Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | A RF Jamming Detection Technology in Open RAN 권혁찬 전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-3 | ||
Conference
|
2024 | Architecture Design of Malicious xAPP Attack Detection Systems in Open RAN Environments 정병호 전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-4 | ||
Journal
|
2023 | Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals 정병호 전자통신동향분석, v.38, no.5, pp.61-70 | ||
Conference
|
2022 | A Behavior-similarity Measurement Scheme for Anomaly Detection in IoT Device Networks Byungho Chung International Conference on Internet (ICONI) 2022, pp.295-296 | ||
Conference
|
2022 | Non-invasive Intrusion Prevention System against Ransomware in Healthcare Hyeokchan Kwon International Conference on Internet (ICONI) 2022, pp.287-288 | ||
Journal
|
2021 | Security Technology Trends to Prevent Medical Device Hacking and Ransomware 권혁찬 전자통신동향분석, v.36, no.5, pp.21-31 | ||
Journal
|
2021 | ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions Ho Bin Hwang Sensors, v.21, no.21, pp.1-19 | 14 | |
Conference
|
2020 | Anomaly detection of Ransomware behaviors based on Random Forest and LSTM in the medical devices network environment 정병호 전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3 | ||
Conference
|
2020 | Analysis of bio-signal-based bio-crypto technology trends and service scenarios 권혁찬 전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-4 | ||
Journal
|
2019 | Standardization Trend of Autonomous Vehicle Security 권혁찬 TTA Journal, v.186, pp.55-64 | ||
Journal
|
2019 | Security trend and issue of connected medical device 권혁찬 주간기술동향, v.1911, pp.14-26 | ||
Journal
|
2018 | Standardization trend on ITS security 이상우 정보보호학회지, v.28, no.4, pp.25-28 | ||
Conference
|
2018 | Design and Implementation on the Socket-based Access Control Scheme against V2N-connected Vehicle Attacks 정병호 한국통신학회 종합 학술 발표회 (동계) 2018, pp.1124-1125 | ||
Conference
|
2017 | In-vehicle Network Access Control Mechanism based on Token 권혁찬 전자 정보 통신 학술 대회 (CEIC) 2017, pp.227-228 | ||
Conference
|
2017 | Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service 이석준 전자 정보 통신 학술 대회 (CEIC) 2017, pp.223-226 | ||
Conference
|
2017 | Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service Sokjoon Lee The IRES International Conference on Innovative Engineering Technologies (ICIET) 2017, pp.10-13 | ||
Conference
|
2017 | Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors Hwajeong Seo International Conference on Information Security and Cryptology (ICISC) 2017, pp.37-50 | 3 | |
Journal
|
2017 | Smart Car Trends and Security Issues from a Connectivity Perspective 권혁찬 정보와 통신 : 한국통신학회지, v.34, no.10, pp.17-23 | ||
Journal
|
2017 | ITU-T SG17에서의 ITS 보안 기술 표준화 동향 이상우 정보보호학회지, v.27, no.5, pp.21-25 | ||
Journal
|
2017 | Standardization Issues on Secure Vehicular Communication SANG-WOO LEE International Journal of Communications, v.2, pp.19-23 | ||
Conference
|
2016 | Wi-Fi Fingerprint-based Approach to Securing the Connected Vehicle against Wireless Attack Hyeokchan Kwon International Conference on Networks and Communications (NETCOM) 2016, pp.1-7 | ||
Conference
|
2016 | Group Signature-based Vehicular PKI without Thousands of Pseudonym Certificates Sokjoon Lee International Conference on Computer Engineering and Information Technology (ICCEIT) 2016, pp.25-28 | ||
Conference
|
2016 | IEEE 11073-20601 Security Protocol Design Requirements for Smart Healthcare Device 이석준 한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.363-366 | ||
Conference
|
2016 | The study on structure of Agent for protecting IEEE 11073:20601 Transport Layer 정도영 한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.367-370 | ||
Journal
|
2015 | 클라우드 보안 개요 권혁찬 정보와 통신 : 한국통신학회지, v.32, no.10, pp.71-76 | ||
Conference
|
2015 | Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device Hyeokchan Kwon International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 | 0 | |
Journal
|
2015 | 차세대 IoT 네트워크 보안 현황 권혁찬 정보처리학회지, v.22, no.2, pp.39-46 | ||
Conference
|
2015 | A Content Access Control Mechanism Through Indoor Location Estimation Based on WLAN 권혁찬 한국통신학회 종합 학술 발표회 (동계) 2015, pp.1187-1188 | ||
Conference
|
2014 | Analysis of EVM and RSS for detecting Rogue AP in WLAN 안개일 한국정보과학회 학술 발표회 (동계) 2014, pp.724-726 | ||
Conference
|
2014 | Detecting Cloned Devices in Wireless Network using RSSI and RF Features Hyeokchan Kwon International Conference on Internet (ICONI) 2014, pp.1-4 | ||
Conference
|
2014 | Location-Based Rogue Device Detection Mechanism 권혁찬 한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 | ||
Conference
|
2014 | Mobile Device Management Scheme using Wireless Intrusion Information 권혁찬 한국정보보호학회 학술 대회 (하계) 2014, pp.1-4 | ||
Conference
|
2014 | EVM Analysis for MAC Identification of Wireless Device in WLAN Environment 안개일 통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2 | ||
Journal
|
2013 | Improving Mobile Device Classification Using Security Events for Preventing Wireless Intrusion Hyeokchan Kwon International Journal of Security and Its Applications, v.7, no.6, pp.181-190 | 1 | |
Conference
|
2013 | A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion Hyeokchan Kwon International Conference on Information Science and Industrial Applications (ISI) 2013, pp.317-321 | ||
Journal
|
2013 | Technologies for Next Generation Wireless LAN Security 김신효 전자통신동향분석, v.28, no.1, pp.100-109 | ||
Conference
|
2012 | Efficient Mobile Device Management Scheme Using Security Events from Wireless Intrusion Prevention System Hyeokchan Kwon International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.815-822 | 3 | |
Journal
|
2012 | 아동보호를 위한 동영상 콘텐츠 정보보호 경량기법 나재훈 정보보호학회지, v.22, no.3, pp.41-47 | ||
Journal
|
2012 | 스마트 미디어 시대의 콘텐츠 보호 기술 동향 이승민 주간기술동향, v.1534, pp.11-21 | ||
Conference
|
2011 | Multi-level Video Protection Scheme with Format Compliance for H.264/SVC Hyeok Chan Kwon International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS) 2011, pp.1-4 | ||
Conference
|
2011 | Privacy-Preserving PKI Design Based on Group Signature Sokjoon Lee Australian Information Security Management Conference (AISM) 2011, pp.155-164 | ||
Conference
|
2011 | Security Policy Model for Secure Transcodable Mechanism 문용혁 한국정보처리학회 학술 발표 (추계) 2011, pp.958-959 | ||
Conference
|
2011 | Smart Media Service using Secure Virtual Machine Yong-Hyuk Moon International Conference on Information and Communication Technology Convergence (ICTC) 2011, pp.742-743 | 0 | |
Journal
|
2011 | echanism using Hybrid-based Method for SVC Media Transmission 권혁찬 정보보안논문지, v.11, no.3, pp.47-54 | ||
Conference
|
2011 | Consideration of Anonymous Certificate based on Group Signature for User Privacy 이석준 한국통신학회 종합 학술 발표회 (하계) 2011, pp.671-672 | ||
Conference
|
2011 | A Platform-Independent Smart Content Sharing Model 문용혁 한국정보처리학회 학술 발표 (춘계) 2011, pp.224-225 | ||
Conference
|
2011 | Analysis on Size-Interval Based Dispatching System for Multi-Class Job Model 문용혁 한국정보처리학회 학술 발표 (춘계) 2011, pp.163-164 | ||
Conference
|
2009 | A Scalable Security Service Model for Reliable End-to-End Media Distribution and Reuse Yong Hyuk Moon Joint Workshop on Information Security (JWIS) 2009, pp.1-11 | ||
Conference
|
2009 | Protecting IPTV Service Network against Malicious Rendezvous Point Hyeok Chan Kwon Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 | 1 | |
Conference
|
2009 | Designing Pastry-based Secure IPTV Video Delivery Network Hyeok Chan Kwon Joint Workshop on Information Security (JWIS) 2009, pp.1-9 | ||
Conference
|
2009 | Postcompression-based Scalable Media Encryption 권혁찬 한국통신학회 통신 소프트웨어 학술 대회 (COMSW) 2009, pp.1-3 | ||
Conference
|
2009 | Secure Media Streaming Network based on Pastry 권혁찬 한국정보보호학회 학술 대회 (하계) 2009, pp.1-4 | ||
Conference
|
2009 | Secure Overlay Multicast Infrastructure for P2P-based IPTV Service Hyeok Chan Kwon International Conference on Advanced Communication Technology (ICACT) 2009, pp.2041-2043 | ||
Conference
|
2008 | Security Considerations for P2P-based Media Streaming 권혁찬 한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1441-1443 | ||
Journal
|
2008 | Designing Reliable P2P Transmission Mechanism Against MITM Attack 김상춘 정보보호학회논문지, v.18, no.4, pp.103-109 | ||
Journal
|
2008 | Random Visitor: Defense against Identity Attacks in P2P Networks Ja Beom Gu IEICE Transactions on Information and Systems, v.E91-D, no.4, pp.1058-1073 | 1 | |
Conference
|
2008 | The Secure Routing Mechanism for DHT-based Overlay Network Hyeok Chan Kwon International Conference on Advanced Communication Technology (ICACT) 2008, pp.1300-1303 | 2 | |
Conference
|
2007 | Reliable Public Key Distribution Method for Dynamic Peer to Peer Network Hyeok Chan Kwon Joint Workshop on Information Security (JWIS) 2007, pp.1-10 | ||
Conference
|
2007 | Designing Reliable P2P File Sharing Application without PKI Sang Choon Kim World Conference on Information Security Applications (WISA) 2007, pp.1-9 | ||
Journal
|
2007 | P2P 사용자 인증과 OTP 분석 문용혁 정보보호학회지, v.17, no.3, pp.32-40 | ||
Conference
|
2007 | Public Key Management Framework for Two-tier Super Peer Architecture Hyeok Chan Kwon International Conference on Distributed Computing Systems Workshops (ICDCSW) 2007, pp.1-6 | 4 | |
Conference
|
2007 | Performance Prediction in Peer-to-Peer MultiAgent Networks Ja Beom Gu International Workshop on Agents and Peer-to-Peer Computing (AP2PC) 2007 (LNCS 5319), v.5319, pp.27-40 | 0 | |
Journal
|
2007 | Standardization and Technology Trend of Peer-to-Peer Communication 권혁찬 전자통신동향분석, v.22, no.1, pp.11-23 | ||
Conference
|
2006 | Secure Message Delivery Mechanism on Structured Overlay Network Jae Hoon Nah Joint Workshop on Information Security (JWIS) 2006, pp.1-8 | ||
Journal
|
2006 | P2P 관련 국제 표준화 동향 고선기 주간기술동향, v.1241, pp.1-7 | ||
Conference
|
2006 | A Protocol Switching Scheme for Developing Network Management Applications Hyeok Chan Kwon International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.862-872 | 0 | |
Journal
|
2005 | DHT(Distributed Hash Table) 기반 P2P 오버레이 네트워크 보안 위협 분석 권혁찬 정보보호학회지, v.15, no.6, pp.60-67 | ||
Journal
|
2005 | IPv6 환경에서 이동성 보안 프로토콜의 제고 권혁찬 정보보호학회지, v.15, no.3, pp.29-39 | ||
Conference
|
2004 | The VPN Gateway Supporting Mobile Device 권혁찬 한국정보과학회 학술 발표 (가을) 2004, pp.364-366 | ||
Journal
|
2004 | Mobile IPv6 표준화 및 기술 동향 권혁찬 주간기술동향, v.1146, pp.1-8 | ||
Conference
|
2003 | A Security Packet Analyzer in IPv4/IPv6 network 권혁찬 한국정보처리학회 학술 발표 대회 (춘계) 2003, pp.1353-1356 | ||
Conference
|
2002 | Design and Implementation of IP Security Packet Analyzer 권혁찬 대한전자공학회 종합 학술 대회 (추계) 2002 : 컴퓨터/반도체 소사이어티, pp.175-178 | ||
Journal
|
2002 | A Design and Implementation of A Rule-based Security Evaluation System for W Security Engine 권혁찬 정보처리학회논문지 C, v.9C, no.3, pp.367-374 | ||
Conference
|
2002 | A Design and Implementation of Rule Based Security Evaluation System. 권혁찬 통신 정보 합동 학술 대회 (JCCI) 2002, pp.86-86 | ||
Conference
|
2001 | Design of the Rule Based Protocol Security Evaluation System for Internet Secure Service 현정식 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.953-956 | ||
Journal
|
2001 | 정보보호제품의 적합성 시험 평가 현황 김상춘 한국통신학회지, v.11, no.2, pp.7-15 | ||
Journal
|
2001 | A Performance Evaluation of Mobile Agent for Network Management 권혁찬 정보처리학회논문지 C, v.8C, no.1, pp.68-74 | ||
Conference
|
2001 | A Performance Evaluation of Distributed Paradigms for network Management Hyeok Chan Kwon 통신 정보 합동 학술 대회 (JCCI) 2001, pp.188-191 |