack Icehouse and its Technology Trends 박종근 전자통신동향분석, v.29, no.5, pp.136-144 | ||
|
Conference
|
2014 | Content Caching with Bi-Level Control for Efficient IPTV Content Steaming Service Jong-Geun Park International Conference on Information Networking (ICOIN) 2014, pp.439-443 | 2 | |
|
Journal
|
2013 | Analysis of OpenStack Cloud Networking Technology 박종근 전자통신동향분석, v.28, no.5, pp.122-132 | ||
|
Conference
|
2013 | Prioritized Dual Caching Algorithm for Peer-to-Peer Content Network Jong-Geun Park International Conference on Consumer Electronics (ICCE) 2013, pp.94-95 | 1 | |
|
Conference
|
2012 | On Selective Placement for Uniform Cache Objects Jong-Geun Park International Conference on Advances in Information Technology (ICAIT) 2012 (LNCS 7593), v.7593, pp.75-82 | 0 | |
|
Conference
|
2012 | On the Cache Sojourn Time Distribution of the LRU Replacement Algorithm Jong-Geun Park International Conference on Advanced Information Technology and Sensor Application (AITS) 2012, pp.1-8 | ||
|
Conference
|
2009 | Performance Evaluation of A Hybrid Discovery Mechanism for Real Time Data Distribution Service Jong Geun Park International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2009, pp.1-5 |