|
Conference
|
2025 |
Multi-Layer Threat Data Collection Technology for Anomaly Detection in Cloud-Native Open RAN
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2025, pp.1-3 |
|
|
|
Journal
|
2025 |
Exploiting Human Visual Limitations for High Capacity Information Hiding in Digital Images Using Alpha Channel
Mohsin Shah
IEEE Access, v.13, pp.162933-162946 |
0 |
|
|
Conference
|
2024 |
A RF Jamming Detection Technology in Open RAN
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-3 |
|
|
|
Conference
|
2024 |
Architecture Design of Malicious xAPP Attack Detection Systems in Open RAN Environments
정병호
전자 정보 통신 학술 대회 (CEIC) 2024, pp.1-4 |
|
|
|
Journal
|
2023 |
Technology Trends in Biometric Cryptosystem Based on Electrocardiogram Signals
정병호
전자통신동향분석, v.38, no.5, pp.61-70 |
|
|
|
Conference
|
2022 |
A Behavior-similarity Measurement Scheme for Anomaly Detection in IoT Device Networks
Byungho Chung
International Conference on Internet (ICONI) 2022, pp.295-296 |
|
|
|
Conference
|
2022 |
Non-invasive Intrusion Prevention System against Ransomware in Healthcare
Hyeokchan Kwon
International Conference on Internet (ICONI) 2022, pp.287-288 |
|
|
|
Journal
|
2021 |
Security Technology Trends to Prevent Medical Device Hacking and Ransomware
권혁찬
전자통신동향분석, v.36, no.5, pp.21-31 |
|
|
|
Journal
|
2021 |
ECG Authentication Based on Non-Linear Normalization under Various Physiological Conditions
Ho Bin Hwang
Sensors, v.21, no.21, pp.1-19 |
22 |
|
|
Conference
|
2020 |
Anomaly detection of Ransomware behaviors based on Random Forest and LSTM in the medical devices network environment
정병호
전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-3 |
|
|
|
Conference
|
2020 |
Analysis of bio-signal-based bio-crypto technology trends and service scenarios
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2020, pp.1-4 |
|
|
|
Journal
|
2019 |
Standardization Trend of Autonomous Vehicle Security
권혁찬
TTA Journal, v.186, pp.55-64 |
|
|
|
Journal
|
2019 |
Security trend and issue of connected medical device
권혁찬
주간기술동향, v.1911, pp.14-26 |
|
|
|
Journal
|
2018 |
Standardization trend on ITS security
이상우
정보보호학회지, v.28, no.4, pp.25-28 |
|
|
|
Conference
|
2018 |
Design and Implementation on the Socket-based Access Control Scheme against V2N-connected Vehicle Attacks
정병호
한국통신학회 종합 학술 발표회 (동계) 2018, pp.1124-1125 |
|
|
|
Conference
|
2017 |
In-vehicle Network Access Control Mechanism based on Token
권혁찬
전자 정보 통신 학술 대회 (CEIC) 2017, pp.227-228 |
|
|
|
Conference
|
2017 |
Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service
이석준
전자 정보 통신 학술 대회 (CEIC) 2017, pp.223-226 |
|
|
|
Conference
|
2017 |
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
Hwajeong Seo
International Conference on Information Security and Cryptology (ICISC) 2017, pp.37-50 |
5 |
|
|
Conference
|
2017 |
Security Architecture Design for the Safe Vehicle-to-Nomadic Device(V2N) Service
Sokjoon Lee
The IRES International Conference on Innovative Engineering Technologies (ICIET) 2017, pp.10-13 |
|
|
|
Journal
|
2017 |
ITU-T SG17에서의 ITS 보안 기술 표준화 동향
이상우
정보보호학회지, v.27, no.5, pp.21-25 |
|
|
|
Journal
|
2017 |
Smart Car Trends and Security Issues from a Connectivity Perspective
권혁찬
정보와 통신 : 한국통신학회지, v.34, no.10, pp.17-23 |
|
|
|
Journal
|
2017 |
Standardization Issues on Secure Vehicular Communication
SANG-WOO LEE
International Journal of Communications, v.2, pp.19-23 |
|
|
|
Conference
|
2016 |
Group Signature-based Vehicular PKI without Thousands of Pseudonym Certificates
Sokjoon Lee
International Conference on Computer Engineering and Information Technology (ICCEIT) 2016, pp.25-28 |
|
|
|
Conference
|
2016 |
Wi-Fi Fingerprint-based Approach to Securing the Connected Vehicle against Wireless Attack
Hyeokchan Kwon
International Conference on Networks and Communications (NETCOM) 2016, pp.1-7 |
|
|
|
Conference
|
2016 |
The study on structure of Agent for protecting IEEE 11073:20601 Transport Layer
정도영
한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.367-370 |
|
|
|
Conference
|
2016 |
IEEE 11073-20601 Security Protocol Design Requirements for Smart Healthcare Device
이석준
한국스마트미디어학회/한국전자거래학회 학술 대회 (춘계) 2016, pp.363-366 |
|
|
|
Journal
|
2015 |
클라우드 보안 개요
권혁찬
정보와 통신 : 한국통신학회지, v.32, no.10, pp.71-76 |
|
|
|
Conference
|
2015 |
Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device
Hyeokchan Kwon
International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.54-61 |
0 |
|
|
Journal
|
2015 |
차세대 IoT 네트워크 보안 현황
권혁찬
정보처리학회지, v.22, no.2, pp.39-46 |
|
|
|
Conference
|
2015 |
A Content Access Control Mechanism Through Indoor Location Estimation Based on WLAN
권혁찬
한국통신학회 종합 학술 발표회 (동계) 2015, pp.1187-1188 |
|
|
|
Conference
|
2014 |
Analysis of EVM and RSS for detecting Rogue AP in WLAN
안개일
한국정보과학회 학술 발표회 (동계) 2014, pp.724-726 |
|
|
|
Conference
|
2014 |
Detecting Cloned Devices in Wireless Network using RSSI and RF Features
Hyeokchan Kwon
International Conference on Internet (ICONI) 2014, pp.1-4 |
|
|
|
Conference
|
2014 |
Location-Based Rogue Device Detection Mechanism
권혁찬
한국정보보호학회 충청 지부 학술 대회 2014, pp.1-3 |
|
|
|
Conference
|
2014 |
Mobile Device Management Scheme using Wireless Intrusion Information
권혁찬
한국정보보호학회 학술 대회 (하계) 2014, pp.1-4 |
|
|
|
Conference
|
2014 |
EVM Analysis for MAC Identification of Wireless Device in WLAN Environment
안개일
통신 정보 합동 학술 대회 (JCCI) 2014, pp.1-2 |
|
|
|
Journal
|
2013 |
Improving Mobile Device Classification Using Security Events for Preventing Wireless Intrusion
Hyeokchan Kwon
International Journal of Security and Its Applications, v.7, no.6, pp.181-190 |
1 |
|
|
Conference
|
2013 |
A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion
Hyeokchan Kwon
International Conference on Information Science and Industrial Applications (ISI) 2013, pp.317-321 |
|
|
|
Journal
|
2013 |
Technologies for Next Generation Wireless LAN Security
김신효
전자통신동향분석, v.28, no.1, pp.100-109 |
|
|
|
Conference
|
2012 |
Efficient Mobile Device Management Scheme Using Security Events from Wireless Intrusion Prevention System
Hyeokchan Kwon
International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.815-822 |
3 |
|
|
Journal
|
2012 |
아동보호를 위한 동영상 콘텐츠 정보보호 경량기법
나재훈
정보보호학회지, v.22, no.3, pp.41-47 |
|
|
|
Journal
|
2012 |
스마트 미디어 시대의 콘텐츠 보호 기술 동향
이승민
주간기술동향, v.1534, pp.11-21 |
|
|
|
Conference
|
2011 |
Multi-level Video Protection Scheme with Format Compliance for H.264/SVC
Hyeok Chan Kwon
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS) 2011, pp.1-4 |
|
|
|
Conference
|
2011 |
Privacy-Preserving PKI Design Based on Group Signature
Sokjoon Lee
Australian Information Security Management Conference (AISM) 2011, pp.155-164 |
|
|
|
Conference
|
2011 |
Security Policy Model for Secure Transcodable Mechanism
문용혁
한국정보처리학회 학술 발표 (추계) 2011, pp.958-959 |
|
|
|
Conference
|
2011 |
Smart Media Service using Secure Virtual Machine
Yong-Hyuk Moon
International Conference on Information and Communication Technology Convergence (ICTC) 2011, pp.742-743 |
0 |
|
|
Conference
|
2011 |
Consideration of Anonymous Certificate based on Group Signature for User Privacy
이석준
한국통신학회 종합 학술 발표회 (하계) 2011, pp.671-672 |
|
|
|
Journal
|
2011 |
echanism using Hybrid-based Method for SVC Media Transmission
권혁찬
정보보안논문지, v.11, no.3, pp.47-54 |
|
|
|
Conference
|
2011 |
A Platform-Independent Smart Content Sharing Model
문용혁
한국정보처리학회 학술 발표 (춘계) 2011, pp.224-225 |
|
|
|
Conference
|
2011 |
Analysis on Size-Interval Based Dispatching System for Multi-Class Job Model
문용혁
한국정보처리학회 학술 발표 (춘계) 2011, pp.163-164 |
|
|
|
Conference
|
2009 |
Protecting IPTV Service Network against Malicious Rendezvous Point
Hyeok Chan Kwon
Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 |
1 |
|