|
Conference
|
2025 |
Encrypted Network Traffic Feature Extraction for Application Classification
Yangseo Choi
International Conference on Information and Communication Technology Convergence (ICTC) 2025, pp.937-938 |
|
|
|
Journal
|
2024 |
A Novel Approach for Application Classification with Encrypted Traffic using BERT and Packet Headers
Jaehak Yu
Computer Networks, v.254, pp.1-12 |
5 |
|
|
Conference
|
2024 |
Considerations of Using the Network Traffic Dataset for Machine Learning Algorithms
Yangseo Choi
International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.427-428 |
0 |
|
|
Journal
|
2023 |
Trends of Encrypted Network Traffic Analysis Technologies for Network Anomaly Detection
최양서
전자통신동향분석, v.38, no.5, pp.71-80 |
|
|
|
Journal
|
2022 |
Technological Trends in Intelligent Cyber Range
유재학
전자통신동향분석, v.37, no.4, pp.36-45 |
|
|
|
Journal
|
2022 |
An Analysis of Security Vulnerabilities Using 5G NAS COUNT
김민재
정보보호학회논문지, v.32, no.3, pp.565-573 |
|
|
|
Journal
|
2022 |
Attack Graph Generation with Machine Learning for Network Security
Kijong Koo
Electronics, v.11, no.9, pp.1-25 |
13 |
|
|
Conference
|
2022 |
정보보호 분야에서의 사이버 레인지 기술 동향
유재학
한국정보처리학회 학술 발표 대회 (춘계) 2022, pp.208-211 |
|
|
|
Journal
|
2021 |
Security Technology Trends to Prevent Medical Device Hacking and Ransomware
권혁찬
전자통신동향분석, v.36, no.5, pp.21-31 |
|
|
|
Journal
|
2021 |
Analysis of Current 5G Open-Source Projects
김민재
전자통신동향분석, v.36, no.2, pp.83-92 |
|
|
|
Journal
|
2020 |
5G Edge Security Technology Trend
박종근
정보보호학회지, v.30, no.6, pp.7-16 |
|
|
|
Conference
|
2020 |
Attrack Graph Learning with Machine Lerning
Kijong Koo
International Conference on Multimedia Information Technology and Applications (MITA) 2020, pp.97-98 |
|
|
|
Conference
|
2020 |
Long-Term Evolution Vulnerability Focusing on System Information Block Messages
Minjae Kim
International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.837-842 |
1 |
|
|
Journal
|
2020 |
Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments
김영수
정보과학회지, v.38, no.9, pp.16-24 |
|
|
|
Journal
|
2020 |
Technological Trends in Cyber Attack Simulations
이주영
전자통신동향분석, v.35, no.1, pp.34-48 |
|
|
|
Journal
|
2019 |
Attack Surface Expansion through Decoy Trap for Protected Servers in Moving Target Defense
Tae-Keun Park
한국컴퓨터정보학회논문지, v.24, no.10, pp.25-32 |
|
|
|
Journal
|
2019 |
5G Security Architectural Features and Key Improvements in 3GPP Standard
박종근
정보보호학회지, v.29, no.5, pp.21-30 |
|
|
|
Journal
|
2019 |
An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks
Tae-Keun Park
한국컴퓨터정보학회논문지, v.24, no.9, pp.35-42 |
|
|
|
Journal
|
2019 |
A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph
Jooyoung Lee
Journal of Supercomputing, v.75, no.6, pp.3028-3045 |
18 |
|
|
Conference
|
2018 |
Design of a Framework for OS Fingerprint Obfuscation
안성범
한국정보과학회 컴퓨터 통신 워크샵 (SWCC) (하계) 2018, pp.50-52 |
|
|
|
Journal
|
2018 |
Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat
Kyungmin Park
Symmetry, v.10, no.1, pp.1-16 |
19 |
|
|
Journal
|
2017 |
네트워크 주소 이동 기술 동향
박경민
전자통신동향분석, v.32, no.6, pp.73-82 |
|
|
|
Conference
|
2017 |
Design System Architecture for Network Address Mutation
안성범
한국정보보호학회 학술 대회 (동계) 2017, pp.1-4 |
|
|
|
Journal
|
2017 |
Analysis of Threat Model and Requirements in Network-based Moving Target Defense
Koo-Hong Kang
한국컴퓨터정보학회논문지, v.22, no.10, pp.83-92 |
|
|
|
Journal
|
2017 |
DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks
Daesung Moon
Journal of Supercomputing, v.73, no.7, pp.2881-2895 |
125 |
|
|
Conference
|
2017 |
네트워크 보안 솔루션의 취약점을 이용한 공격시나리오 연구
황호
한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.1-3 |
|
|
|
Journal
|
2016 |
Host-based Intrusion Detection System for Secure Human-centric Computing
Daesung Moon
Journal of Supercomputing, v.72, no.7, pp.2520-2536 |
36 |
|
|
Journal
|
2016 |
RTNSS: A Routing Trace-based Network Security System for Preventing ARP Spoofing Attacks
Daesung Moon
Journal of Supercomputing, v.72, no.5, pp.1740-1756 |
9 |
|
|
Journal
|
2016 |
Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis
황호
정보보호학회논문지, v.26, no.2, pp.377-386 |
|
|
|
Journal
|
2015 |
Real-Time Abnormal Behavior Detection System Based on Fast Data
이명철
정보보호학회논문지, v.25, no.5, pp.1027-1041 |
|
|
|
Journal
|
2015 |
Robust Multi-person Tracking for Real-Time Intelligent Video Surveillance
Jin-Woo Choi
ETRI Journal, v.37, no.3, pp.551-561 |
42 |
|
|
Conference
|
2015 |
Trend and Issue Dynamic Analysis for Malware
황호
한국정보처리학회 학술 발표 대회 (춘계) 2015, pp.418-420 |
|
|
|
Journal
|
2015 |
Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space
Hansung Lee
KSII Transactions on Internet and Information Systems, v.9, no.3, pp.1173-1192 |
5 |
|
|
Conference
|
2015 |
Host Behavior Characteristic Description Method Against APT Attack Detection
Moon Daesung
World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7 |
|
|
|
Journal
|
2014 |
MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats
Daesung Moon
Symmetry, v.6, no.4, pp.997-1010 |
34 |
|
|
Journal
|
2014 |
Host based Feature Description Method for Detecting APT Attack
문대성
정보보호학회논문지, v.24, no.5, pp.839-850 |
|
|
|
Journal
|
2014 |
Improved cancelable fingerprint templates using minutiae‐based functional transform
Daesung Moon
Security and Communication Networks, v.7, no.10, pp.1543-1551 |
15 |
|
|
Conference
|
2014 |
Unsupervised Clustering of Malware based on Behaviour Analysis
이한성
한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 |
|
|
|
Conference
|
2014 |
Feature Extraction for Host based Anomaly Detection
문대성
대한전자공학회 종합 학술 대회 (하계) 2014, pp.591-594 |
|
|
|
Conference
|
2013 |
Pedestrian Detection System for Vehicle Mounted Camera
문대성
통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2 |
|
|
|
Conference
|
2013 |
다중 알고리즘 기반 실시간 사람 검출
문대성
영상 처리 및 이해에 관한 워크샵 (IPIU) 2013, pp.1-4 |
|
|
|
Conference
|
2012 |
Biometrics Information Protection using Fuzzy Vault Scheme
Ki Young Moon
International Conference on Signal-Image Technology and Internet-Based Systems (SITIS) 2012, pp.124-128 |
16 |
|
|
Conference
|
2012 |
Human Detection Using Sparse Recognition Classifier with Histogram of Oriented Gradient
이한성
한국정보과학회 학술 발표 (가을) 2012, pp.B222-B224 |
|
|
|
Conference
|
2012 |
CCTV 환경을 위한 실시간 사람 검출 시스템
문대성
영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-4 |
|
|
|
Conference
|
2012 |
고정-PTZ 카메라 제어 기반의 원거리 얼굴 검출 방법
이한성
영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-4 |
|
|
|
Conference
|
2011 |
Adaptive Human Detection Method based on the Distance from a Camera
문대성
통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 |
|
|
|
Journal
|
2011 |
Robust Fuzzy Fingerprint Vault System against Correlation Attack
문대성
정보보호학회논문지, v.21, no.2, pp.13-25 |
|
|
|
Conference
|
2011 |
A Secure Fingerprint Template Generation Algorithm for Smart Card
Daesung Moon
International Conference on Consumer Electronics (ICCE) 2011, pp.719-720 |
2 |
|
|
Journal
|
2010 |
Recovery of Flash Memories for Reliable Mobile Storages
Daesung Moon
Mobile Information Systems, v.6, no.2, pp.177-191 |
6 |
|
|
Conference
|
2010 |
Secure Fuzzy Fingerprint Vault System
문대성
대한전자공학회 종합 학술 대회 (하계) 2010, pp.1660-1663 |
|
|