ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Jeon Yong-Sung Principal Researcher
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2025 Vehicular communication security standard trend in ITU-T SG17   이상우   정보보호학회지, v.35, no.4, pp.29-34
Conference
2025 Development of a covert channel using monitor brightness changes   전용성   대한전자공학회 학술 대회 (하계) 2025, pp.1-3
Journal
2025 State of the art of autonomous vehicle communication security standardization   이상우   정보와 통신: 한국통신학회지, v.42, no.3, pp.24-30
Conference
2024 Development of wireless covert channel system using magnetic fields   전용성   한국통신학회 종합 학술 발표회 (추계) 2024, pp.799-800
Journal
2024 Trend of vehicular communication standardization in ITU-T SG17   이상우   정보보호학회지, v.34, no.4, pp.29-33
Conference
2024 Design of covert channel using changes in light brightness   전용성   대한전자공학회 학술 대회 (하계) 2024, pp.2526-2529
Journal
2023 Standardization trend for vehicular communication security in ITU-T SG17   이상우   정보보호학회지, v.33, no.4, pp.83-87
Conference
2023 Implementation of covert channel based on adjacent modulation using WiFi beacon interval   전용성   대한전자공학회 학술 대회 (하계) 2023, pp.2119-2121
Journal
2023 Practical covert wireless unidirectional communication in IEEE 802.11 environment   Hayoung Seong   IEEE Internet of Things Journal, v.10, no.2, pp.1499-1516 16
Journal
2022 Trend on vehicular communication security standardization in ITU-T SG17   이상우   정보보호학회지, v.32, no.4, pp.93-97
Conference
2022 Design of covert channel using WiFi beacon interval   전용성   대한전자공학회 학술 대회 (하계) 2022, pp.2069-2071
Journal
2021 Standardization Trend for Vehicular Communication Security in ITU-T SG17   이상우   정보보호학회지, v.31, no.4, pp.17-21
Conference
2021 Consideration for the Construction of Practical Wireless Covert Timing Channels   Hayoung Seong   World Conference on Information Security Applications (WISA) 2021, pp.66-70
Conference
2021 Flash Memory Storage Management Method for Data Protection in Embedded Systems   전용성   대한전자공학회 학술 대회 (하계) 2021, pp.1585-1588
Conference
2020 Implementation of execution code integrity verification function for embedded device using hardware security module   전용성   대한전자공학회 학술 대회 (하계) 2020, pp.1765-1768
Conference
2019 Implementation of a LoRaWAN Protocol Processing Module on an Embedded Device using Secure Element   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2019, pp.1-3 5
Conference
2018 Design of a LPWAN Communication Device based on Hardware Security Module   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018, pp.1-3
Conference
2018 Design of an LPWAN Communication Module Based on Secure Element for Smart Parking Application   YongSung Jeon   International Conference on Consumer Electronics (ICCE) 2018, pp.1-2 15
Conference
2017 Security Considerations Based on Classification of IoT Device Capabilities   Seungyong Yoon   International Conferences on Advanced Service Computing (SERVICE COMPUTATION) 2017, pp.13-15
Conference
2016 Common Security Requirements for Device Identification System in Internet of Things   Daewon Kim   International Conference on Security Technology (SecTech) 2016, pp.306-309
Conference
2016 On the Feasibility of Remote Attestation for IoT Devices   Yong-Hyuk Moon   International Conference on Evolving Internet (INTERNET) 2016, pp.12-13
Conference
2016 Analyzing Security Threats of Android-based Mobile Malware   Seungyong Yoon   International Conference on Security Technology (SecTech) 2016, pp.310-315
Conference
2016 Cooperative Remote Attestation for IoT Swarms   Yong Hyuk Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1233-1235 2
Conference
2016 On-demand Security Configuration for IoT Devices   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1082-1084 20
Conference
2016 Consideration of Security Threats for Identification System in Internet of Things   Daewon Kim   International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68
Conference
2016 Secure Mobile Device Management Based on Domain Separation   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.918-920 5
Journal
2016 Implementation of Domain Separation-based Security Platform for Smart Device   Jeong Nyeo Kim   International Journal of Applied Engineering Research, v.11, no.10, pp.7017-7019 0
Conference
2016 Analysis of Smart Meter Hacking and Countermeasures   이윤경   한국정보보호학회 학술 대회 (하계) 2016, pp.1-4
Conference
2016 A Study on the Security Features of Operating System for Lightweight IoT Devices   임재덕   한국통신학회 종합 학술 발표회 (하계) 2016, pp.1384-1385
Journal
2016 Security Core Technology Implementation for Hardware-based Smart Devices   JeongNyeo Kim   International Journal of Applied Engineering Research, v.11, no.8, pp.5927-5930 0
Conference
2015 A Functional Relationship Based Attestation Scheme for Detecting Compromised Nodes in Large IoT Networks   Yong-Hyuk Moon   International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2015 (LNEE 373), pp.713-721 6
Conference
2015 A Study on the Hardware-based Security Solutions for Smart Devices   Hongil Ju   International Conference on Computational Science and Computational Intelligence (CSCI) 2015, pp.51-51
Conference
2015 Supporting a Variety of Secure Services Based on MTM   Seungyong Yoon   International Conference on Systems and Networks Communications (ICSNC) 2015, pp.18-20
Conference
2015 Smart Meter and Smart Meter Security   Yun-kyung Lee   International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3
Journal
2015 Implementation of a Hardware Security Chip for Mobile Devices   Hongil Ju   IEEE Transactions on Consumer Electronics, v.61, no.4, pp.500-506 14
Conference
2015 Dynamic Permission Re-Enforcement Technique for Protecting Application from Others with Over-Privileged Permission at Run Time   Boheung Chung   International Conference on Security Technology (SecTech) 2015, pp.13-16 1
Conference
2015 Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3
Conference
2015 Network Resilience Estimation to Cascading Failures   Yong-Hyuk Moon   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.965-966
Conference
2015 Security Considerations for Secure and Trustworthy Smart Home System in the IoT Environment   Jin-Hee Han   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1119-1121
Conference
2015 Trusted Military Services Based on the Secure Domain of the Mobile Security Solution   GeonLyang Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1128-1131
Conference
2015 A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179
Conference
2015 Mobile Security Technology for Smart Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176
Conference
2015 Technology Trends of Access Control in IoT and Requirements Analysis   Yun-kyung Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1034-1036
Conference
2015 A Study on the Remote Authentication Method between IoT Devices using a Trusted Security Module   한진희   한국정보처리학회 학술 발표 대회 (추계) 2015, pp.587-590
Conference
2015 The Secure Urgent Situation Propagation System Using the Mobile Security Solution   GeonLyang Kim   International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM) 2015, pp.109-114 2
Journal
2015 A Multi-Resolution Port Scan Detection Technique for High-Speed Networks   Hwashin Moon   Journal of Information Science and Engineering, v.31, no.5, pp.1613-1632 2
Journal
2015 Implementation of a MTM-based secure OTP Generator for IoT Devices   김영세   대한임베디드공학회논문지, v.10, no.4, pp.199-206
Conference
2015 A Methodology for Live Forensic Acquisition in Secure Domain Based on Domain Separation Technology   Kyung-Soo Lim   International Conference on Communication and Computer Engineering (ICOCOE) 2015 (LNEE 362), v.362, pp.1113-1123 3
Conference
2015 Improving MTM-Based Session & Key Management   Seungyong Yoon   International Conference on Green and Human Information Technology (ICGHIT) 2015, pp.333-334
Conference
2014 The Issue of Data Transfer for the Embedded SE on Mobile Devices   HongIl Ju   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.317-322 0