Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2024 | A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers Jaehak Yu Computer Networks, v.254, pp.1-12 | 1 | |
Conference
|
2024 | Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms Yangseo Choi International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.427-428 | ||
Journal
|
2023 | Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection 최양서 전자통신동향분석, v.38, no.5, pp.71-80 | ||
Journal
|
2022 | Technological Trends in Intelligent Cyber Range 유재학 전자통신동향분석, v.37, no.4, pp.36-45 | ||
Journal
|
2022 | An Analysis of Security Vulnerabilities Using 5G NAS COUNT 김민재 정보보호학회논문지, v.32, no.3, pp.565-573 | ||
Journal
|
2022 | Attack Graph Generation with Machine Learning for Network Security Kijong Koo Electronics, v.11, no.9, pp.1-25 | 6 | |
Conference
|
2022 | 정보보호 분야에서의 사이버 레인지 기술 동향 유재학 한국정보처리학회 학술 발표 대회 (춘계) 2022, pp.208-211 | ||
Journal
|
2021 | Security Technology Trends to Prevent Medical Device Hacking and Ransomware 권혁찬 전자통신동향분석, v.36, no.5, pp.21-31 | ||
Journal
|
2021 | Analysis of Current 5G Open-Source Projects 김민재 전자통신동향분석, v.36, no.2, pp.83-92 | ||
Journal
|
2020 | 5G Edge Security Technology Trend 박종근 정보보호학회지, v.30, no.6, pp.7-16 | ||
Conference
|
2020 | Attrack Graph Learning with Machine Lerning Kijong Koo International Conference on Multimedia Information Technology and Applications (MITA) 2020, pp.97-98 | ||
Conference
|
2020 | Long-Term Evolution Vulnerability Focusing on System Information Block Messages Minjae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.837-842 | 0 | |
Journal
|
2020 | Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments 김영수 정보과학회지, v.38, no.9, pp.16-24 | ||
Journal
|
2020 | Technological Trends in Cyber Attack Simulations 이주영 전자통신동향분석, v.35, no.1, pp.34-48 | ||
Journal
|
2019 | 5G Security Architectural Features and Key Improvements in 3GPP Standard 박종근 정보보호학회지, v.29, no.5, pp.21-30 | ||
Journal
|
2019 | Attack Surface Expansion through Decoy Trap for Protected Servers in Moving Target Defense Tae-Keun Park 한국컴퓨터정보학회논문지, v.24, no.10, pp.25-32 | ||
Journal
|
2019 | An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks Tae-Keun Park 한국컴퓨터정보학회논문지, v.24, no.9, pp.35-42 | ||
Journal
|
2019 | A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph Jooyoung Lee Journal of Supercomputing, v.75, no.6, pp.3028-3045 | 16 | |
Conference
|
2018 | Design of a Framework for OS Fingerprint Obfuscation 안성범 한국정보과학회 컴퓨터 통신 워크샵 (SWCC) (하계) 2018, pp.50-52 | ||
Journal
|
2018 | Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat Kyungmin Park Symmetry, v.10, no.1, pp.1-16 | 17 | |
Journal
|
2017 | 네트워크 주소 이동 기술 동향 박경민 전자통신동향분석, v.32, no.6, pp.73-82 | ||
Conference
|
2017 | Design System Architecture for Network Address Mutation 안성범 한국정보보호학회 학술 대회 (동계) 2017, pp.1-4 | ||
Journal
|
2017 | Analysis of Threat Model and Requirements in Network-based Moving Target Defense Koo-Hong Kang 한국컴퓨터정보학회논문지, v.22, no.10, pp.83-92 | ||
Journal
|
2017 | DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks Daesung Moon Journal of Supercomputing, v.73, no.7, pp.2881-2895 | 113 | |
Conference
|
2017 | 네트워크 보안 솔루션의 취약점을 이용한 공격시나리오 연구 황호 한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.1-3 | ||
Journal
|
2016 | Host-based Intrusion Detection System for Secure Human-centric Computing Daesung Moon Journal of Supercomputing, v.72, no.7, pp.2520-2536 | 34 | |
Journal
|
2016 | RTNSS: A Routing Trace-based Network Security System for Preventing ARP Spoofing Attacks Daesung Moon Journal of Supercomputing, v.72, no.5, pp.1740-1756 | 8 | |
Journal
|
2016 | Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis 황호 정보보호학회논문지, v.26, no.2, pp.377-386 | ||
Journal
|
2015 | Real-Time Abnormal Behavior Detection System Based on Fast Data 이명철 정보보호학회논문지, v.25, no.5, pp.1027-1041 | ||
Journal
|
2015 | Robust Multi-person Tracking for Real-Time Intelligent Video Surveillance Jin-Woo Choi ETRI Journal, v.37, no.3, pp.551-561 | 41 | |
Conference
|
2015 | Trend and Issue Dynamic Analysis for Malware 황호 한국정보처리학회 학술 발표 대회 (춘계) 2015, pp.418-420 | ||
Journal
|
2015 | Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space Hansung Lee KSII Transactions on Internet and Information Systems, v.9, no.3, pp.1173-1192 | 5 | |
Conference
|
2015 | Host Behavior Characteristic Description Method Against APT Attack Detection Moon Daesung World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7 | ||
Journal
|
2014 | MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats Daesung Moon Symmetry, v.6, no.4, pp.997-1010 | 30 | |
Journal
|
2014 | Host based Feature Description Method for Detecting APT Attack 문대성 정보보호학회논문지, v.24, no.5, pp.839-850 | ||
Journal
|
2014 | Improved cancelable fingerprint templates using minutiae‐based functional transform Daesung Moon Security and Communication Networks, v.7, no.10, pp.1543-1551 | 15 | |
Conference
|
2014 | Unsupervised Clustering of Malware based on Behaviour Analysis 이한성 한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 | ||
Conference
|
2014 | Feature Extraction for Host based Anomaly Detection 문대성 대한전자공학회 종합 학술 대회 (하계) 2014, pp.591-594 | ||
Conference
|
2013 | Pedestrian Detection System for Vehicle Mounted Camera 문대성 통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2 | ||
Conference
|
2013 | 다중 알고리즘 기반 실시간 사람 검출 문대성 영상 처리 및 이해에 관한 워크샵 (IPIU) 2013, pp.1-4 | ||
Conference
|
2012 | Human Detection Using Sparse Recognition Classifier with Histogram of Oriented Gradient 이한성 한국정보과학회 학술 발표 (가을) 2012, pp.B222-B224 | ||
Conference
|
2012 | Biometrics Information Protection using Fuzzy Vault Scheme Ki Young Moon International Conference on Signal-Image Technology and Internet-Based Systems (SITIS) 2012, pp.124-128 | 14 | |
Conference
|
2012 | 고정-PTZ 카메라 제어 기반의 원거리 얼굴 검출 방법 이한성 영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-4 | ||
Conference
|
2012 | CCTV 환경을 위한 실시간 사람 검출 시스템 문대성 영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-4 | ||
Conference
|
2011 | Adaptive Human Detection Method based on the Distance from a Camera 문대성 통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 | ||
Journal
|
2011 | Robust Fuzzy Fingerprint Vault System against Correlation Attack 문대성 정보보호학회논문지, v.21, no.2, pp.13-25 | ||
Conference
|
2011 | A Secure Fingerprint Template Generation Algorithm for Smart Card Daesung Moon International Conference on Consumer Electronics (ICCE) 2011, pp.719-720 | 2 | |
Journal
|
2010 | Recovery of Flash Memories for Reliable Mobile Storages Daesung Moon Mobile Information Systems, v.6, no.2, pp.177-191 | 6 | |
Conference
|
2010 | Secure Fuzzy Fingerprint Vault System 문대성 대한전자공학회 종합 학술 대회 (하계) 2010, pp.1660-1663 | ||
Journal
|
2009 | Dictionary Attack on Functional Transform-Based Cancelable Fingerprint Templates Sang Wook Shin ETRI Journal, v.31, no.5, pp.628-630 | 41 | |
Journal
|
2009 | Fuzzy Fingerprint Vault using Multiple Polynomials 문대성 정보보호학회논문지, v.19, no.1, pp.125-133 | ||
Conference
|
2009 | Fuzzy Fingerprint Vault using Multiple Polynomials Dae Sung Moon International Symposium on Consumer Electronics (ISCE) 2009, pp.290-293 | 19 | |
Conference
|
2009 | Fingerprint Template Protection using Fuzzy Vault Scheme 문대성 통신 정보 합동 학술 대회 (JCCI) 2009, pp.181-185 | ||
Conference
|
2009 | A New Alignment Algorithm of Fuzzy Fingerprint Vault without Extra Information W.Y. Choi International Conference on Artificial Intelligence and Applications (AIA) 2009, pp.197-201 | ||
Journal
|
2009 | Fuzzy Fingerprint Vault using Multiple Polynomials 문대성 정보보호학회논문지, v.19, no.1, pp.125-133 | ||
Conference
|
2008 | Performance Analysis of Hybrid Fingerprint Matching Methods Jong Ku Kim International Conference on Future Generation Communication and Networking (FGCN) 2008, pp.66-69 | 2 | |
Journal
|
2008 | A Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault Woo Yong Choi IEICE Electronics Express, v.5, no.18, pp.725-731 | 6 | |
Conference
|
2008 | Implementation of Automatic Fuzzy Fingerprint Vault Dae Sung Moon International Conference on Machine Learning and Cybernetics (ICMLC) 2008, pp.3781-3786 | 17 | |
Conference
|
2007 | Fingerprint Template Protection Using Fuzzy Vault Dae Sung Moon International Conference on Computational Science and its Applications (ICCSA) 2007 (LNCS 4707), v.4707, pp.1141-1151 | ||
Conference
|
2007 | Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table Sung Ju Lee International Conference on Adaptive and Natural Computing Algorithms (ICANNGA) 2007 (LNCS 4432), v.4432, pp.432-439 | 15 | |
Conference
|
2006 | Capacity Planning for Scalable Fingerprint Authentication Byung Kwan Park International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES) 2006 (LNCS 4251), v.4251, pp.906-915 | 0 | |
Conference
|
2006 | A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication Sung Bum Pan International Conference on Computational Intelligence and Security (CIS) 2006, pp.1217-1220 | 5 | |
Conference
|
2006 | Mutual Authentication using Fuzzy Fingerprint Vault Dae Sung Moon International Conference on Computational Intelligence and Security (ICCIAS) 2006, pp.878-881 | 1 | |
Journal
|
2006 | A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors 문대성 멀티미디어학회논문지, v.9, no.10, pp.1304-1313 | ||
Journal
|
2006 | An Efficient Selective Encryption of Fingerprint Images for Embedded Processors Dae Sung Moon ETRI Journal, v.28, no.4, pp.444-452 | 37 | |
Conference
|
2006 | Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification Byung Kwan Park International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.110-120 | 4 | |
Conference
|
2006 | Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords Dae Sung Moon International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.100-109 | 1 | |
Conference
|
2006 | Fingerprint Template Protection Using Fuzzy Vault Dae Sung Moon 한국정보보호학회 학술 대회 (하계) 2006, v.16, no.1, pp.123-132 | ||
Conference
|
2005 | Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems Dae Sung Moon International Conference on Computational and Information Science (CIS) 2005 (LNCS 3802), v.3802, pp.635-642 | 16 | |
Conference
|
2005 | Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors Dae Sung Moon International Conference on Image Analysis and Recognition (ICIAR) 2005 (LNCS 3656), v.3656, pp.1106-1117 | 0 | |
Conference
|
2005 | Hiding Biometric Data for Secure Transmission Yong Wha Chung International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES) 2005 (LNCS 3683), v.3683, pp.1049-1057 | 7 | |
Journal
|
2005 | An Watermarking Algorithm for Multimodal Biometric Systems 문대성 통신정보보호학회논문지, v.15, no.4, pp.93-100 | ||
Conference
|
2004 | Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model Yong Wha Chung Parallel and Distributed Computing: Applications and Technologies 2004 (LNCS 3320), v.3320, pp.833-838 | 3 | |
Conference
|
2004 | A Hardware Implementation of Fingerprint Verification for Secure Biometric Authentication Systems Yong Wha Chung International Conference Image Analysis and Recognition (ICIAR) 2004 (LNCS 3212), v.3212, pp.770-777 | 3 | |
Journal
|
2003 | Implementation of A Security Token System using Fingerprint Verification 문대성 정보보호학회논문지, v.13, no.4, pp.63-70 | ||
Conference
|
2003 | Fingerprint-Based Authentication for USB Token Systems Dae Sung Moon International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.355-364 | 5 | |
Conference
|
2003 | The Hardware Implementation of Speaker Verification System Using Support Vector Machine 황병희 한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1933-1936 | ||
Journal
|
2003 | An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card Sung Bum Pan IEEE Transactions on Consumer Electronics, v.49, no.2, pp.453-459 | 30 | |
Conference
|
2003 | A Hardware Implementation for Real-Time GH 김민 한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1921-1924 | ||
Conference
|
2002 | Fingerprint Verification System Involving Smart Card Youn Hee Gil International Conference on Information Security and Cryptology (ICISC) 2002 (LNCS 2587), v.2587, pp.510-524 | 4 | |
Conference
|
2002 | A Fingerprint Match-on-Card System for the User Authentication 문대성 통신 정보 합동 학술 대회 (JCCI) 2002, pp.193-193 | ||
Conference
|
2001 | Memory Constraint Fingerprint Authentication Algorithm 길연희 한국정보과학회 CVPR 연구회 워크샵 (추계) 2001, pp.67-68 | ||
Journal
|
2001 | A Face Detection Method using Gradual Expansion of Skin Color Range 문대성 멀티미디어학회논문지, v.4, no.5, pp.396-405 |