ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Moon Dae Sung
Department
Intelligent Network Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2023 Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection   최양서   전자통신동향분석, v.38, no.5, pp.71-80
Journal
2022 Technological Trends in Intelligent Cyber Range   유재학   전자통신동향분석, v.37, no.4, pp.36-45
Journal
2022 An Analysis of Security Vulnerabilities Using 5G NAS COUNT   김민재  정보보호학회논문지, v.32, no.3, pp.565-573
Journal
2022 Attack Graph Generation with Machine Learning for Network Security   Kijong Koo   Electronics, v.11, no.9, pp.1-25 4
Conference
2022 정보보호 분야에서의 사이버 레인지 기술 동향   유재학   한국정보처리학회 학술 발표 대회 (춘계) 2022, pp.208-211
Journal
2021 Security Technology Trends to Prevent Medical Device Hacking and Ransomware   권혁찬   전자통신동향분석, v.36, no.5, pp.21-31
Journal
2021 Analysis of Current 5G Open-Source Projects   김민재   전자통신동향분석, v.36, no.2, pp.83-92
Journal
2020 5G Edge Security Technology Trend   박종근   정보보호학회지, v.30, no.6, pp.7-16
Conference
2020 Attrack Graph Learning with Machine Lerning   Kijong Koo   International Conference on Multimedia Information Technology and Applications (MITA) 2020, pp.97-98
Conference
2020 Long-Term Evolution Vulnerability Focusing on System Information Block Messages   Minjae Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.837-842 0
Journal
2020 Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments   김영수   정보과학회지, v.38, no.9, pp.16-24
Journal
2020 Technological Trends in Cyber Attack Simulations   이주영   전자통신동향분석, v.35, no.1, pp.34-48
Journal
2019 Attack Surface Expansion through Decoy Trap for Protected Servers in Moving Target Defense   Tae-Keun Park  한국컴퓨터정보학회논문지, v.24, no.10, pp.25-32
Journal
2019 5G Security Architectural Features and Key Improvements in 3GPP Standard   박종근   정보보호학회지, v.29, no.5, pp.21-30
Journal
2019 An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks   Tae-Keun Park  한국컴퓨터정보학회논문지, v.24, no.9, pp.35-42
Journal
2019 A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph   Jooyoung Lee   Journal of Supercomputing, v.75, no.6, pp.3028-3045 15
Conference
2018 Design of a Framework for OS Fingerprint Obfuscation   안성범   한국정보과학회 컴퓨터 통신 워크샵 (SWCC) (하계) 2018, pp.50-52
Journal
2018 Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat   Kyungmin Park   Symmetry, v.10, no.1, pp.1-16 17
Conference
2017 Design System Architecture for Network Address Mutation   안성범   한국정보보호학회 학술 대회 (동계) 2017, pp.1-4
Journal
2017 네트워크 주소 이동 기술 동향   박경민   전자통신동향분석, v.32, no.6, pp.73-82
Journal
2017 Analysis of Threat Model and Requirements in Network-based Moving Target Defense   Koo-Hong Kang  한국컴퓨터정보학회논문지, v.22, no.10, pp.83-92
Journal
2017 DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks   Daesung Moon   Journal of Supercomputing, v.73, no.7, pp.2881-2895 108
Conference
2017 네트워크 보안 솔루션의 취약점을 이용한 공격 시나리오 연구   황호   한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.1-3
Journal
2016 Host-based Intrusion Detection System for Secure Human-centric Computing   Daesung Moon   Journal of Supercomputing, v.72, no.7, pp.2520-2536 34
Journal
2016 RTNSS: A Routing Trace-based Network Security System for Preventing ARP Spoofing Attacks   Daesung Moon   Journal of Supercomputing, v.72, no.5, pp.1740-1756 8
Journal
2016 Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis   황호   정보보호학회논문지, v.26, no.2, pp.377-386
Journal
2015 Real-Time Abnormal Behavior Detection System Based on Fast Data   이명철   정보보호학회논문지, v.25, no.5, pp.1027-1041
Journal
2015 Robust Multi-person Tracking for Real-Time Intelligent Video Surveillance   Jin-Woo Choi   ETRI Journal, v.37, no.3, pp.551-561 40
Conference
2015 Trend and Issue Dynamic Analysis for Malware   황호   한국정보처리학회 학술 발표 대회 (춘계) 2015, pp.418-420
Journal
2015 Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space   Hansung Lee   KSII Transactions on Internet and Information Systems, v.9, no.3, pp.1173-1192 5
Conference
2015 Host Behavior Characteristic Description Method Against APT Attack Detection   Moon Daesung   World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7
Journal
2014 MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats   Daesung Moon   Symmetry, v.6, no.4, pp.997-1010 30
Journal
2014 Host based Feature Description Method for Detecting APT Attack   문대성   정보보호학회논문지, v.24, no.5, pp.839-850
Journal
2014 Improved Cancelable Fingerprint Templates Using Minutiae-Based Functional Transform   Daesung Moon   Security and Communication Networks, v.7, no.10, pp.1543-1551 14
Conference
2014 Unsupervised Clustering of Malware based on Behaviour Analysis   이한성   한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3
Conference
2014 Feature Extraction for Host based Anomaly Detection   문대성   대한전자공학회 종합 학술 대회 (하계) 2014, pp.591-594
Conference
2013 Pedestrian Detection System for Vehicle Mounted Camera   문대성   통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2
Conference
2013 다중 알고리즘 기반 실시간 사람 검출   문대성   영상 처리 및 이해에 관한 워크샵 (IPIU) 2013, pp.1-4
Conference
2012 Human Detection Using Sparse Recognition Classifier with Histogram of Oriented Gradient   이한성   한국정보과학회 학술 발표 (가을) 2012, pp.B222-B224
Conference
2012 Biometrics Information Protection using Fuzzy Vault Scheme   Ki Young Moon   International Conference on Signal-Image Technology and Internet-Based Systems (SITIS) 2012, pp.124-128 14
Conference
2012 CCTV 환경을 위한 실시간 사람 검출 시스템   문대성   영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-4
Conference
2012 고정-PTZ 카메라 제어 기반의 원거리 얼굴 검출 방법   이한성   영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-4
Conference
2011 Adaptive Human Detection Method based on the Distance from a Camera   문대성   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Journal
2011 Robust Fuzzy Fingerprint Vault System against Correlation Attack   문대성   정보보호학회논문지, v.21, no.2, pp.13-25
Conference
2011 A Secure Fingerprint Template Generation Algorithm for Smart Card   Daesung Moon   International Conference on Consumer Electronics (ICCE) 2011, pp.719-720 2
Journal
2010 Recovery of Flash Memories for Reliable Mobile Storages   Daesung Moon   Mobile Information Systems, v.6, no.2, pp.177-191 6
Conference
2010 Secure Fuzzy Fingerprint Vault System   문대성   대한전자공학회 종합 학술 대회 (하계) 2010, pp.1660-1663
Conference
2009 Fuzzy Fingerprint Vault using Multiple Polynomials   Dae Sung Moon   CVISP 2009, v.3, no.11, pp.61-64
Journal
2009 Dictionary Attack on Functional Transform-Based Cancelable Fingerprint Templates   Sang Wook Shin  ETRI Journal, v.31, no.5, pp.628-630 40
Journal
2009 Fuzzy Fingerprint Vault using Multiple Polynomials   문대성   정보보호학회논문지, v.19, no.1, pp.125-133
Conference
2009 Fuzzy Fingerprint Vault using Multiple Polynomials   Dae Sung Moon   International Symposium on Consumer Electronics (ISCE) 2009, pp.290-293 19
Conference
2009 Fingerprint Template Protection using Fuzzy Vault Scheme   문대성   통신 정보 합동 학술 대회 (JCCI) 2009, pp.181-185
Conference
2009 A New Alignment Algorithm of Fuzzy Fingerprint Vault without Extra Information   W.Y. Choi   International Conference on Artificial Intelligence and Applications (AIA) 2009, pp.197-201
Journal
2009 Fuzzy Fingerprint Vault using Multiple Polynomials   문대성   정보보호학회논문지, v.19, no.1, pp.125-133
Conference
2008 Performance Analysis of Hybrid Fingerprint Matching Methods   Jong Ku Kim  International Conference on Future Generation Communication and Networking (FGCN) 2008, pp.66-69 2
Journal
2008 A Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault   Woo Yong Choi   IEICE Electronics Express, v.5, no.18, pp.725-731 6
Conference
2008 Implementation of Automatic Fuzzy Fingerprint Vault   Dae Sung Moon   International Conference on Machine Learning and Cybernetics (ICMLC) 2008, pp.3781-3786 17
Conference
2007 Fingerprint Template Protection Using Fuzzy Vault   Dae Sung Moon   International Conference on Computational Science and its Applications (ICCSA) 2007 (LNCS 4707), v.4707, pp.1141-1151
Conference
2007 Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table   Sung Ju Lee  International Conference on Adaptive and Natural Computing Algorithms (ICANNGA) 2007 (LNCS 4432), v.4432, pp.432-439 15
Conference
2006 Capacity Planning for Scalable Fingerprint Authentication   Byung Kwan Park  International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.906-915 0
Journal
2006 A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors   문대성   멀티미디어학회논문지, v.9, no.10, pp.1304-1313
Conference
2006 A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication   Sung Bum Pan  International Conference on Computational Intelligence and Security (CIS) 2006, pp.1217-1220 5
Conference
2006 Mutual Authentication using Fuzzy Fingerprint Vault   Dae Sung Moon   International Conference on Computational Intelligence and Security (ICCIAS) 2006, pp.878-881 1
Conference
2006 Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords   Dae Sung Moon   International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.100-109 1
Conference
2006 Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification   Byung Kwan Park  International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.110-120 4
Journal
2006 An Efficient Selective Encryption of Fingerprint Images for Embedded Processors   Dae Sung Moon   ETRI Journal, v.28, no.4, pp.444-452 37
Conference
2006 Fingerprint Template Protection Using Fuzzy Vault   Dae Sung Moon   한국정보보호학회 학술 대회 (하계) 2006, v.16, no.1, pp.123-132
Conference
2005 Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems   Dae Sung Moon   International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.635-642 16
Conference
2005 Hiding Biometric Data for Secure Transmission   Yong Wha Chung  International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES) 2005 (LNCS 3683), v.3683, pp.1049-1057 7
Conference
2005 Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors   Dae Sung Moon   International Conference on Image Analysis and Recognition (ICIAR) 2005 (LNCS 3656), v.3656, pp.1106-1117 0
Journal
2005 An Watermarking Algorithm for Multimodal Biometric Systems   문대성   통신정보보호학회논문지, v.15, no.4, pp.93-100
Conference
2004 Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model   Yong Wha Chung  Parallel and Distributed Computing: Applications and Technologies 2004 (LNCS 3320), v.3320, pp.833-838 3
Conference
2004 A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems   Yong Wha Chung  International Conference Image Analysis and Recognition (ICIAR) 2004 (LNCS 3212), v.3212, pp.770-777 3
Conference
2003 Fingerprint-Based Authentication for USB Token Systems   Dae Sung Moon   International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.355-364 5
Journal
2003 Implementation of A Security Token System using Fingerprint Verification   문대성   정보보호학회논문지, v.13, no.4, pp.63-70
Journal
2003 An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card   Sung Bum Pan   IEEE Transactions on Consumer Electronics, v.49, no.2, pp.453-459 30
Conference
2003 A Hardware Implementation for Real-Time GH   김민   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1921-1924
Conference
2003 The Hardware Implementation of Speaker Verification System Using Support Vector Machine   황병희   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1933-1936
Conference
2002 Fingerprint Verification System Involving Smart Card   Youn Hee Gil   International Conference on Information Security and Cryptology (ICISC) 2002 (LNCS 2587), v.2587, pp.510-524 4
Conference
2002 A Fingerprint Match-on-Card System for the User Authentication   문대성   통신 정보 합동 학술 대회 (JCCI) 2002, pp.193-193
Conference
2001 Memory Constraint Fingerprint Authentication Algorithm   길연희   한국정보과학회 CVPR 연구회 워크샵 (추계) 2001, pp.67-68
Journal
2001 A Face Detection Method using Gradual Expansion of Skin Color Range   문대성   멀티미디어학회논문지, v.4, no.5, pp.396-405