ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Lim Jae Deok
Department
AI Convergence Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2023 A highly reliable power saving method for IoT devices in a wireless environment   Minsuk Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1098-1100 0
Journal
2022 Network Security Protocol Performance Analysis in IoT Environment   강동희  정보보호학회논문지, v.32, no.5, pp.955-963
Conference
2022 An IoT Device-trusted Remote Attestation Framework   Kyeong Tae Kim   International Conference on Advanced Communications Technology (ICACT) 2022, pp.218-223 5
Journal
2021 Implementation of Smart Segmentation Framework for Preventing Security Threats Spreading in IoT Networks   임재덕   한국통신학회논문지, v.46, no.8, pp.1321-1331 0
Conference
2020 Dynamic Security Policy Model for Mitigating Threat Spreading in IoT   손선경   전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3
Conference
2020 Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT   Jaedeok Lim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 2
Conference
2019 Implementation of Remote Attestation and Management Framework for TPM-based IoT devices   임재덕   통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2
Journal
2017 SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers   Vishal Sharma  Mobile Information Systems, v.2017, pp.1-17 19
Conference
2017 Mobile Security Solution for Sensitive Data Leakage Prevention   GeonLyang Kim   International Conference on Communications and Broadband Networking (ICCBN) 2017, pp.59-64 2
Journal
2016 Secure User Authentication based on the Trusted Platform for Mobile Devices   GeonLyang Kim   EURASIP Journal on Wireless Communications and Networking, v.2016, no.1, pp.1-15 7
Conference
2016 A Study on the Security Features of Operating System for Lightweight IoT Devices   임재덕   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1384-1385
Conference
2015 Smart Meter and Smart Meter Security   Yun-kyung Lee   International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3
Conference
2015 Technology Trends of Access Control in IoT and Requirements Analysis   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1034-1036
Conference
2015 Trusted Military Services Based on the Secure Domain of the Mobile Security Solution   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131
Journal
2015 A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization   Su-Wan Park   International Journal of Distributed Sensor Networks, v.2015, pp.1-9 11
Conference
2014 New Approach to Determine Metamorphic Malicious Mobile Code on Android based Smartphones   Sangdon Kim  International Conference on Internet (ICONI) 2014, pp.1-6
Conference
2014 A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device   Jong-Yeon Park   International Conference on IT Convergence and Security (ICITCS) 2014, pp.1-4 3
Conference
2014 Protection Method from APP Repackaging Attack on Mobile Device with Separated Domain   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.667-668 3
Journal
2014 Improving Performance of X-Rated Video Classification with the Optimized Repeated Curve-Like Spectrum Feature and the Skip-and-Analysis Processing   Jae-Deok Lim   Multimedia Tools and Applications, v.71, no.2, pp.717-740 1
Conference
2014 Hidden Evasive Server-Side Polymorphic Malicious Apps Detection Mechanism on Android based Smart Phone Devices   Daeyeol Moon  International Conference on Convergence Technology (ICCT) 2014, pp.819-820
Conference
2014 A Study on the Trusted App.-Based Access Control to the Isolated Trusted Execution Environment in Mobile Device   임재덕   한국통신학회 종합 학술 발표회 (하계) 2014, pp.364-365
Conference
2013 Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform   Jae-Deok Lim   International Conference on Computer Science and its Applications (CSA) 2013 (LNEE 279), v.279, pp.161-166 1
Conference
2013 DroidVulMon: Android Based Mobile Device Vulnerability Analysis and Monitoring System   You Joung Ham  International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 8
Journal
2013 A Technical Trend of Secure Storages   박종연   전자통신동향분석, v.28, no.3, pp.30-38
Journal
2012 Implementation of Automatic X-rated Video Classification and Management System based on Multimodal Features   JaeDeok Lim   International Journal of Advancements in Computing Technology, v.4, no.23, pp.178-186 1
Conference
2012 Adult Movie Classification System Based on Multimodal Approach with Visual and Auditory Features   laeDeok Lim   International Conference on Information Science and Digital Content Technology (ICIDT) 2012, pp.745-748
Journal
2011 Automatic Classification of X-rated Videos using Obscene Sound Analysis based on a Repeated Curve-like Spectrum Feature   JaeDeok Lim   International Journal of Multimedia & Its Applications, v.3, no.4, pp.1-17
Conference
2011 Improvement of Processing Performance of Audio Feature Extraction Algorithm for Detecting Objectionable Sounds by Controlling Frame Size   임재덕   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Conference
2011 Design and Performance Evaluation of the Statistical Combining of Decision Models using Novel Video-based Features for Malicious Video Detection   최병철   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-5
Conference
2011 Classification and Detection of Objectionable Sounds Using Repeated Curve-like Spectrum Feature   Jae Deok Lim   International Conference on Information Science and Applications (ICISA) 2011, pp.1-5 6
Conference
2011 모션 에너지, 컬러 에너지, 그리고 컬러 히스토그램의 시간적 특성을 이용한 새로운 유해 비디오 분류 방법 설계 및 성능 분석   최병철   영상 처리 및 이해에 관한 워크샵 (IPIU) 2011, pp.1-3
Conference
2010 Automatic Detection of Malicious Sound Using Segmental Two-Dimensional Mel-Frequency Cepstral Coefficients and Histograms of Oriented Gradients   Myung Jong Kim  International Conference on Multimedia (MM) 2010, pp.887-890 5
Conference
2010 Classifying of Objectionable Contents with Various Audio Signal Features   Jae Deok Lim   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 2
Conference
2010 Classification Performance of Pornographic Contents by analyzing the Correlation of Audio Signal   임재덕   대한전자공학회 종합 학술 대회 (하계) 2010, pp.1422-1424
Conference
2010 Classification Performance of Audio Feature-based Pornographic Contents According to Various Audio Frame Sizes   임재덕   대한전자공학회 종합 학술 대회 (하계) 2010, pp.1446-1448
Conference
2009 A Study of Classifying the Objectionable Content by using the MFCCsbased Audio Feature Set   Jae Deok Lim   International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-2
Journal
2009 The Technology of the Audio Feature Extraction for Classifying Contents   임재덕   전자통신동향분석, v.24, no.6, pp.121-132
Conference
2009 Implementation of Integrity Management Architecture for Scalability   Jae Deok Lim   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.1169-1172
Conference
2009 A study of Management Interface for Cluster System Integrity   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1261-1264
Conference
2008 A Study of Providing the Integrity on Cluster System   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1925-1928 2
Conference
2007 Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor   Young-Ho Kim   International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 1
Conference
2007 Implementation of Multi-thread based Intrusion Prevention System for IPv6   Jae-Deok Lim   International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 5
Conference
2007 Implementation of LSM-Based RBAC Module for Embedded System   Jae-Deok Lim   World Conference on Information Security Applications (WISA) 2007 (LNCS 4867), v.4867, pp.91-101 2
Conference
2007 Implementation of LSM-Based RBAC Module for Embedded System   Jae-Deok Lim   International Workshop on Information Security Applications (WISA) 2007 (LNCS 4867), v.4867, pp.91-101 2
Journal
2007 An Analysis of Security Threat and Network Attack in IPv6   정보흥   전자통신동향분석, v.22, no.1, pp.37-50
Conference
2006 Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6   Jae Deok Lim   SICE-ICASE International Joint Conference 2006, pp.3924-3927 1
Conference
2006 Protection Algorithm Against Security Holes of IPv6 Routing Header   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2006, pp.2004-2007 2
Conference
2006 Fragment Packet Partial Re-assembly Method for Intrusion Detection   Bo Heung Chung   International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 0
Conference
2005 A Study of the efficient management of IPsec Protocol   JaeDeok Lim   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1415-1416
Journal
2005 리눅스 시스템 기반의 IPv6 네트워크 보안 방법   임재덕   정보보호학회지, v.15, no.2, pp.8-17
Conference
2005 Implementation of light-Weight IKE Protocol for IPsec VPN within Router   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2005, pp.81-84
Conference
2004 Conformance Test for Open Internet Key Exchange Protocol Implementation   임재덕   한국통신학회 종합 학술 발표회 (하계) 2004, pp.166-166
Journal
2004 The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment   유준석   정보보호학회논문지, v.14, no.3, pp.3-12
Conference
2003 Establishment of a secure networking between Secure OSs   Jae-Deok Lim   International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2097-2100
Journal
2003 Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system   임재덕   정보처리학회논문지 C, v.10C, no.4, pp.387-396
Conference
2003 A Study of Network Packet Protection between Trusted Systems   임재덕   통신 정보 합동 학술 대회 (JCCI) 2003, pp.213-213
Conference
2003 The Designs and Implementation of Trusted Channel between Secure Operating Systems   Joon-Suk Yu   한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.2117-2120
Conference
2002 A Study on the Implementation of Trusted Channel on Trusted Systems   유준석   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1015-1018
Conference
2002 Data Encryption used Access Control within Vnode layer based on FreeBSD   임재덕   통신 정보 합동 학술 대회 (JCCI) 2002, pp.191-191
Conference
2001 Design of Crypto-Filesystem using Access Control Model   임재덕   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.835-838
Conference
2001 Adaptive E-OBA prefetching method   황보준형   한국정보과학회 학술 발표 (봄) 2001, pp.103-105