ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Ik Kyun Principal Researcher
Department
Information Strategy Department
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 Analyzing the container security threat on the 5G Core Network   Jihyeon Song   Silicon Valley Cybersecurity Conference (SVCC) 2024, pp.1-3 1
Journal
2024 A Study of the Relationship of Malware Detection Mechanisms using Artificial Intelligence   Jihyeon Song   ICT EXPRESS, v.10, no.3, pp.632-649 9
Conference
2023 Performance Analysis of Cryptojacking Container Detection with Machine Learning   송지현   한국컴퓨터 종합 학술대회 2023, pp.1294-1296
Journal
2023 Practical covert wireless unidirectional communication in IEEE 802.11 environment   Hayoung Seong   IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 16
Journal
2022 Technological Trends in Intelligent Cyber Range   유재학   전자통신동향분석, v.37, no.4, pp.36-45
Conference
2022 정보보호 분야에서의 사이버 레인지 기술 동향   유재학   한국정보처리학회 학술 발표 대회 (춘계) 2022, pp.208-211
Journal
2021 AI based Visualization Platform for the Unknown Malware Analysis   송지현   국방과 보안, v.3, no.2, pp.97-115
Journal
2021 Security Technology Trends to Prevent Medical Device Hacking and Ransomware   권혁찬   전자통신동향분석, v.36, no.5, pp.21-31
Conference
2021 Consideration for the Construction of Practical Wireless Covert Timing Channels   Hayoung Seong   World Conference on Information Security Applications (WISA) 2021, pp.66-70
Journal
2021 Evaluations of AI‐based malicious PowerShell detection with feature optimizations   Jihyeon Song   ETRI Journal, v.43, no.3, pp.549-560 19
Journal
2020 5G Edge Security Technology Trend   박종근   정보보호학회지, v.30, no.6, pp.7-16
Journal
2020 Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments   김영수   정보과학회지, v.38, no.9, pp.16-24
Journal
2020 Technological Trends in Cyber Attack Simulations   이주영   전자통신동향분석, v.35, no.1, pp.34-48
Journal
2019 Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles   Jonghoon Lee   IEEE Access, v.7, pp.165607-165626 145
Journal
2019 5G Security Architectural Features and Key Improvements in 3GPP Standard   박종근   정보보호학회지, v.29, no.5, pp.21-30
Conference
2019 Implementation of a Static PowerShell Analysis based on the CNN-LSTM Model with Token Type Optimizations   Jihyeon Song   World Conference on Information Security Applications (WISA) 2019: Workshop, pp.99-107
Conference
2019 Deep Learning based PowerShell Analysis with the Abstract Syntax Tree   Jihyeon Song   USENIX Security Symposium 2019, pp.1-1
Journal
2019 A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph   Jooyoung Lee   Journal of Supercomputing, v.75, no.6, pp.3028-3045 18
Conference
2019 Real-time Multi-process Tracing Decoder Architecture   Youngsoo Kim   Workshop on Systems and Network Telemetry and Analytics (SNTA) 2019, pp.49-52 0
Journal
2019 Mobile Network Security Issues regarding 5G Security   박종근   전자통신동향분석, v.34, no.1, pp.36-48
Conference
2019 Deep Learning based Malicious Powershell Script Detection Method   송지현   한국정보보호학회 영남/충청 지부 학술 대회 2019, pp.122-125
Journal
2019 Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing   Hyunjoo Kim   Cluster Computing, v.22, no.Supp.1, pp.2341-2350 42
Journal
2019 A Survey of Deep Learning-based Network Anomaly Detection   Donghwoon Kwon  Cluster Computing, v.22, no.Supp.1, pp.949-961 554
Journal
2019 Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization   Hyunjoo Kim   Cluster Computing, v.22, no.Supp.1, pp.921-929 53
Conference
2018 Analysis on the VNF-DPI for the Cloud Security   김정태   한국통신학회 종합 학술 발표회 (하계) 2018, pp.811-812
Journal
2018 Deduplication Technologies over Encrypted Data   김건우   전자통신동향분석, v.33, no.1, pp.68-77
Journal
2017 네트워크 주소 이동 기술 동향   박경민   전자통신동향분석, v.32, no.6, pp.73-82
Conference
2017 Toward the SIEM Architecture for Cloud-based Security Services   Jong-Hoon Lee   Conference on Communications and Network Security (CNS) 2017, pp.1-2 23
Conference
2017 Building a Big Data Platform for Large-scale Security Data Analysis   Jong-Hoon Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 5
Conference
2017 Netflow Based HTTP Get Flooding Attack Analysis   Jungtae Kim   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017
Journal
2017 DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks   Daesung Moon   Journal of Supercomputing, v.73, no.7, pp.2881-2895 127
Journal
2017 Malware Detection using Deep Learning   최선오   정보보호학회지, v.27, no.3, pp.5-11
Conference
2017 Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security   Hyunjoo Kim   iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 3
Journal
2016 Advanced DDoS Attack & Corresponding Technical Trends   김정태   전자통신동향분석, v.31, no.6, pp.77-87
Conference
2016 Visualization of Malware Detection Based on API Call Sequence Alignment   Jong-Hyun Kim   International Conference on Internet (ICONI) 2016, pp.175-178
Conference
2016 Network Signature Clustering   최선오   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264
Journal
2016 PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording   Seon-Ho Shin  IEEE Network, v.30, no.6, pp.42-48 6
Conference
2016 Network Abnormal Behavior Analysis System   최선오   한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190
Conference
2016 Implementation of Malware Detection System Based on Behavioral Sequences   Hyunjoo Kim   International Conference on Security Technology (SecTech) 2016, pp.348-353
Conference
2016 HTTP Get Flooding Detection Technique based on Netflow Information   Youngsoo Kim   International Conference on Evolving Internet (INTERNET) 2016, pp.26-29
Conference
2016 Real-time Abnormal Behavior Detection by Online Data Collection   이명철   한국정보처리학회 학술 발표 대회 (추계) 2016, pp.208-209
Conference
2016 Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis   Jungtae Kim   International Conference on Evolving Internet (INTERNET) 2016, pp.20-25
Conference
2016 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence   Jong-Hyun Kim   International Conference on Security Technology (SecTech) 2016, pp.354-359
Conference
2016 Traffic Storing and Related Information Generation System for Cyber Attack Analysis   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 1
Conference
2016 A Forensically Robust Data Acquisition from a 10G Line-rate Network   Jooyoung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 0
Conference
2016 Hierarchical Network Signature Clustering and Generation   Sunoh Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 2
Journal
2016 Host-based Intrusion Detection System for Secure Human-centric Computing   Daesung Moon   Journal of Supercomputing, v.72, no.7, pp.2520-2536 36
Journal
2016 Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call   Hyun-Joo KIM   IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 6
Journal
2016 Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis   황호   정보보호학회논문지, v.26, no.2, pp.377-386
Conference
2016 A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks   Youngsoo Kim   International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322