Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | A Study on Security Enhancement for FIDO Attestation 김영세 전자 정보 통신 학술 대회 (CEIC) 2024, pp.244-247 | ||
Journal
|
2024 | TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies 이재훈 전자통신동향분석, v.39, no.5, pp.49-60 | ||
Conference
|
2024 | Introduction to System Integrity Verification Technology 김도형 한국인터넷정보학회 학술 발표 대회 (추계) 2024, pp.307-308 | ||
Journal
|
2024 | Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study Youngho Kim KSII Transactions on Internet and Information Systems, v.18, no.9, pp.2665-2691 | 0 | |
Journal
|
2024 | A Comprehensive Survey of TPM for Defense Systems Cheol Ryu KSII Transactions on Internet and Information Systems, v.18, no.7, pp.1953-1967 | 0 | |
Journal
|
2023 | Private 5G Network Trends and Security Technologies 박종근 정보와 통신: 한국통신학회지, v.40, no.9, pp.21-29 | ||
Journal
|
2022 | Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy 이윤경 정보보호학회논문지, v.32, no.6, pp.1-12 | ||
Conference
|
2022 | An IoT Device-trusted Remote Attestation Framework Kyeong Tae Kim International Conference on Advanced Communications Technology (ICACT) 2022, pp.218-223 | 5 | |
Conference
|
2021 | IoT Standard Platform Architecture that Provides Defense against DDoS Attacks Yun-kyung Lee International Conference on Consumer Electronics (ICCE) 2021 : Asia, pp.394-396 | 0 | |
Journal
|
2021 | A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools Song-Yi Hwang Sensors, v.21, no.21, pp.1-23 | 6 | |
Journal
|
2021 | Bootstrapping Security Technology in IoT 김영호 주간기술동향, v.2009, pp.14-28 | ||
Journal
|
2021 | Implementation of Smart Segmentation Framework for Preventing Security Threats Spreading in IoT Networks 임재덕 한국통신학회논문지, v.46, no.8, pp.1321-1331 | 0 | |
Journal
|
2021 | A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT infrastructure 황송이 정보보호학회논문지, v.31, no.4, pp.617-635 | ||
Conference
|
2020 | Dynamic Security Policy Model for Mitigating Threat Spreading in IoT 손선경 전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3 | ||
Conference
|
2020 | Hierarchical Access Control for SDP-IoT Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1742-1744 | 2 | |
Conference
|
2020 | Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT Jaedeok Lim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 | 2 | |
Journal
|
2020 | TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things Eunsang Cho Computer Networks, v.175, pp.1-15 | 7 | |
Conference
|
2019 | A Study on the Automated Attack Tool of IoT Bot for Verification about Security Technique of IoT device 황송이 한국정보보호학회 학술 대회 (동계) 2019, pp.81-84 | ||
Conference
|
2019 | A Study on the Technique of DDoS Attack Based on Mirai IoT Botnet 황송이 한국통신학회 종합 학술 발표회 (추계) 2019, pp.332-333 | ||
Journal
|
2019 | Security trend and issue of connected medical device 권혁찬 주간기술동향, v.1911, pp.14-26 | ||
Conference
|
2019 | Implementation of Remote Attestation and Management Framework for TPM-based IoT devices 임재덕 통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2 | ||
Conference
|
2019 | Improving IoT network security using SDP 이윤경 통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2 | ||
Journal
|
2018 | A study of end-to-end message security protocol based on lightweight ciphers for smart IoT devices 김희정 정보보호학회논문지, v.28, no.6, pp.1309-1317 | ||
Journal
|
2018 | Secure Mobile Device Structure for Trust IoT Yun-kyung Lee Journal of Supercomputing, v.74, no.12, pp.6646-6664 | 7 | |
Conference
|
2018 | Implementation of TLS and DTLS on Zephyr OS for IoT Devices Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1292-1294 | 12 | |
Conference
|
2018 | An Energy Efficient Real-Time MAC Protocol Kyeong Tae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1180-1184 | 1 | |
Conference
|
2018 | Design and Implementation of Lightweight Mutual Authentication Method in IoT 윤승용 통신 정보 합동 학술 대회 (JCCI) 2018, pp.378-379 | ||
Conference
|
2018 | A Method for Updating Secret Keys between IoT Devices using Dynamic Session Keys 한진희 통신 정보 합동 학술 대회 (JCCI) 2018, pp.301-302 | ||
Conference
|
2018 | A Performance Analysis of Lightweight Cryptography in IoT Devices 김영세 통신 정보 합동 학술 대회 (JCCI) 2018, pp.327-328 | ||
Conference
|
2018 | Trusted Mobile Zone Solution Based on Virtualization Technology GeonLyang Kim International Conference on Universal Accessibility in the Internet of Things and Smart Environments (SMART ACCESSIBILITY) 2018, pp.10-11 | ||
Conference
|
2018 | RIPPLE: Adaptive Fine-grained Access Control in Multi-hop LLNs Youngho Kim International Conference on Information Networking (ICOIN) 2018, pp.863-868 | 3 | |
Conference
|
2017 | Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim International Conference on Future Generation Communication and Networking (FGCN) 2017 (ASTL 146), pp.75-80 | ||
Conference
|
2017 | A Lightweight Authentication Mechanism between IoT Devices Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1154-1156 | 19 | |
Conference
|
2017 | Implementation of An Access Control Technology for Internet of Things Environments Daewon Kim International Conference on Communications, Computation, Networks and Technologies (INNOV) 2017, pp.17-19 | ||
Conference
|
2017 | Remote Security Management Server for IoT Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1163-1165 | 21 | |
Conference
|
2017 | Secure Voice Communication Service Based on Security Platform for Mobile Devices GeonLyang Kim International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1191-1193 | 1 | |
Conference
|
2017 | Mutual Authentication Scheme for Lightweight IoT Devices Seungyong Yoon International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017 | ||
Journal
|
2017 | Smart meter security through AMI security threat case analysis 이윤경 정보와 통신 : 한국통신학회지, v.34, no.10, pp.24-30 | ||
Conference
|
2017 | Towards Protected Firmware Verification in Low-power Devices Yong-Hyuk Moon International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017, pp.177-179 | ||
Conference
|
2017 | Network access control technology for AMI security 이윤경 한국통신학회 종합 학술 발표회 (하계) 2017, pp.1184-1185 | ||
Conference
|
2017 | A Lightweight Authentication Mechanism between IoT Devices 한진희 통신 정보 합동 학술 대회 (JCCI) 2017, pp.1-2 | ||
Journal
|
2017 | SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers Vishal Sharma Mobile Information Systems, v.2017, pp.1-17 | 19 | |
Conference
|
2017 | Security Considerations Based on Classification of IoT Device Capabilities Seungyong Yoon International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15 | ||
Conference
|
2017 | Mobile Security Solution for Sensitive Data Leakage Prevention GeonLyang Kim International Conference on Communications and Broadband Networking (ICCBN) 2017, pp.59-64 | 2 | |
Journal
|
2016 | Secure User Authentication based on the Trusted Platform for Mobile Devices GeonLyang Kim EURASIP Journal on Wireless Communications and Networking, v.2016, no.1, pp.1-15 | 7 | |
Conference
|
2016 | On the Feasibility of Remote Attestation for IoT Devices Yong-Hyuk Moon International Conference on Evolving Internet (INTERNET) 2016, pp.12-13 | ||
Conference
|
2016 | Analyzing Security Threats of Android-based Mobile Malware Seungyong Yoon International Conference on Security Technology (SecTech) 2016, pp.310-315 | ||
Conference
|
2016 | Common Security Requirements for Device Identification System in Internet of Things Daewon Kim International Conference on Security Technology (SecTech) 2016, pp.306-309 | ||
Conference
|
2016 | Consideration of Security Threats for Identification System in Internet of Things Daewon Kim International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68 | ||
Conference
|
2016 | Secure Mobile Device Management Based on Domain Separation GeonLyang Kim International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.918-920 | 5 | |
Conference
|
2016 | On-demand Security Configuration for IoT Devices Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 | 18 | |
Conference
|
2016 | A Scheme for Controlling Functionality of Mobile Device Using Specialized Codes Su-Wan Park Cyber Science and Technology Congress (CyberSciTech) 2016, pp.75-82 | 0 | |
Journal
|
2016 | SecureDom: Secure Mobile-sensitive Information Protection with Domain Separation Su-Wan Park Journal of Supercomputing, v.72, no.7, pp.2682-2702 | 7 | |
Journal
|
2016 | Implementation of Domain Separation-based Security Platform for Smart Device Jeong Nyeo Kim International Journal of Applied Engineering Research, v.11, no.10, pp.7017-7019 | 0 | |
Conference
|
2016 | A Study on the Security Features of Operating System for Lightweight IoT Devices 임재덕 한국통신학회 종합 학술 발표회 (하계) 2016, pp.1384-1385 | ||
Conference
|
2016 | Analysis of Smart Meter Hacking and Countermeasures 이윤경 한국정보보호학회 학술 대회 (하계) 2016, pp.1-4 | ||
Journal
|
2016 | Security Core Technology Implementation for Hardware-based Smart Devices JeongNyeo Kim International Journal of Applied Engineering Research, v.11, no.8, pp.5927-5930 | 0 | |
Conference
|
2016 | Trends and Requirements of Data Management Platform in IoT Environment Hwashin Moon International Conference on Green and Human Information Technology (ICGHIT) 2016, pp.140-141 | ||
Conference
|
2015 | A Study on the Hardware-based Security Solutions for Smart Devices Hongil Ju International Conference on Computational Science and Computational Intelligence (CSCI) 2015, pp.51-51 | ||
Journal
|
2015 | Analyzing User Awareness of Privacy Data Leak in Mobile Applications Youngho Kim Mobile Information Systems, v.2015, pp.1-12 | 23 | |
Conference
|
2015 | Dynamic Permission Re-Enforcement Technique for Protecting Application from Others with Over-Privileged Permission at Run Time Boheung Chung International Conference on Security Technology (SecTech) 2015, pp.13-16 | 1 | |
Journal
|
2015 | Implementation of a Hardware Security Chip for Mobile Devices Hongil Ju IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 | 13 | |
Conference
|
2015 | Supporting a Variety of Secure Services Based on MTM Seungyong Yoon International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20 | ||
Conference
|
2015 | Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection Daewon Kim International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3 | ||
Conference
|
2015 | Smart Meter and Smart Meter Security Yun-kyung Lee International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3 | ||
Conference
|
2015 | Mobile Security Technology for Smart Devices Seungyong Yoon International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176 | ||
Conference
|
2015 | Trusted Military Services Based on the Secure Domain of the Mobile Security Solution GeonLyang Kim International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131 | ||
Conference
|
2015 | Security Considerations for Secure and Trustworthy Smart Home System in the IoT Environment Jin-Hee Han International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1119-1121 | ||
Conference
|
2015 | Technology Trends of Access Control in IoT and Requirements Analysis Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1034-1036 | ||
Conference
|
2015 | Cyber Security Technology for Big Change 손명희 한국스마트미디어학회 학술 대회 (추계) 2015, pp.121-123 | ||
Conference
|
2015 | A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179 | ||
Journal
|
2015 | 클라우드 보안 개요 권혁찬 정보와 통신 : 한국통신학회지, v.32, no.10, pp.71-76 | ||
Journal
|
2015 | A Multi-Resolution Port Scan Detection Technique for High-Speed Networks Hwashin Moon Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 | 2 | |
Conference
|
2015 | The Secure Urgent Situation Propagation System Using the Mobile Security Solution GeonLyang Kim International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) 2015, pp.109-114 | 2 | |
Conference
|
2015 | Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device Hyeokchan Kwon International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 | 0 | |
Journal
|
2015 | 온라인 아동 보호 나재훈 정보보호학회지, v.25, no.4, pp.39-43 | ||
Journal
|
2015 | Implementation of a MTM-based secure OTP Generator for IoT Devices 김영세 대한임베디드공학회논문지, v.10, no.4, pp.199-206 | ||
Conference
|
2015 | A Simple Method for Protecting Privacy in Video Surveillance Jang-Hee Yoo US-Korea Conference on Science, Technology, and Entrepreneurship (UKC) 2015, pp.138-138 | ||
Conference
|
2015 | Cloud-Based Android Botnet Malware Detection System Suyash Jadhav International Conference on Advanced Communication Technology (ICACT) 2015, pp.347-352 | 17 | |
Conference
|
2015 | Mobile Device Penetration Testing Framework and Platform for the Mobile Device Security Course Suyash Jadhav International Conference on Advanced Communication Technology (ICACT) 2015, pp.675-680 | 6 | |
Conference
|
2015 | A Secure Storage Mechanism for Mobile Device Security Platform Based on Domain Separation Su-Wan Park International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2015, pp.1-7 | ||
Journal
|
2015 | Service and Content Protection Technology Trend Based on Web Mashup 나재훈 한국정보기술학회지, v.13, no.1, pp.13-17 | ||
Conference
|
2015 | A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology Kyung-Soo Lim International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 | 3 | |
Journal
|
2015 | A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization Su-Wan Park International Journal of Distributed Sensor Networks, v.2015, pp.1-9 | 11 | |
Journal
|
2015 | 차세대 IoT 네트워크 보안 현황 권혁찬 정보처리학회지, v.22, no.2, pp.39-46 | ||
Conference
|
2015 | Improving MTM-Based Session & Key Management Seungyong Yoon International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334 | ||
Conference
|
2015 | A Protection Method of Mobile Sensitive Data and Applications over Escrow Service Su-Wan Park Global Conference on Information Technology, Computing, and Applications (Global IT) 2015, pp.1-10 | ||
Conference
|
2014 | Secure Filesystem for Trusted Virtual Domain in Mobile Device Su-Wan Park International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.411-417 | 0 | |
Conference
|
2014 | Mobile Device Security Framework Based on Domain Separation and Use Case Yun-kyung Lee Korea-Vietnam International Workshop on Information and Communications 2014, pp.1-4 | ||
Conference
|
2014 | New Approach to Determine Metamorphic Malicious Mobile Code on Android based Smartphones Sangdon Kim International Conference on Internet (ICONI) 2014, pp.1-6 | ||
Conference
|
2014 | Application Authentication and Secure Key Management Scheme using MTM Jin-Hee Han International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946 | 0 | |
Conference
|
2014 | The Issue of Data Transfer for the Embedded SE on Mobile Devices HongIl Ju International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.317-322 | 0 | |
Journal
|
2014 | Efficient DRM Mechanism of Scalable Contents Based on H.264/SVC in Convergence Environment Su-Wan Park Multimedia Tools and Applications, v.73, no.2, pp.841-855 | 1 | |
Conference
|
2014 | Reducing the Impact of Repackaged App on Android Hwashin Moon International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.800-801 | 3 | |
Conference
|
2014 | Protection Method from APP Repackaging Attack on Mobile Device with Separated Domain Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.667-668 | 3 | |
Conference
|
2014 | A Secure Channel Establishment Method on a Hardware Security Module Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.555-556 | 4 | |
Conference
|
2014 | A Secure Message Service Using the Secure Domain of a Mobile Security Solution GeonLyang Kim International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.619-620 | 1 | |
Conference
|
2014 | User-Defined Privilege Restriction Mechanism for Secure Execution Environments on Android Boheung Chung International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.815-816 | 1 | |
Conference
|
2014 | Functional Considerations in Military-Grade Security Platform using a Mobile Hypervisor Kyung-Soo Lim International Conference on Information Technology Convergence and Services (ITCS) 2014 (LNEE 330), v.330, pp.1413-1418 | 2 | |
Conference
|
2014 | A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device Jong-Yeon Park International Conference on IT Convergence and Security (ICITCS) 2014, pp.1-4 | 3 | |
Journal
|
2014 | Automated and Coupled Services of Advanced Smart Surveillance Systems Toward Green IT: Tracking, Retrieval and Digital Evidence Su-Wan Park Journal of Supercomputing, v.69, no.3, pp.1215-1234 | 1 | |
Conference
|
2014 | Unsupervised Clustering of Malware based on Behaviour Analysis 이한성 한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 | ||
Conference
|
2014 | 도메인 분리 기반 모바일 단말에서의 앱 리패키징 공격 방어 기법 이윤경 한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 | ||
Journal
|
2014 | Wireless Fingerprinting Technology and Its Applications 정병호 전자통신동향분석, v.29, no.4, pp.110-122 | ||
Conference
|
2014 | Forensic Artifacts in Network Surveillance Systems Kyung-Soo Lim International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014 (LNEE 331), pp.341-348 | 1 | |
Journal
|
2014 | Improving Performance of X-Rated Video Classification with the Optimized Repeated Curve-Like Spectrum Feature and the Skip-and-Analysis Processing Jae-Deok Lim Multimedia Tools and Applications, v.71, no.2, pp.717-740 | 1 | |
Conference
|
2014 | The Design of TEE-based Security Platform in Mobile Device GeonLyang Kim International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2014, pp.1-3 | ||
Conference
|
2014 | A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys Daewon Kim International Conference on Mobile Services, Resources, and Users (MOBILITY) 2014, pp.1-5 | ||
Conference
|
2014 | Hidden Evasive Server-Side Polymorphic Malicious Apps Detection Mechanism on Android based Smart Phone Devices Daeyeol Moon International Conference on Convergence Technology (ICCT) 2014, pp.819-820 | ||
Conference
|
2014 | A Study on the Trusted App.-Based Access Control to the Isolated Trusted Execution Environment in Mobile Device 임재덕 한국통신학회 종합 학술 발표회 (하계) 2014, pp.364-365 | ||
Conference
|
2014 | A Study on Data Block Management for Mobile Cloud Computing Su-Wan Park International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA) 2014, pp.1-4 | ||
Conference
|
2014 | Detection and Response against Mobile Attack using SMS 윤승용 통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2 | ||
Journal
|
2014 | An Improved Side Channel Attack Using Event Information of Subtraction Jong-Yeon Park Journal of Network and Computer Applications, v.38, no.1, pp.99-105 | 6 | |
Conference
|
2014 | Detection of SMS Mobile Malware Seungyong Yoon International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 | 1 | |
Conference
|
2014 | Smart Network Services using Ticket Issuance in the TSM (Trusted Software Monitor) System Su-Wan Park International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), pp.279-287 | 0 | |
Conference
|
2014 | Implementation of a Video Streaming Security System for Smart Device Yongsung Jeon International Conference on Consumer Electronics (ICCE) 2014, pp.97-100 | 5 | |
Conference
|
2013 | Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform Jae-Deok Lim International Conference on Computer Science and its Applications (CSA) 2013 (LNEE 279), v.279, pp.161-166 | 1 | |
Journal
|
2013 | Mobile Malware Detection Using Correlational Analysis Seungyong Yoon International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58 | ||
Journal
|
2013 | Mathematical Analysis for Efficiency of Eavesdropping Attack Using Directional Antenna in mmWave Band 김미정 한국통신학회논문지 C : 융합기술, v.38C, no.11, pp.1074-1077 | ||
Journal
|
2013 | Churn-Aware Optimal Layer Scheduling Scheme for Scalable Video Distribution in Super-Peer Overlay Networks Yong-Hyuk Moon Journal of Supercomputing, v.66, no.2, pp.700-720 | 3 | |
Conference
|
2013 | A Method for Application Authentication and Secure Key Management Based on MTM (Mobile Trusted Module) 한진희 한국통신학회 종합 학술 발표회 (추계) 2013, pp.778-779 | ||
Conference
|
2013 | Modified User Authentication Method for Mobile Micro Payment 문화신 한국통신학회 종합 학술 발표회 (추계) 2013, pp.773-774 | ||
Conference
|
2013 | Study on Forensic Investigation for Mobile Virtualization System 임경수 한국정보처리학회 학술 발표 대회 (추계) 2013, pp.857-860 | ||
Conference
|
2013 | Malware Detection on Smartphones Seungyong Yoon International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.272-275 | ||
Conference
|
2013 | Secure Mobile Services using Secure Region Yun-kyung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.894-895 | 1 | |
Conference
|
2013 | Object Retrieval Scheme Using Color Features in Surveillance System Su-wan Park International Conference on Future Information Technology (FutureTech) 2013 (LNEE 276), v.276, pp.99-106 | 0 | |
Conference
|
2013 | DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System You Joung Ham International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 | 8 | |
Journal
|
2013 | Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery Junho CHOI Informatica, v.24, no.3, pp.381-394 | 14 | |
Conference
|
2013 | Detecting Application Layer-based Slow DDoS Attack Seungyong Yoon Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.319-322 | ||
Journal
|
2013 | A Survey of Mobile Malware Detection Techniques 문화신 전자통신동향분석, v.28, no.3, pp.39-46 | ||
Conference
|
2013 | Mathematical Analysis of Eavesdropping Attack in mmWave Band 김미정 한국통신학회 종합 학술 발표회 (하계) 2013, pp.91-92 | ||
Conference
|
2013 | A Multidimensional Peer Selection Scheme in Peer-to-Peer Networks Yong-Hyuk Moon International Conference on Computer Applications and Information Processing Technology (CAIPT) 2013, pp.1-4 | ||
Journal
|
2013 | A Technical Trend of Secure Storages 박종연 전자통신동향분석, v.28, no.3, pp.30-38 | ||
Conference
|
2013 | Signature Generation Based on Executable Parts in Suspicious Packets Daewon Kim Advanced International Conference on Telecommunications (AICT) 2013, pp.166-169 | ||
Conference
|
2013 | A Study on the Embedded SE Interface for Mobile Devices HongIl Ju International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2013, pp.881-882 | ||
Conference
|
2013 | Intelligence Video Security Techniques for Wide-Domain Surveillance System 박수완 한국정보처리학회 학술 발표 대회 (추계) 2013, pp.524-526 | ||
Journal
|
2013 | The Design of Vulnerability Management System GeonLyang Kim International Journal of Computer Science and Network Security, v.13, no.4, pp.19-25 | ||
Journal
|
2012 | Implementation of Automatic X-rated Video Classification and Management System based on Multimodal Features JaeDeok Lim International Journal of Advancements in Computing Technology, v.4, no.23, pp.178-186 | 1 | |
Conference
|
2012 | An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm Jong-Yeon Park International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.315-322 | 0 | |
Conference
|
2012 | Attack and Response Mechanism on Smart Work Device 최욱진 대한임베디드공학회 학술 대회 (추계) 2012, pp.81-84 | ||
Conference
|
2012 | Security Architecture for Smart Devices Hong-Il Ju International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.94-95 | 1 | |
Conference
|
2012 | Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding Daewon Kim International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 | 1 | |
Journal
|
2012 | The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks 박수열 대한임베디드공학회논문지, v.7, no.5, pp.255-265 | ||
Conference
|
2012 | TeeMo: A Generic Trusted Execution Framework for Mobile Devices Young-ho Kim International Conference on Computer, Networks, Systems, and Industrial Applications (CNSI) 2012, pp.579-583 | ||
Conference
|
2012 | System Requirements of Mobile device for Security Service Yong-Sung Jeon International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2012, pp.1-3 | ||
Journal
|
2012 | Nano-SIM 기술 및 표준화 이슈 김영세 주간기술동향, v.1554, pp.1-14 | ||
Conference
|
2012 | Churn-Aware Optimal Layer Scheduling Scheme for Scalable Video Distribution in Super-Peer Overlay Networks Yong-Hyuk Moon High-Performance Grid and Cloud Computing Workshop (HPGC) 2012, pp.1-5 | ||
Conference
|
2012 | 고정-PTZ 카메라 제어 기반의 원거리 얼굴 검출 방법 이한성 영상 처리 및 이해에 관한 워크샵 (IPIU) 2012, pp.1-4 | ||
Conference
|
2012 | A Rooting Vulnerability Analysis and the Related Countermeasure Mechanism on the Android-based Smart Work Device Won-Jun Jang International Conference on Convergence Technology (ICCT) 2012, pp.1-4 | ||
Conference
|
2011 | Security Issue of Mobile Terminal for Smart Work 전용성 차세대 통신 소프트웨어 학술 대회 (NCS) 2011, pp.1-4 | ||
Conference
|
2011 | Secure Service Execution Method on Mobile Device 이윤경 전자 정보 통신 학술 대회 (CEIC) 2011, pp.166-169 | ||
Conference
|
2011 | Rooting attack detection method on the Android-based smart phone Won-Jun Jang International Conference on Computer Science and Network Technology (ICCSNT) 2011, pp.477-481 | 8 | |
Conference
|
2011 | A Study on the Mobile Platform Security based on Virtualization Technology 주홍일 대한임베디드공학회 학술 대회 (추계) 2011, pp.399-402 | ||
Conference
|
2011 | Design of Secure Execution Environment for Mobile System 김영호 대한임베디드공학회 학술 대회 (추계) 2011, pp.241-244 | ||
Journal
|
2011 | Anonymous Qualification Verifying Method on Web Environment 이윤경 정보보호학회논문지, v.21, no.5, pp.181-195 | ||
Journal
|
2011 | SecurityTechnologyforDDS 정보흥 전자통신동향분석, v.26, no.5, pp.112-122 | ||
Conference
|
2011 | 합동 전투 지휘 체계를 위한 스마트폰 보안 기술 동향 김정녀 한국산업융합 학술 대회 2011, pp.1-8 | ||
Conference
|
2011 | Building Secure Execution Environment for Mobile Platform Young-Ho Kim International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI) 2011, pp.119-122 | 4 | |
Conference
|
2011 | Adaptive Human Detection Method based on the Distance from a Camera 문대성 통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 | ||
Journal
|
2011 | Robust Fuzzy Fingerprint Vault System against Correlation Attack 문대성 정보보호학회논문지, v.21, no.2, pp.13-25 | ||
Journal
|
2011 | Prohibiting Internal Data Leakage to Mass Storage Device in Mobile Device 정보흥 정보보호학회논문지, v.21, no.1, pp.125-133 | ||
Journal
|
2011 | Multimodal Biometric Method that Combines Veins, Prints, and Shape of a Finger Byung Jun Kang Optical Engineering, v.50, no.1, pp.1-13 | 44 | |
Conference
|
2011 | A Secure Fingerprint Template Generation Algorithm for Smart Card Daesung Moon International Conference on Consumer Electronics (ICCE) 2011, pp.719-720 | 2 | |
Conference
|
2010 | Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device Bo-Heung Chung International Conferences on Security Technology (SecTech) 2010 / Disaster Recovery and Business Continuity (DRBC) 2010 (CCIS 122), v.122, pp.68-73 | 0 | |
Journal
|
2010 | Standardization of Air Interface Protocol for RFID Security Services 강유성 한국정보기술학회지, v.8, no.1, pp.43-50 | ||
Journal
|
2010 | A Survey of Face Recognition Technologies and Standards 이한성 한국정보기술학회지, v.8, no.1, pp.33-41 | ||
Conference
|
2010 | Implementation of ASEF for Eye Detection So-Hee Park International Conference on Computers, Communications and Systems (ICCCS) 2010, pp.1-4 | ||
Journal
|
2010 | Contactless Fingerprint Recognition Based on LDP 강병준 멀티미디어학회논문지, v.13, no.9, pp.1337-1347 | ||
Journal
|
2010 | 비디오 분석기술과 초해상도 영상 복원 정윤수 한국멀티미디어학회지, v.14, no.3, pp.39-47 | ||
Conference
|
2010 | Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram Han Sung Lee International Workshop on Information Security Applications (WISA) 2010 (LNCS 6513), v.6513, pp.273-280 | 26 | |
Journal
|
2010 | Smartphone Threats and Security Technology 강동호 전자통신동향분석, v.25, no.3, pp.72-80 | ||
Journal
|
2010 | 모바일 보안 위협 및 보안 서비스 기술 동향 강동호 정보과학회지, v.28, no.6, pp.51-56 | ||
Conference
|
2010 | Automated Power On/Off Control of a Television by Detecting Eye in Face Images Jang-Hee Yoo International Conference on Electronics, Informations and Communications (ICEIC) 2010, pp.429-431 | ||
Conference
|
2010 | Secure Fuzzy Fingerprint Vault System 문대성 대한전자공학회 종합 학술 대회 (하계) 2010, pp.1660-1663 | ||
Conference
|
2009 | Implementation of Integrity Management Architecture for Scalability Jae Deok Lim International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.1169-1172 | ||
Conference
|
2009 | A study of Management Interface for Cluster System Integrity Jae Deok Lim International Conference on Advanced Communication Technology (ICACT) 2009, pp.1261-1264 | ||
Conference
|
2009 | Adult image detection with c lose-up face classification Byeong Cheol Choi International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 | 4 | |
Conference
|
2008 | The Design of SAML-based SSO Service for User/Device Integrated Authentication So Hee Park International Conference on Computers, Communications and Systems (ICCCS) 2008, pp.1-4 | ||
Journal
|
2008 | High-Speed Hardware Architectures for ARIA with Composite Field Arithmetic and Area-Throughput Trade-Offs Sang-Woo Lee ETRI Journal, v.30, no.5, pp.707-717 | 5 | |
Conference
|
2008 | Retrieval of Illegal and Objectionable Multimedia Byeong Cheol Cho International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.645-647 | 3 | |
Conference
|
2008 | A Study of Providing the Integrity on Cluster System Jae Deok Lim International Conference on Advanced Communication Technology (ICACT) 2008, pp.1925-1928 | 2 | |
Conference
|
2007 | The Design of SSO Service for Web Portal Mashup Service 박소희 차세대 통신 소프트웨어 학술 대회 (NCS) 2007, pp.1-5 | ||
Conference
|
2007 | The Design of SSO Service Architecture for Mashup Service in Web Portals So Hee Park International Conference on Information Security and Privacy (ISP) 2007, pp.155-159 | ||
Conference
|
2007 | Anonymous PKI Framework for Privacy-guaranteed e-Services Byeong Cheol Choi International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 | 1 | |
Conference
|
2007 | Implementation of Multi-thread based Intrusion Prevention System for IPv6 Jae-Deok Lim International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 | 5 | |
Conference
|
2007 | Implementation of LSM-Based RBAC Module for Embedded System Jae-Deok Lim International Workshop on Information Security Applications (WISA) 2007 (LNCS 4867), v.4867, pp.91-101 | 2 | |
Journal
|
2007 | A Survey of Intelligent Vehicle Security 최병철 전자통신동향분석, v.22, no.1, pp.114-118 | ||
Conference
|
2005 | Design and Implementation of Gigabit Router using Network Processor Sang-Woo Lee Internet and Multimedia Systems and Applications (IMSA) 2005, pp.32-35 | ||
Conference
|
2005 | Implementation of Gigabit Router with Network Porcesskr 이상우 한국통신학회 종합 학술 발표회 (하계) 2005, pp.110-113 | ||
Conference
|
2005 | Implementing Cipher APIs in Inter IXP 2400 Sang-Su Lee International Conference on Control, Automation and Systems (ICCAS) 2005, pp.374-376 | ||
Conference
|
2005 | Implementation of light-Weight IKE Protocol for IPsec VPN within Router Jae Deok Lim International Conference on Advanced Communication Technology (ICACT) 2005, pp.81-84 | ||
Conference
|
2005 | Design of Firewall in Router using Network Processor Young Ho Kim International Conference on Advanced Communication Technology (ICACT) 2005, pp.658-660 | ||
Conference
|
2005 | Kernel Migration of Transport Layer Security Geon-Woo Kim International Conference on Advanced Communication Technology (ICACT) 2005, pp.69-71 | ||
Conference
|
2005 | The design of IPSec application in lXDP2400 Min Ho Han International Conference on Advanced Communication Technology (ICACT) 2005, pp.584-587 | ||
Conference
|
2005 | An implementation of 3DES and HMAC-MD5 in Intel IXP 2400 Sang Su Lee International Conference on Advanced Communication Technology (ICACT) 2005, pp.369-371 | ||
Conference
|
2005 | Kernel-level Intrusion Detection Method Using Simplification and Grouping Bo-Heung Chung International Conference on Advanced Communication Technology (ICACT) 2005, pp.251-254 | ||
Conference
|
2004 | Secure Management System for Network Equipment 두소영 전자 정보 통신 학술 대회 (CEIC) 2004, pp.219-222 | ||
Conference
|
2004 | IPSec Engine Design in IXP2400 Network Processor 한민호 차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.545-548 | ||
Conference
|
2004 | Policy-based Security Management for secure networking of Router 조수형 한국통신학회 종합 학술 발표회 (추계) 2004, pp.626-629 | ||
Conference
|
2004 | Survivability Guaranteed RWA Algorithm in the Next Generation OVPN 황진호 한국정보과학회 학술 발표 (가을) 2004, pp.115-117 | ||
Conference
|
2004 | Fault/Attack Tolerant Recovery Mechanism Under SRLG Constraint in the Next Generation Optical VPN Jin Ho Hwang Universal Multiservice Networks 2009 (LNCS 3262), v.3262, pp.386-396 | 4 | |
Journal
|
2004 | 라우터 보안 기술 동향 정보흥 주간기술동향, v.1154, pp.1-12 | ||
Conference
|
2004 | SRLG-constrained Recovery Mechanism robust to Fault/Attack in the Next Generation Optical VPN 황진호 한국통신학회 종합 학술 발표회 (하계) 2004, pp.116-116 | ||
Conference
|
2004 | Conformance Test for Open Internet Key Exchange Protocol Implementation 임재덕 한국통신학회 종합 학술 발표회 (하계) 2004, pp.166-166 | ||
Conference
|
2004 | Network Processor Architecture for IPSec Minho Han International Conference on Advanced Communication Technology (ICACT) 2004, pp.485-487 | ||
Conference
|
2004 | Kernel-level Intrusion Detection System for Minimum Packet Loss Bo Heung Chung International Conference on Advanced Communication Technology (ICACT) 2004, pp.207-212 | ||
Conference
|
2003 | Methods of Defense DoS Attack by Traffic Metering and Controlling Technique in a Router 이호균 한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1985-1988 | ||
Conference
|
2003 | Implemetation of DDoS Defense Function Using Traffic Controlling and Intrusion Detection Technique 이호균 한국통신학회 종합 학술 발표회 (추계) 2003, pp.989-992 | ||
Conference
|
2003 | Design of Policy based Security Management System for Intrusion Detection 조수형 전자 정보 통신 학술 대회 (CEIC) 2003, pp.161-164 | ||
Conference
|
2003 | Design of Packet Filtering System for High Speed Networking Environment 류승호 한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1993-1996 | ||
Conference
|
2003 | Establishment of a secure networking between Secure OSs Jae-Deok Lim International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2097-2100 | ||
Conference
|
2003 | Integrated Security Management Framework for Secure Networking Su-Hyung Jo International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2174-2177 | ||
Conference
|
2003 | Methods of Defense DoS Attack by Traffic Metering and Controlling Technique in a Router 이호균 한국정보과학회 학술 발표 (가을) 2003, pp.814-816 | ||
Journal
|
2003 | 동적 기능 구성이 가능한 능동형 Secure OS 시스템 김정녀 정보보호학회지, v.13, no.4, pp.60-67 | ||
Journal
|
2003 | 안전한 라우터를 위한 능동형 보안 엔진 구현 김정녀 한국통신학회지, v.20, no.8, pp.711-79 | ||
Journal
|
2003 | Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS 김정녀 정보처리학회논문지 D, v.10D, no.5, pp.773-780 | ||
Journal
|
2003 | Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system 임재덕 정보처리학회논문지 C, v.10C, no.4, pp.387-396 | ||
Conference
|
2003 | A Study of Network Packet Protection between Trusted Systems 임재덕 통신 정보 합동 학술 대회 (JCCI) 2003, pp.213-213 | ||
Conference
|
2003 | The Designs and Implementation of Trusted Channel between Secure Operating Systems Joon-Suk Yu 한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.2117-2120 | ||
Conference
|
2003 | The Implementation of Integrated Security Engine's Management System for Secure Networking 조수형 한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.2253-2256 | ||
Conference
|
2003 | Suggestion of Mobile Telecommunication Network Management System by Policy based Network management 이호균 통신 정보 합동 학술 대회 (JCCI) 2003, pp.365-365 | ||
Journal
|
2003 | Multiple User Authentication based on SecuROS/FreeBSD 두소영 정보처리학회논문지 C, v.10C, no.1, pp.11-16 | ||
Conference
|
2002 | Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection 정보흥 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1031-1034 | ||
Conference
|
2002 | A Study on the Implementation of Trusted Channel on Trusted Systems 유준석 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1015-1018 | ||
Conference
|
2002 | A Prototype of Trusted Authentication 두소영 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.979-982 | ||
Conference
|
2002 | Policy-based Security Management for Intrusion Detection 조수형 한국정보과학회 학술 발표 (가을) 2002, pp.574-576 | ||
Conference
|
2002 | Implementation of Access Control User Interface for Secure User Data 두소영 통신 정보 합동 학술 대회 (JCCI) 2002, pp.87-87 | ||
Conference
|
2002 | Data Encryption used Access Control within Vnode layer based on FreeBSD 임재덕 통신 정보 합동 학술 대회 (JCCI) 2002, pp.191-191 | ||
Conference
|
2002 | Design and Implementation of Security Management System for C-ISCAP 조수형 통신 정보 합동 학술 대회 (JCCI) 2002, pp.156-156 | ||
Journal
|
2001 | The Blocking of buffer overflow based attack for Linux kernel 김정녀 정보처리학회논문지 A, v.8A, no.4, pp.385-390 | ||
Conference
|
2001 | The Trusted Path Authentication System between the User and the Secure OS 두소영 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.961-964 | ||
Conference
|
2001 | Design of Crypto-Filesystem using Access Control Model 임재덕 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.835-838 | ||
Journal
|
2001 | Secure User and Program Interface for SecuROS 두소영 정보처리학회논문지 C, v.8C, no.5, pp.557-564 | ||
Journal
|
2001 | A Study on the Cryptographic Properties of FCSR Sequences 서창호 정보처리학회논문지 C, v.8C, no.1, pp.12-15 |