Conference
|
2024 |
Methods to Improve Energy Efficiency and Availability of IoT Devices in Wireless Environments
Minsuk Choi
International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.376-378 |
|
|
Conference
|
2023 |
A highly reliable power saving method for IoT devices in a wireless environment
Minsuk Choi
International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1098-1100 |
0 |
|
Journal
|
2022 |
Network Security Protocol Performance Analysis in IoT Environment
강동희
정보보호학회논문지, v.32, no.5, pp.955-963 |
|
|
Conference
|
2022 |
An IoT Device-trusted Remote Attestation Framework
Kyeong Tae Kim
International Conference on Advanced Communications Technology (ICACT) 2022, pp.218-223 |
5 |
|
Journal
|
2021 |
Implementation of Smart Segmentation Framework for Preventing Security Threats Spreading in IoT Networks
임재덕
한국통신학회논문지, v.46, no.8, pp.1321-1331 |
0 |
|
Conference
|
2020 |
Dynamic Security Policy Model for Mitigating Threat Spreading in IoT
손선경
전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3 |
|
|
Conference
|
2020 |
Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT
Jaedeok Lim
International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 |
2 |
|
Conference
|
2019 |
Implementation of Remote Attestation and Management Framework for TPM-based IoT devices
임재덕
통신 정보 합동 학술 대회 (JCCI) 2019, pp.1-2 |
|
|
Journal
|
2017 |
SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers
Vishal Sharma
Mobile Information Systems, v.2017, pp.1-17 |
19 |
|
Conference
|
2017 |
Mobile Security Solution for Sensitive Data Leakage Prevention
GeonLyang Kim
International Conference on Communications and Broadband Networking (ICCBN) 2017, pp.59-64 |
2 |
|
Journal
|
2016 |
Secure User Authentication based on the Trusted Platform for Mobile Devices
GeonLyang Kim
EURASIP Journal on Wireless Communications and Networking, v.2016, no.1, pp.1-15 |
7 |
|
Conference
|
2016 |
A Study on the Security Features of Operating System for Lightweight IoT Devices
임재덕
한국통신학회 종합 학술 발표회 (하계) 2016, pp.1384-1385 |
|
|
Conference
|
2015 |
Smart Meter and Smart Meter Security
Yun-kyung Lee
International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3 |
|
|
Conference
|
2015 |
Technology Trends of Access Control in IoT and Requirements Analysis
Yun-kyung Lee
International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1034-1036 |
|
|
Conference
|
2015 |
Trusted Military Services Based on the Secure Domain of the Mobile Security Solution
GeonLyang Kim
International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131 |
|
|
Journal
|
2015 |
A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization
Su-Wan Park
International Journal of Distributed Sensor Networks, v.2015, pp.1-9 |
11 |
|
Conference
|
2014 |
New Approach to Determine Metamorphic Malicious Mobile Code on Android based Smartphones
Sangdon Kim
International Conference on Internet (ICONI) 2014, pp.1-6 |
|
|
Conference
|
2014 |
A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device
Jong-Yeon Park
International Conference on IT Convergence and Security (ICITCS) 2014, pp.1-4 |
3 |
|
Conference
|
2014 |
Protection Method from APP Repackaging Attack on Mobile Device with Separated Domain
Yun-kyung Lee
International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.667-668 |
3 |
|
Journal
|
2014 |
Improving Performance of X-Rated Video Classification with the Optimized Repeated Curve-Like Spectrum Feature and the Skip-and-Analysis Processing
Jae-Deok Lim
Multimedia Tools and Applications, v.71, no.2, pp.717-740 |
1 |
|
Conference
|
2014 |
Hidden Evasive Server-Side Polymorphic Malicious Apps Detection Mechanism on Android based Smart Phone Devices
Daeyeol Moon
International Conference on Convergence Technology (ICCT) 2014, pp.819-820 |
|
|
Conference
|
2014 |
A Study on the Trusted App.-Based Access Control to the Isolated Trusted Execution Environment in Mobile Device
임재덕
한국통신학회 종합 학술 발표회 (하계) 2014, pp.364-365 |
|
|
Conference
|
2013 |
Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform
Jae-Deok Lim
International Conference on Computer Science and its Applications (CSA) 2013 (LNEE 279), v.279, pp.161-166 |
1 |
|
Conference
|
2013 |
DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System
You Joung Ham
International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 |
8 |
|
Journal
|
2013 |
A Technical Trend of Secure Storages
박종연
전자통신동향분석, v.28, no.3, pp.30-38 |
|
|
Journal
|
2012 |
Implementation of Automatic X-rated Video Classification and Management System based on Multimodal Features
JaeDeok Lim
International Journal of Advancements in Computing Technology, v.4, no.23, pp.178-186 |
1 |
|
Conference
|
2012 |
Adult Movie Classification System Based on Multimodal Approach with Visual and Auditory Features
laeDeok Lim
International Conference on Information Science and Digital Content Technology (ICIDT) 2012, pp.745-748 |
|
|
Journal
|
2011 |
Automatic Classification of X-rated Videos using Obscene Sound Analysis based on a Repeated Curve-like Spectrum Feature
JaeDeok Lim
International Journal of Multimedia & Its Applications, v.3, no.4, pp.1-17 |
|
|
Conference
|
2011 |
Design and Performance Evaluation of the Statistical Combining of Decision Models using Novel Video-based Features for Malicious Video Detection
최병철
통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-5 |
|
|
Conference
|
2011 |
Improvement of Processing Performance of Audio Feature Extraction Algorithm for Detecting Objectionable Sounds by Controlling Frame Size
임재덕
통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 |
|
|
Conference
|
2011 |
Classification and Detection of Objectionable Sounds Using Repeated Curve-like Spectrum Feature
Jae Deok Lim
International Conference on Information Science and Applications (ICISA) 2011, pp.1-5 |
6 |
|
Conference
|
2011 |
모션 에너지, 컬러 에너지, 그리고 컬러 히스토그램의 시간적 특성을 이용한 새로운 유해 비디오 분류 방법 설계 및 성능 분석
최병철
영상 처리 및 이해에 관한 워크샵 (IPIU) 2011, pp.1-3 |
|
|
Conference
|
2010 |
Automatic Detection of Malicious Sound Using Segmental Two-Dimensional Mel-Frequency Cepstral Coefficients and Histograms of Oriented Gradients
Myung Jong Kim
International Conference on Multimedia (MM) 2010, pp.887-890 |
5 |
|
Conference
|
2010 |
Classifying of Objectionable Contents with Various Audio Signal Features
Jae Deok Lim
International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 |
2 |
|
Conference
|
2010 |
Classification Performance of Audio Feature-based Pornographic Contents According to Various Audio Frame Sizes
임재덕
대한전자공학회 종합 학술 대회 (하계) 2010, pp.1446-1448 |
|
|
Conference
|
2010 |
Classification Performance of Pornographic Contents by analyzing the Correlation of Audio Signal
임재덕
대한전자공학회 종합 학술 대회 (하계) 2010, pp.1422-1424 |
|
|
Conference
|
2009 |
A Study of Classifying the Objectionable Content by using the MFCCsbased Audio Feature Set
Jae Deok Lim
International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-2 |
|
|
Journal
|
2009 |
The Technology of the Audio Feature Extraction for Classifying Contents
임재덕
전자통신동향분석, v.24, no.6, pp.121-132 |
|
|
Conference
|
2009 |
Implementation of Integrity Management Architecture for Scalability
Jae Deok Lim
International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2009, pp.1169-1172 |
|
|
Conference
|
2009 |
A study of Management Interface for Cluster System Integrity
Jae Deok Lim
International Conference on Advanced Communication Technology (ICACT) 2009, pp.1261-1264 |
|
|
Conference
|
2008 |
A Study of Providing the Integrity on Cluster System
Jae Deok Lim
International Conference on Advanced Communication Technology (ICACT) 2008, pp.1925-1928 |
2 |
|
Conference
|
2007 |
Processing of Multi-pattern Signature in Intrusion Detection System with Content Processor
Young-Ho Kim
International Conference on Information, Communications and Signal Processing (ICICS) 2007, pp.1-4 |
1 |
|
Conference
|
2007 |
Implementation of Multi-thread based Intrusion Prevention System for IPv6
Jae-Deok Lim
International Conference on Control, Automation and Systems (ICCAS) 2007, pp.404-407 |
5 |
|
Conference
|
2007 |
Implementation of LSM-Based RBAC Module for Embedded System
Jae-Deok Lim
International Workshop on Information Security Applications (WISA) 2007 (LNCS 4867), v.4867, pp.91-101 |
2 |
|
Journal
|
2007 |
An Analysis of Security Threat and Network Attack in IPv6
정보흥
전자통신동향분석, v.22, no.1, pp.37-50 |
|
|
Conference
|
2006 |
Packet Filter Algorithm to Prevent the Security Hole of Routing Header in IPv6
Jae Deok Lim
SICE-ICASE International Joint Conference 2006, pp.3924-3927 |
1 |
|
Conference
|
2006 |
Protection Algorithm Against Security Holes of IPv6 Routing Header
Jae Deok Lim
International Conference on Advanced Communication Technology (ICACT) 2006, pp.2004-2007 |
2 |
|
Conference
|
2006 |
Fragment Packet Partial Re-assembly Method for Intrusion Detection
Bo Heung Chung
International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 |
0 |
|
Journal
|
2005 |
리눅스 시스템 기반의 IPv6 네트워크 보안 방법
임재덕
정보보호학회지, v.15, no.2, pp.8-17 |
|
|
Conference
|
2005 |
A Study of the efficient management of IPsec Protocol
JaeDeok Lim
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.1415-1416 |
|
|
Conference
|
2005 |
Implementation of light-Weight IKE Protocol for IPsec VPN within Router
Jae Deok Lim
International Conference on Advanced Communication Technology (ICACT) 2005, pp.81-84 |
|
|
Conference
|
2004 |
Conformance Test for Open Internet Key Exchange Protocol Implementation
임재덕
한국통신학회 종합 학술 발표회 (하계) 2004, pp.166-166 |
|
|
Journal
|
2004 |
The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment
유준석
정보보호학회논문지, v.14, no.3, pp.3-12 |
|
|
Conference
|
2003 |
Establishment of a secure networking between Secure OSs
Jae-Deok Lim
International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2097-2100 |
|
|
Journal
|
2003 |
Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system
임재덕
정보처리학회논문지 C, v.10C, no.4, pp.387-396 |
|
|
Conference
|
2003 |
The Designs and Implementation of Trusted Channel between Secure Operating Systems
Joon-Suk Yu
한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.2117-2120 |
|
|
Conference
|
2003 |
A Study of Network Packet Protection between Trusted Systems
임재덕
통신 정보 합동 학술 대회 (JCCI) 2003, pp.213-213 |
|
|
Conference
|
2002 |
A Study on the Implementation of Trusted Channel on Trusted Systems
유준석
한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1015-1018 |
|
|
Conference
|
2002 |
Data Encryption used Access Control within Vnode layer based on FreeBSD
임재덕
통신 정보 합동 학술 대회 (JCCI) 2002, pp.191-191 |
|
|
Conference
|
2001 |
Design of Crypto-Filesystem using Access Control Model
임재덕
한국정보처리학회 학술 발표 대회 (추계) 2001, pp.835-838 |
|
|
Conference
|
2001 |
Adaptive E-OBA prefetching method
황보준형
한국정보과학회 학술 발표 (봄) 2001, pp.103-105 |
|
|