Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | A Study on Training a Time-series Neural Network for Predicting Mask ROM Firmware Restoration 김대원 한국 인공지능 학술대회 2024, pp.210-211 | ||
Journal
|
2024 | DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode Sang-su Lee Sensors, v.24, no.13, pp.1-18 | 1 | |
Conference
|
2024 | An Analysis of Physical Features for Constructing Neural Network Training Data for Mask ROM Restoration 김대원 한국통신학회 종합 학술 발표회 (하계) 2024, pp.1956-1957 | ||
Conference
|
2023 | Research on Automated Binary Restoration of Firmware Bit Information on Mask ROM 김대원 한국 인공지능 학술대회 2023, pp.384-385 | ||
Journal
|
2021 | Trends of Hardware-based Trojan Detection Technologies 최양서 전자통신동향분석, v.36, no.6, pp.78-87 | ||
Conference
|
2020 | Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 | 1 | |
Conference
|
2020 | Implementation of Secure On-board Communication using an AUTOSAR based Automotive Gateway 주홍일 대한전자공학회 학술 대회 (하계) 2020, pp.1483-1485 | ||
Journal
|
2020 | Trends in Supply-Chain Security Technologies 김대원 전자통신동향분석, v.35, no.4, pp.149-157 | ||
Conference
|
2019 | Study for Securing In-Vehicle Network Communication Based on Hardware Security Module 김대원 한국스마트미디어학회 학술 대회 (추계) 2019, pp.199-202 | ||
Conference
|
2019 | Security Considerations for In-Vehicle Secure Communication Hongil Ju International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 | 13 | |
Conference
|
2018 | A Study of the Automotive Ethernet and Anomaly Detection System 전부선 전자 정보 통신 학술 대회 (CEIC) 2018, pp.1-3 | ||
Journal
|
2018 | Trends in Automotive Ethernet Security Technology 정보흥 전자통신동향분석, v.33, no.5, pp.76-85 | ||
Conference
|
2018 | An Access Control Method for Vehicle Management System Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.949-952 | 5 | |
Conference
|
2017 | Implementation of An Access Control Technology for Internet of Things Environments Daewon Kim International Conference on Communications, Computation, Networks and Technologies (INNOV) 2017, pp.17-19 | ||
Conference
|
2016 | Common Security Requirements for Device Identification System in Internet of Things Daewon Kim International Conference on Security Technology (SecTech) 2016, pp.306-309 | ||
Conference
|
2016 | Consideration of Security Threats for Identification System in Internet of Things Daewon Kim International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68 | ||
Conference
|
2015 | Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection Daewon Kim International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3 | ||
Conference
|
2015 | A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179 | ||
Conference
|
2014 | A Secure Channel Establishment Method on a Hardware Security Module Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.555-556 | 4 | |
Conference
|
2014 | A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys Daewon Kim International Conference on Mobile Services, Resources, and Users (MOBILITY) 2014, pp.1-5 | ||
Conference
|
2013 | An Integrity-Based Mechanism for Accessing Keys in A Mobile Trusted Module Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.780-782 | 1 | |
Journal
|
2013 | GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection Hyunjoo Kim Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 | 0 | |
Conference
|
2013 | Signature Generation Based on Executable Parts in Suspicious Packets Daewon Kim Advanced International Conference on Telecommunications (AICT) 2013, pp.166-169 | ||
Conference
|
2012 | Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding Daewon Kim International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 | 1 | |
Conference
|
2012 | Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks Hyunjoo Kim International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 | 6 | |
Conference
|
2011 | Design and Implementation of Secure-NIC System for DDoS Attack Response 김병구 한국정보처리학회 학술 발표 (추계) 2011, pp.996-998 | ||
Conference
|
2011 | Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource Dae Won Kim International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145 | ||
Conference
|
2011 | Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File 김대원 한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944 | ||
Journal
|
2011 | Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card 김병구 정보보호학회논문지, v.21, no.2, pp.119-129 | ||
Conference
|
2010 | Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File Dae Won Kim International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 | 1 | |
Journal
|
2009 | Polymorphic Worm Detection Using A Fast Static Analysis Approach 오진태 정보보호학회논문지, v.19, no.4, pp.29-39 | ||
Conference
|
2009 | Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique Dae Won Kim International Conference on Communications (ICC) 2009, pp.1-6 | 0 | |
Journal
|
2009 | Validation Methods of Suspicious Network Flows for Unknown Attack Detection Ik Kyun Kim International Journal of Computers, v.1, no.3, pp.104-114 | ||
Conference
|
2009 | A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment Ik Kyun Kim International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 | ||
Conference
|
2008 | An Architecture of Unknown Attack Detection System against Zero-day Worm Ik Kyun Kim International Conference on Applied Computer Science (ACS) 2008, pp.205-211 | ||
Journal
|
2008 | Tracing Stored Program Counter to Detect Polymorphic Shellcode Dae Won Kim IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 | 3 | |
Journal
|
2008 | Executable Code Recognition in Network Flows Using Instruction Transition Probabilities Ik Kyun Kim IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 | 2 | |
Conference
|
2008 | Fast Static Analysis Method to Detect Polymorphic Worm 김대원 한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232 | ||
Conference
|
2008 | Function Call Mechanism Based Executable Code Detection for the Network Security Dae Won Kim International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 | 3 | |
Journal
|
2008 | The Recent Trends of Polymorphic Shellcodes Detection Technologies 김대원 전자통신동향분석, v.23, no.1, pp.145-152 | ||
Journal
|
2008 | 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트 김대원 주간기술동향, v.1329, pp.1-12 | ||
Conference
|
2007 | A Practical Approach for Detecting Executable Codes in Network Traffic Ik Kyun Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 | 1 | |
Conference
|
2006 | Hardware Supports for Network Traffic Anomaly Detection Dae Won Kim International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5 | ||
Journal
|
2006 | 네트워크 보안을 위한 공격 분류법 김대원 주간기술동향, v.1249, pp.1-13 | ||
Conference
|
2005 | Low-power multimedia scheduling using output pre-buffering Bae Geuntae International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) 2005, pp.1-8 | 5 |