|
Conference
|
2024 |
Analyzing the container security threat on the 5G Core Network
Jihyeon Song
Silicon Valley Cybersecurity Conference (SVCC) 2024, pp.1-3 |
1 |
|
|
Journal
|
2024 |
A Study of the Relationship of Malware Detection Mechanisms using Artificial Intelligence
Jihyeon Song
ICT EXPRESS, v.10, no.3, pp.632-649 |
9 |
|
|
Conference
|
2023 |
Performance Analysis of Cryptojacking Container Detection with Machine Learning
송지현
한국컴퓨터 종합 학술대회 2023, pp.1294-1296 |
|
|
|
Journal
|
2023 |
Practical covert wireless unidirectional communication in IEEE 802.11 environment
Hayoung Seong
IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 |
16 |
|
|
Journal
|
2022 |
Technological Trends in Intelligent Cyber Range
유재학
전자통신동향분석, v.37, no.4, pp.36-45 |
|
|
|
Conference
|
2022 |
정보보호 분야에서의 사이버 레인지 기술 동향
유재학
한국정보처리학회 학술 발표 대회 (춘계) 2022, pp.208-211 |
|
|
|
Journal
|
2021 |
AI based Visualization Platform for the Unknown Malware Analysis
송지현
국방과 보안, v.3, no.2, pp.97-115 |
|
|
|
Journal
|
2021 |
Security Technology Trends to Prevent Medical Device Hacking and Ransomware
권혁찬
전자통신동향분석, v.36, no.5, pp.21-31 |
|
|
|
Conference
|
2021 |
Consideration for the Construction of Practical Wireless Covert Timing Channels
Hayoung Seong
World Conference on Information Security Applications (WISA) 2021, pp.66-70 |
|
|
|
Journal
|
2021 |
Evaluations of AI‐based malicious PowerShell detection with feature optimizations
Jihyeon Song
ETRI Journal, v.43, no.3, pp.549-560 |
19 |
|
|
Journal
|
2020 |
5G Edge Security Technology Trend
박종근
정보보호학회지, v.30, no.6, pp.7-16 |
|
|
|
Journal
|
2020 |
Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments
김영수
정보과학회지, v.38, no.9, pp.16-24 |
|
|
|
Journal
|
2020 |
Technological Trends in Cyber Attack Simulations
이주영
전자통신동향분석, v.35, no.1, pp.34-48 |
|
|
|
Journal
|
2019 |
Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles
Jonghoon Lee
IEEE Access, v.7, pp.165607-165626 |
145 |
|
|
Journal
|
2019 |
5G Security Architectural Features and Key Improvements in 3GPP Standard
박종근
정보보호학회지, v.29, no.5, pp.21-30 |
|
|
|
Conference
|
2019 |
Implementation of a Static PowerShell Analysis based on the CNN-LSTM Model with Token Type Optimizations
Jihyeon Song
World Conference on Information Security Applications (WISA) 2019: Workshop, pp.99-107 |
|
|
|
Conference
|
2019 |
Deep Learning based PowerShell Analysis with the Abstract Syntax Tree
Jihyeon Song
USENIX Security Symposium 2019, pp.1-1 |
|
|
|
Journal
|
2019 |
A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph
Jooyoung Lee
Journal of Supercomputing, v.75, no.6, pp.3028-3045 |
18 |
|
|
Conference
|
2019 |
Real-time Multi-process Tracing Decoder Architecture
Youngsoo Kim
Workshop on Systems and Network Telemetry and Analytics (SNTA) 2019, pp.49-52 |
0 |
|
|
Journal
|
2019 |
Mobile Network Security Issues regarding 5G Security
박종근
전자통신동향분석, v.34, no.1, pp.36-48 |
|
|
|
Conference
|
2019 |
Deep Learning based Malicious Powershell Script Detection Method
송지현
한국정보보호학회 영남/충청 지부 학술 대회 2019, pp.122-125 |
|
|
|
Journal
|
2019 |
Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing
Hyunjoo Kim
Cluster Computing, v.22, no.Supp.1, pp.2341-2350 |
42 |
|
|
Journal
|
2019 |
A Survey of Deep Learning-based Network Anomaly Detection
Donghwoon Kwon
Cluster Computing, v.22, no.Supp.1, pp.949-961 |
554 |
|
|
Journal
|
2019 |
Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization
Hyunjoo Kim
Cluster Computing, v.22, no.Supp.1, pp.921-929 |
53 |
|
|
Conference
|
2018 |
Analysis on the VNF-DPI for the Cloud Security
김정태
한국통신학회 종합 학술 발표회 (하계) 2018, pp.811-812 |
|
|
|
Journal
|
2018 |
Deduplication Technologies over Encrypted Data
김건우
전자통신동향분석, v.33, no.1, pp.68-77 |
|
|
|
Journal
|
2017 |
네트워크 주소 이동 기술 동향
박경민
전자통신동향분석, v.32, no.6, pp.73-82 |
|
|
|
Conference
|
2017 |
Toward the SIEM Architecture for Cloud-based Security Services
Jong-Hoon Lee
Conference on Communications and Network Security (CNS) 2017, pp.1-2 |
23 |
|
|
Conference
|
2017 |
Building a Big Data Platform for Large-scale Security Data Analysis
Jong-Hoon Lee
International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 |
5 |
|
|
Conference
|
2017 |
Netflow Based HTTP Get Flooding Attack Analysis
Jungtae Kim
International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017 |
|
|
|
Journal
|
2017 |
DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks
Daesung Moon
Journal of Supercomputing, v.73, no.7, pp.2881-2895 |
127 |
|
|
Journal
|
2017 |
Malware Detection using Deep Learning
최선오
정보보호학회지, v.27, no.3, pp.5-11 |
|
|
|
Conference
|
2017 |
Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security
Hyunjoo Kim
iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 |
3 |
|
|
Journal
|
2016 |
Advanced DDoS Attack & Corresponding Technical Trends
김정태
전자통신동향분석, v.31, no.6, pp.77-87 |
|
|
|
Conference
|
2016 |
Visualization of Malware Detection Based on API Call Sequence Alignment
Jong-Hyun Kim
International Conference on Internet (ICONI) 2016, pp.175-178 |
|
|
|
Conference
|
2016 |
Network Signature Clustering
최선오
한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264 |
|
|
|
Journal
|
2016 |
PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording
Seon-Ho Shin
IEEE Network, v.30, no.6, pp.42-48 |
6 |
|
|
Conference
|
2016 |
Network Abnormal Behavior Analysis System
최선오
한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190 |
|
|
|
Conference
|
2016 |
Implementation of Malware Detection System Based on Behavioral Sequences
Hyunjoo Kim
International Conference on Security Technology (SecTech) 2016, pp.348-353 |
|
|
|
Conference
|
2016 |
HTTP Get Flooding Detection Technique based on Netflow Information
Youngsoo Kim
International Conference on Evolving Internet (INTERNET) 2016, pp.26-29 |
|
|
|
Conference
|
2016 |
Real-time Abnormal Behavior Detection by Online Data Collection
이명철
한국정보처리학회 학술 발표 대회 (추계) 2016, pp.208-209 |
|
|
|
Conference
|
2016 |
Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis
Jungtae Kim
International Conference on Evolving Internet (INTERNET) 2016, pp.20-25 |
|
|
|
Conference
|
2016 |
Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence
Jong-Hyun Kim
International Conference on Security Technology (SecTech) 2016, pp.354-359 |
|
|
|
Conference
|
2016 |
Traffic Storing and Related Information Generation System for Cyber Attack Analysis
Yangseo Choi
International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 |
1 |
|
|
Conference
|
2016 |
A Forensically Robust Data Acquisition from a 10G Line-rate Network
Jooyoung Lee
International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 |
0 |
|
|
Conference
|
2016 |
Hierarchical Network Signature Clustering and Generation
Sunoh Choi
International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 |
2 |
|
|
Journal
|
2016 |
Host-based Intrusion Detection System for Secure Human-centric Computing
Daesung Moon
Journal of Supercomputing, v.72, no.7, pp.2520-2536 |
36 |
|
|
Journal
|
2016 |
Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
Hyun-Joo KIM
IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 |
6 |
|
|
Journal
|
2016 |
Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis
황호
정보보호학회논문지, v.26, no.2, pp.377-386 |
|
|
|
Conference
|
2016 |
A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks
Youngsoo Kim
International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322 |
|
|