Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2024 | Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study Youngho Kim KSII Transactions on Internet and Information Systems, v.18, no.9, pp.2665-2691 | 0 | |
Conference
|
2021 | IoT Standard Platform Architecture that Provides Defense against DDoS Attacks Yun-kyung Lee International Conference on Consumer Electronics (ICCE) 2021 : Asia, pp.394-396 | 0 | |
Journal
|
2021 | Bootstrapping Security Technology in IoT 김영호 주간기술동향, v.2009, pp.14-28 | ||
Conference
|
2018 | Implementation of TLS and DTLS on Zephyr OS for IoT Devices Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1292-1294 | 12 | |
Conference
|
2018 | RIPPLE: Adaptive Fine-grained Access Control in Multi-hop LLNs Youngho Kim International Conference on Information Networking (ICOIN) 2018, pp.863-868 | 3 | |
Conference
|
2016 | Trends and Requirements of Data Management Platform in IoT Environment Hwashin Moon International Conference on Green and Human Information Technology (ICGHIT) 2016, pp.140-141 | ||
Journal
|
2015 | Analyzing User Awareness of Privacy Data Leak in Mobile Applications Youngho Kim Mobile Information Systems, v.2015, pp.1-12 | 23 | |
Conference
|
2015 | Cloud-Based Android Botnet Malware Detection System Suyash Jadhav International Conference on Advanced Communication Technology (ICACT) 2015, pp.347-352 | 17 | |
Conference
|
2015 | Mobile Device Penetration Testing Framework and Platform for the Mobile Device Security Course Suyash Jadhav International Conference on Advanced Communication Technology (ICACT) 2015, pp.675-680 | 6 | |
Conference
|
2014 | Mobile Device Security Framework Based on Domain Separation and Use Case Yun-kyung Lee Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4 | ||
Conference
|
2014 | Analysis of Mobile Malware based on User Awareness Youngho Kim Conference on Research in Information Technology (RIIT) 2014, pp.51-51 | 0 | |
Conference
|
2012 | TeeMo: A Generic Trusted Execution Framework for Mobile Devices Young-ho Kim International Conference on Computer, Networks, Systems, and Industrial Applications (CNSI) 2012, pp.579-583 | ||
Conference
|
2011 | Security Issue of Mobile Terminal for Smart Work 전용성 차세대 통신 소프트웨어 학술 대회 (NCS) 2011, pp.1-4 | ||
Conference
|
2011 | A Study on the Mobile Platform Security based on Virtualization Technology 주홍일 대한임베디드공학회 학술 대회 (추계) 2011, pp.399-402 | ||
Conference
|
2011 | Design of Secure Execution Environment for Mobile System 김영호 대한임베디드공학회 학술 대회 (추계) 2011, pp.241-244 | ||
Conference
|
2011 | Building Secure Execution Environment for Mobile Platform Young-Ho Kim International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI) 2011, pp.119-122 | 4 | |
Conference
|
2008 | Just-on-Time Data Leakage Protection for Mobile Devices Bo-Heung Chung International Conference on Advanced Communication Technology (ICACT) 2008, pp.1914-1915 | 2 | |
Conference
|
2007 | Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor Young-Ho Kim International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 | 1 | |
Conference
|
2007 | Implementation of Multi-thread based Intrusion Prevention System for IPv6 Jae-Deok Lim International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 | 5 | |
Journal
|
2007 | An Analysis of Security Threat and Network Attack in IPv6 정보흥 전자통신동향분석, v.22, no.1, pp.37-50 | ||
Conference
|
2006 | Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6 Jae Deok Lim SICE-ICASE International Joint Conference 2006, pp.3924-3927 | 1 | |
Conference
|
2006 | Fragment Packet Partial Re-assembly Method for Intrusion Detection Bo Heung Chung International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 | 0 |