Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | Analyzing the container security threat on the 5G Core Network Jihyeon Song Silicon Valley Cybersecurity Conference (SVCC) 2024, pp.1-3 | 0 | |
Journal
|
2024 | A Study of the Relationship of Malware Detection Mechanisms using Artificial Intelligence Jihyeon Song ICT EXPRESS, v.10, no.3, pp.632-649 | 1 | |
Conference
|
2023 | Performance Analysis of Cryptojacking Container Detection with Machine Learning 송지현 한국컴퓨터 종합 학술대회 2023, pp.1294-1296 | ||
Journal
|
2023 | Practical covert wireless unidirectional communication in IEEE 802.11 environment Hayoung Seong IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 | 9 | |
Journal
|
2022 | Technological Trends in Intelligent Cyber Range 유재학 전자통신동향분석, v.37, no.4, pp.36-45 | ||
Conference
|
2022 | 정보보호 분야에서의 사이버 레인지 기술 동향 유재학 한국정보처리학회 학술 발표 대회 (춘계) 2022, pp.208-211 | ||
Journal
|
2021 | AI based Visualization Platform for the Unknown Malware Analysis 송지현 국방과 보안, v.3, no.2, pp.97-115 | ||
Journal
|
2021 | Security Technology Trends to Prevent Medical Device Hacking and Ransomware 권혁찬 전자통신동향분석, v.36, no.5, pp.21-31 | ||
Conference
|
2021 | Consideration for the Construction of Practical Wireless Covert Timing Channels Hayoung Seong World Conference on Information Security Applications (WISA) 2021, pp.66-70 | ||
Journal
|
2021 | Evaluations of AI‐based malicious PowerShell detection with feature optimizations Jihyeon Song ETRI Journal, v.43, no.3, pp.549-560 | 14 | |
Journal
|
2020 | 5G Edge Security Technology Trend 박종근 정보보호학회지, v.30, no.6, pp.7-16 | ||
Journal
|
2020 | Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments 김영수 정보과학회지, v.38, no.9, pp.16-24 | ||
Journal
|
2020 | Technological Trends in Cyber Attack Simulations 이주영 전자통신동향분석, v.35, no.1, pp.34-48 | ||
Journal
|
2019 | Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles Jonghoon Lee IEEE Access, v.7, pp.165607-165626 | 104 | |
Journal
|
2019 | 5G Security Architectural Features and Key Improvements in 3GPP Standard 박종근 정보보호학회지, v.29, no.5, pp.21-30 | ||
Conference
|
2019 | Deep Learning based PowerShell Analysis with the Abstract Syntax Tree Jihyeon Song USENIX Security Symposium 2019, pp.1-1 | ||
Conference
|
2019 | Implementation of a Static PowerShell Analysis based on the CNN-LSTM Model with Token Type Optimizations Jihyeon Song World Conference on Information Security Applications (WISA) 2019: Workshop, pp.99-107 | ||
Journal
|
2019 | A Semantic Approach to Improving Machine Readability of a Large-scale Attack Graph Jooyoung Lee Journal of Supercomputing, v.75, no.6, pp.3028-3045 | 16 | |
Conference
|
2019 | Real-time Multi-process Tracing Decoder Architecture Youngsoo Kim Workshop on Systems and Network Telemetry and Analytics (SNTA) 2019, pp.49-52 | 0 | |
Conference
|
2019 | Deep Learning based Malicious Powershell Script Detection Method 송지현 한국정보보호학회 영남/충청 지부 학술 대회 2019, pp.122-125 | ||
Journal
|
2019 | Mobile Network Security Issues regarding 5G Security 박종근 전자통신동향분석, v.34, no.1, pp.36-48 | ||
Journal
|
2019 | Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization Hyunjoo Kim Cluster Computing, v.22, no.Supp.1, pp.921-929 | 47 | |
Journal
|
2019 | Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing Hyunjoo Kim Cluster Computing, v.22, no.Supp.1, pp.2341-2350 | 36 | |
Journal
|
2019 | A Survey of Deep Learning-based Network Anomaly Detection Donghwoon Kwon Cluster Computing, v.22, no.Supp.1, pp.949-961 | 459 | |
Conference
|
2018 | Analysis on the VNF-DPI for the Cloud Security 김정태 한국통신학회 종합 학술 발표회 (하계) 2018, pp.811-812 | ||
Journal
|
2018 | Deduplication Technologies over Encrypted Data 김건우 전자통신동향분석, v.33, no.1, pp.68-77 | ||
Journal
|
2017 | 네트워크 주소 이동 기술 동향 박경민 전자통신동향분석, v.32, no.6, pp.73-82 | ||
Conference
|
2017 | Toward the SIEM Architecture for Cloud-based Security Services Jong-Hoon Lee Conference on Communications and Network Security (CNS) 2017, pp.1-2 | 22 | |
Conference
|
2017 | Building a Big Data Platform for Large-scale Security Data Analysis Jong-Hoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 | 5 | |
Conference
|
2017 | Netflow Based HTTP Get Flooding Attack Analysis Jungtae Kim International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017 | ||
Journal
|
2017 | DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks Daesung Moon Journal of Supercomputing, v.73, no.7, pp.2881-2895 | 113 | |
Conference
|
2017 | Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security Hyunjoo Kim iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 | 3 | |
Journal
|
2017 | Malware Detection using Deep Learning 최선오 정보보호학회지, v.27, no.3, pp.5-11 | ||
Journal
|
2016 | Advanced DDoS Attack & Corresponding Technical Trends 김정태 전자통신동향분석, v.31, no.6, pp.77-87 | ||
Conference
|
2016 | Visualization of Malware Detection Based on API Call Sequence Alignment Jong-Hyun Kim International Conference on Internet (ICONI) 2016, pp.175-178 | ||
Conference
|
2016 | Network Signature Clustering 최선오 한국통신학회 종합 학술 발표회 (하계) 2016, pp.1263-1264 | ||
Journal
|
2016 | PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording Seon-Ho Shin IEEE Network, v.30, no.6, pp.42-48 | 5 | |
Conference
|
2016 | Implementation of Malware Detection System Based on Behavioral Sequences Hyunjoo Kim International Conference on Security Technology (SecTech) 2016, pp.348-353 | ||
Conference
|
2016 | Real-time Abnormal Behavior Detection by Online Data Collection 이명철 한국정보처리학회 학술 발표 대회 (추계) 2016, pp.208-209 | ||
Conference
|
2016 | Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis Jungtae Kim International Conference on Evolving Internet (INTERNET) 2016, pp.20-25 | ||
Conference
|
2016 | HTTP Get Flooding Detection Technique based on Netflow Information Youngsoo Kim International Conference on Evolving Internet (INTERNET) 2016, pp.26-29 | ||
Conference
|
2016 | Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim International Conference on Security Technology (SecTech) 2016, pp.354-359 | ||
Conference
|
2016 | Network Abnormal Behavior Analysis System 최선오 한국정보처리학회 학술 발표 대회 (추계) 2016, pp.189-190 | ||
Conference
|
2016 | A Forensically Robust Data Acquisition from a 10G Line-rate Network Jooyoung Lee International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1188-1190 | 0 | |
Conference
|
2016 | Hierarchical Network Signature Clustering and Generation Sunoh Choi International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1191-1193 | 2 | |
Conference
|
2016 | Traffic Storing and Related Information Generation System for Cyber Attack Analysis Yangseo Choi International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1052-1057 | 1 | |
Journal
|
2016 | Host-based Intrusion Detection System for Secure Human-centric Computing Daesung Moon Journal of Supercomputing, v.72, no.7, pp.2520-2536 | 34 | |
Journal
|
2016 | Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call Hyun-Joo KIM IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 | 5 | |
Journal
|
2016 | Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis 황호 정보보호학회논문지, v.26, no.2, pp.377-386 | ||
Journal
|
2016 | Hash Table with Expanded-Key for High-Speed Networking Seon-Ho SHIN IEICE Transactions on Information and Systems, v.E99.D, no.3, pp.747-750 | 1 | |
Conference
|
2016 | A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks Youngsoo Kim International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322 | ||
Conference
|
2016 | Introduction to a Network Forensics System for Cyber Incidents Analysis Yangseo Choi International Conference on Advanced Communication Technology (ICACT) 2016, pp.50-55 | 4 | |
Conference
|
2016 | Load Adaptive and Fault Tolerant Distributed Stream Processing System for Explosive Stream Data Myungcheol Lee International Conference on Advanced Communication Technology (ICACT) 2016, pp.745-751 | 7 | |
Conference
|
2015 | Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack Jong-Hyun Kim SRI Security Congress 2015, pp.104-110 | ||
Conference
|
2015 | Implementation of Netflow based Interactive Connection Traceback System Jung-Tae Kim International Conference on Systems and Networks Communications (ICSNC) 2015, pp.21-26 | ||
Conference
|
2015 | Behavior-Based Anomaly Detection on Big Data Hyunjoo Kim SRI Security Congress 2015, pp.73-80 | ||
Conference
|
2015 | A Cyber Blackbox for Collecting Network Evidence Jooyoung Lee SRI Security Congress 2015, pp.141-147 | ||
Conference
|
2015 | Anomaly Detection Method using Network Pattern Analysis of Process Minho Han World Congress on Internet Security (WorldCIS) 2015, pp.159-163 | 2 | |
Journal
|
2015 | Cyber Genome Technology for Countering Malware 김종현 전자통신동향분석, v.30, no.5, pp.118-128 | ||
Conference
|
2015 | Transmitted File Extraction and Reconstruction from Network Packets Yangseo Choi World Congress on Internet Security (WorldCIS) 2015, pp.164-165 | 2 | |
Journal
|
2015 | Real-Time Abnormal Behavior Detection System Based on Fast Data 이명철 정보보호학회논문지, v.25, no.5, pp.1027-1041 | ||
Conference
|
2015 | An Abnormal Connection Detection System based on Network Flow Analysis Jong-Hoon Lee International Conference on Consumer Electronics (ICCE) 2015 : Berlin, pp.71-75 | 0 | |
Journal
|
2015 | Technical Trends of the Cyber Targeted Attack Traceback - Connection Chain & Traceback 김정태 전자통신동향분석, v.30, no.4, pp.120-128 | ||
Journal
|
2015 | 10Gbps Network Traffic Capture and Runtime Indexing 최선오 전자통신동향분석, v.30, no.4, pp.181-190 | ||
Conference
|
2015 | Load Adaptive Distributed Stream Processing System for Explosive Stream Data Myungcheol Lee International Conference on Advanced Communication Technology (ICACT) 2015, pp.753-757 | 3 | |
Conference
|
2015 | Testing Data Set for Analyzing Behaviors of Malicious Codes Youngsoo Kim International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2015, pp.4-9 | ||
Conference
|
2015 | Traceback of the Cyber Targeted Attacks 김정태 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1495-1496 | ||
Conference
|
2015 | Performance Comparison of Relational Databases and Columnar Databases for Fast Search of 10Gbps Network Flows 최선오 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1538-1539 | ||
Conference
|
2015 | Design and Implementation of Network Forensic System for 2Gbps Network Traffic 최양서 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1597-1598 | ||
Conference
|
2015 | A Study on the Network Data with a Cyber Black System 이주영 한국통신학회 종합 학술 발표회 (하계) 2015, pp.1595-1596 | ||
Conference
|
2015 | Trend and Issue Dynamic Analysis for Malware 황호 한국정보처리학회 학술 발표 대회 (춘계) 2015, pp.418-420 | ||
Journal
|
2015 | Anomaly Intrusion Detection Based on Hyper-ellipsoid in the Kernel Feature Space Hansung Lee KSII Transactions on Internet and Information Systems, v.9, no.3, pp.1173-1192 | 5 | |
Conference
|
2015 | Host Behavior Characteristic Description Method Against APT Attack Detection Moon Daesung World Congress on Information Technology Applications and Services (World IT Congress) 2015, pp.1-7 | ||
Conference
|
2014 | Secure Virtualised Environment Pushpinder Kaur Chouhan International Conference for Internet Technology and Secured Transactions (ICITST) 2014, pp.112-117 | 0 | |
Conference
|
2014 | Involvers’ Behavior-based Modeling in Cyber Targeted Attack Youngsoo Kim International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2014, pp.132-137 | ||
Conference
|
2014 | Attack Cause Analysis Algorithm using Cyber BlackBox 최선오 한국정보처리학회 학술 발표 대회 (추계) 2014, pp.392-394 | ||
Journal
|
2014 | Host based Feature Description Method for Detecting APT Attack 문대성 정보보호학회논문지, v.24, no.5, pp.839-850 | ||
Conference
|
2014 | Unsupervised Clustering of Malware based on Behaviour Analysis 이한성 한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 | ||
Conference
|
2014 | The Phased Classification of Attacking Methods used for Advanced Persistent Threat Youngsoo Kim International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014, pp.1-7 | ||
Conference
|
2014 | Software Integrity Authentication with Trusted Third Party 최양서 대한전자공학회 종합 학술 대회 (하계) 2014, pp.606-608 | ||
Conference
|
2014 | Feature Extraction for Host based Anomaly Detection 문대성 대한전자공학회 종합 학술 대회 (하계) 2014, pp.591-594 | ||
Journal
|
2014 | Cyber attack response technology and standardization 김종현 OSIA Standards & Technology Review Journal, v.27, no.2, pp.76-88 | ||
Journal
|
2014 | Technical Trends of the Cyber Attack Traceback 김정태 전자통신동향분석, v.29, no.1, pp.93-103 | ||
Conference
|
2014 | Detection of Suspicious Behavior for Responding to Cyber Targeted Attack on Big Data Hyunjoo Kim International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 | ||
Conference
|
2014 | Abnormal Behavior Detection Technique based on Big Data Hyunjoo Kim International Symposium on Frontier and Innovation in Future Computing and Communications (FCC) 2014 (LNEE 301), v.301, pp.553-563 | 6 | |
Conference
|
2013 | Hue Modeling for Object Tracking in Multiple Non-Overlapping Cameras Minho Han International Workshop on Multi-disciplinary Trends in Artificial Intelligence (MIWAI) 2013, pp.69-78 | 1 | |
Conference
|
2013 | Design and Implementation of the Contents Visualization System for Social Networks Jong-Hoon Lee International Conference for Internet Technology and Secured Transactions (ICITST) 2013, pp.479-783 | 1 | |
Conference
|
2013 | Executable File Reconstruction on Virtualized Environment Yangseo Choi International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.264-267 | ||
Conference
|
2013 | Cooperative Security Monitoring System Jong-Hyun Kim Workshop on Visualization for Cyber Security (VizSec) 2013, pp.1-2 | ||
Conference
|
2013 | Social Contents Sharing Model and System based on User Location and Social Network Jung-Tae Kim International Conference on Consumer Electronics (ICCE) 2013 : Berlin, pp.314-318 | 5 | |
Conference
|
2013 | Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics Byoungkoo Kim Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340 | ||
Journal
|
2013 | GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection Hyunjoo Kim Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 | 0 | |
Journal
|
2013 | Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection Yangseo Choi Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 | 0 | |
Conference
|
2013 | Recent Cyber Attacks and Security Intelligence 김영수 한국 컴퓨터 종합 학술 대회 2013, pp.718-719 | ||
Conference
|
2013 | Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis Sun-Hee Lim International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507 | ||
Journal
|
2013 | Cyber Attacks and Security Intelligence Youngsoo Kim Research Notes in Information Science, v.14, pp.106-108 | 0 | |
Journal
|
2013 | ITU-T SG17 Cybersecurity Standardization Trend 김종현 정보보호학회지, v.23, no.3, pp.19-27 | ||
Journal
|
2013 | Technical Trends of Cyber Security with Big Data 김종현 전자통신동향분석, v.28, no.3, pp.19-29 | ||
Journal
|
2013 | Software Authentication Method with Trusted Third Party Yangseo Choi Research Notes in Information Science, v.14, pp.102-105 | ||
Conference
|
2012 | Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding Daewon Kim International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 | 1 | |
Conference
|
2012 | Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks Hyunjoo Kim International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 | 6 | |
Conference
|
2012 | AIGG Threshold Based HTTP GET Flooding Attack Detection Yang-seo Choi International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 | 12 | |
Conference
|
2012 | Defense against TCP Flooding Attack Seungyong Yoon International Conference on Security and Cryptography (SECRYPT) 2012, pp.416-420 | 1 | |
Conference
|
2012 | Network-based Executable File Extraction and Analysis for Malware Detection Byoungkoo Kim International Conference on Security and Cryptography (SECRYPT) 2012, pp.430-433 | ||
Journal
|
2012 | Utilization of Physical Security Events for the Converged Security Using Analytic Hierarchy Process : Focus on Information Security 강구홍 정보보호학회논문지, v.22, no.3, pp.553-564 | ||
Journal
|
2012 | Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process : focus on Information Security 강구홍 정보보호학회논문지, v.22, no.3, pp.553-564 | ||
Conference
|
2011 | Timeslot Monitoring Model for Application Layer DDoS Attack Detection Y.S. Choi International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2011, pp.677-679 | ||
Conference
|
2011 | Design and Implementation of Secure-NIC System for DDoS Attack Response 김병구 한국정보처리학회 학술 발표 (추계) 2011, pp.996-998 | ||
Conference
|
2011 | Design and Implementation of ALADDIN System 윤승용 한국정보처리학회 학술 발표 (추계) 2011, pp.992-995 | ||
Conference
|
2011 | Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource Dae Won Kim International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145 | ||
Conference
|
2011 | Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File 김대원 한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944 | ||
Journal
|
2011 | Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card 김병구 정보보호학회논문지, v.21, no.2, pp.119-129 | ||
Conference
|
2010 | Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File Dae Won Kim International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 | 1 | |
Conference
|
2009 | Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points Yoo Hee Cho Asia-Pacific Network Operations and Management Symposium (APNOMS) 2009 (LNCS 5787), v.5787, pp.385-394 | 0 | |
Journal
|
2009 | Polymorphic Worm Detection Using A Fast Static Analysis Approach 오진태 정보보호학회논문지, v.19, no.4, pp.29-39 | ||
Conference
|
2009 | Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection Byoung Koo Kim International Conference on Security and Management (SAM) 2009, pp.1-6 | ||
Conference
|
2009 | Abnormal Traffcic Detection using Flow-based Traffic Measuring Scheme Seung Yong Yoon International Conference on Security and Management (SAM) 2009, pp.1-5 | ||
Conference
|
2009 | Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique Dae Won Kim International Conference on Communications (ICC) 2009, pp.1-6 | 0 | |
Journal
|
2009 | Encoded Executable File Detection Technique Via Executable File Header Analysis Yang Seo Choi International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36 | ||
Journal
|
2009 | Validation Methods of Suspicious Network Flows for Unknown Attack Detection Ik Kyun Kim International Journal of Computers, v.1, no.3, pp.104-114 | ||
Conference
|
2009 | A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment Ik Kyun Kim International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 | ||
Conference
|
2008 | An Architecture of Unknown Attack Detection System against Zero-day Worm Ik Kyun Kim International Conference on Applied Computer Science (ACS) 2008, pp.205-211 | ||
Conference
|
2008 | PE File Header Analysis-Based Packed PE File Detection Technique (PHAD) Yang-Seo Choi International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 | 40 | |
Journal
|
2008 | Tracing Stored Program Counter to Detect Polymorphic Shellcode Dae Won Kim IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 | 3 | |
Conference
|
2008 | Function Call Mechanism Based Executable Code Detection for the Network Security Dae Won Kim International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 | 3 | |
Conference
|
2008 | Fast Static Analysis Method to Detect Polymorphic Worm 김대원 한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232 | ||
Journal
|
2008 | Executable Code Recognition in Network Flows Using Instruction Transition Probabilities Ik Kyun Kim IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 | 2 | |
Journal
|
2008 | PE Header Characteristics Analysis Technique for Malware Detection 최양서 정보보안논문지, v.8, no.2, pp.63-70 | ||
Journal
|
2008 | The Recent Trends of Polymorphic Shellcodes Detection Technologies 김대원 전자통신동향분석, v.23, no.1, pp.145-152 | ||
Journal
|
2008 | 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트 김대원 주간기술동향, v.1329, pp.1-12 | ||
Journal
|
2007 | Zero-day 공격 대응을 위한 네트워크 보안의 지능화 기술 정일안 정보와 통신 : 한국통신학회지, v.24, no.11, pp.14-24 | ||
Conference
|
2007 | A Practical Approach for Detecting Executable Codes in Network Traffic Ik Kyun Kim Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 | 1 | |
Journal
|
2006 | A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm 김익균 전자공학회논문지 TC, v.43, no.7, pp.93-103 | ||
Journal
|
2006 | 네트워크 보안을 위한 공격 분류법 김대원 주간기술동향, v.1249, pp.1-13 | ||
Conference
|
2004 | Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System Hyeong Ju Kim International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3043), v.3043, pp.998-1006 | 0 | |
Conference
|
2004 | Design and Implementation of High-Performance Intrusion Detection System Byoung Koo Kim International Conference on Computational Science and Its Applications (ICCSA) 2004 (LNCS 3046), v.3046, pp.594-602 | 2 | |
Conference
|
2003 | Design of Security Node System for High-Speed Intrusion Detection and Response 김병구 통신 정보 합동 학술 대회 (JCCI) 2003, pp.350-350 | ||
Conference
|
2002 | Design of Security Gateway System for High-Speed Intrusion Detection Performance 김병구 한국통신학회 종합 학술 발표회 (추계) 2002, pp.1076-1079 | ||
Conference
|
2002 | A Simple Rate-Based Congestion Control Scheme Using an Enhanced BECN in ATM Networks Ik Kyun Kim International Conference on Information Networking (ICOIN) 2002 (LNCS 2343), v.2343, pp.17-27 | 0 |