Journal
|
2023 |
A Study on FHSS based Drone RF Vulnerability
강재구
정보처리학회지, v.30 no.4, pp.25-31 |
|
|
Conference
|
2022 |
Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure
Yangseo Choi
International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2179-2181 |
2 |
원문
|
Journal
|
2021 |
Trends of Hardware-based Trojan Detection Technologies
최양서
전자통신동향분석, v.36 no.6, pp.78-87 |
|
원문
|
Conference
|
2020 |
Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS
Daewon Kim
International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 |
1 |
원문
|
Journal
|
2020 |
Trends in Supply-Chain Security Technologies
김대원
전자통신동향분석, v.35 no.4, pp.149-157 |
|
원문
|
Journal
|
2016 |
Secure Firmware Validation and Update for Consumer Devices in Home Networking
Byung-Chul Choi
IEEE Transactions on Consumer Electronics, v.62 no.1, pp.39-44 |
49 |
원문
|
Conference
|
2013 |
Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform
Jae-Deok Lim
International Conference on Computer Science and its Applications (CSA) 2013 (LNEE 279), v.279, pp.161-166 |
1 |
원문
|
Conference
|
2013 |
Flight-Plan States Modeling for Air Traffic Management
Byengcheol Choi
International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.1-4 |
|
|
Conference
|
2013 |
A Network Theoretic Analysis of Flight Plan States Management System
최병철
통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2 |
|
|
Journal
|
2012 |
Implementation of Automatic X-rated Video Classification and Management System based on Multimodal Features
JaeDeok Lim
International Journal of Advancements in Computing Technology, v.4 no.23, pp.178-186 |
1 |
원문
|
Conference
|
2012 |
Adult Movie Classification System Based on Multimodal Approach with Visual and Auditory Features
laeDeok Lim
International Conference on Information Science and Digital Content Technology (ICIDT) 2012, pp.745-748 |
|
|
Journal
|
2011 |
Automatic Classification of X-rated Videos using Obscene Sound Analysis based on a Repeated Curve-like Spectrum Feature
JaeDeok Lim
International Journal of Multimedia & Its Applications, v.3 no.4, pp.1-17 |
|
원문
|
Conference
|
2011 |
Improvement of Processing Performance of Audio Feature Extraction Algorithm for Detecting Objectionable Sounds by Controlling Frame Size
임재덕
통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 |
|
|
Conference
|
2011 |
Design and Performance Evaluation of the Statistical Combining of Decision Models using Novel Video-based Features for Malicious Video Detection
최병철
통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-5 |
|
|
Conference
|
2011 |
Classification and Detection of Objectionable Sounds Using Repeated Curve-like Spectrum Feature
Jae Deok Lim
International Conference on Information Science and Applications (ICISA) 2011, pp.1-5 |
6 |
원문
|
Conference
|
2011 |
모션 에너지, 컬러 에너지, 그리고 컬러 히스토그램의 시간적 특성을 이용한 새로운 유해 비디오 분류 방법 설계 및 성능 분석
최병철
영상 처리 및 이해에 관한 워크샵 (IPIU) 2011, pp.1-3 |
|
|
Conference
|
2011 |
Human Body Parts Candidate Segmentation using Laws Texture Energy Measures with Skin Color
Byeongcheol Choi
International Conference on Advanced Communication Technology (ICACT) 2011, pp.556-560 |
|
|
Conference
|
2010 |
Design and Performance Evaluation of Temporal Motion and Color Energy Features for Objectionable Video Classification
Byeong Cheol Choi
International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA) 2010, pp.37-41 |
|
|
Conference
|
2010 |
Classifying of Objectionable Contents with Various Audio Signal Features
Jae Deok Lim
International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 |
2 |
원문
|
Conference
|
2010 |
Classification Performance of Audio Feature-based Pornographic Contents According to Various Audio Frame Sizes
임재덕
대한전자공학회 종합 학술 대회 (하계) 2010, pp.1446-1448 |
|
|
Conference
|
2010 |
Classification Performance of Pornographic Contents by analyzing the Correlation of Audio Signal
임재덕
대한전자공학회 종합 학술 대회 (하계) 2010, pp.1422-1424 |
|
|
Conference
|
2009 |
A Study of Classifying the Objectionable Content by using the MFCCsbased Audio Feature Set
Jae Deok Lim
International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-2 |
|
|
Journal
|
2009 |
The Technology of the Audio Feature Extraction for Classifying Contents
임재덕
전자통신동향분석, v.24 no.6, pp.121-132 |
|
원문
|
Conference
|
2009 |
Adult Image Detection using Bayesian Decision Rule weighted by SVM Probability
Byeong Cheol Choi
International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2009, pp.659-662 |
23 |
원문
|
Conference
|
2009 |
Adult Image Detection with Close-Up Face Classification
Byeong Cheol Choi
International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 |
4 |
원문
|
Conference
|
2008 |
Retrieval of Illegal and Objectionable Multimedia
Byeong Cheol Cho
International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.645-647 |
3 |
원문
|
Conference
|
2008 |
A Study of Providing the Integrity on Cluster System
Jae Deok Lim
International Conference on Advanced Communication Technology (ICACT) 2008, pp.1925-1928 |
2 |
원문
|
Conference
|
2007 |
Anonymous PKI Framework for Privacy-guaranteed e-Services
Byeong Cheol Choi
International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 |
1 |
원문
|
Journal
|
2007 |
A Survey of Intelligent Vehicle Security
최병철
전자통신동향분석, v.22 no.1, pp.114-118 |
|
원문
|
Conference
|
2006 |
On the Study of Service Security Model for Privacy using Global User Management Framework
Byeong Cheol Choi
International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 |
2 |
|
Journal
|
2006 |
DoI(Denial of Information) 공격 동향과 대응 프레임 워크 분석
김국한
정보보호학회지, v.16 no.1, pp.21-30 |
|
|
Conference
|
2005 |
The Study about Requirement for Information Security of the Next Generation Network
김국한
차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.360-363 |
|
|
Conference
|
2005 |
On the Study of Mitigating Pro-Hacker
최병철
차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.381-384 |
|
|
Journal
|
2005 |
광대역 통신망 정보 보호 기술 개발 현황
유종호
정보보호학회지, v.15 no.5, pp.90-99 |
|
|
Conference
|
2005 |
QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF)
Byeong-Cheol Choi
International Conference on Control, Automation and Systems (ICCAS) 2005, pp.1586-1589 |
|
|
Conference
|
2005 |
QoS Guaranteed Secure Network Service Realization using Global User Management Framework(GUMF)
최병철
통신 정보 합동 학술 대회 (JCCI) 2005, pp.90-90 |
|
|
Journal
|
2005 |
Information Security Strategy for Secure u-Korea - “Security Belt”
최병철
전자통신동향분석, v.20 no.2, pp.93-102 |
|
원문
|
Conference
|
2005 |
A Statistical Approach for Optimal Watermark Coefficients Extraction in HVS-based Blind Watermarking System
Byeong C. Choi
International Conference on Advanced Communication Technology (ICACT) 2005, pp.1085-1088 |
2 |
원문
|
Conference
|
2004 |
Two-step Rule Estimation (TRE) - Intrusion Detection Method against Eluding NIDS
Byeong-Cheol Choi
International Conference on Advanced Communication Technology (ICACT) 2004, pp.504-507 |
|
원문
|
Conference
|
2003 |
Stepping Stones Attack Simulator for TCP Connection Traceback Test
Byeong Cheol Choi
International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2112-2115 |
|
|
Conference
|
2003 |
Stepping Stones Attack Simulator (SSAS) Development for TCP Connection Traceback Test
최병철
통신 정보 합동 학술 대회 (JCCI) 2003, pp.215-215 |
|
|
Conference
|
2003 |
Construction of S-ESM with Open Source
최양서
통신 정보 합동 학술 대회 (JCCI) 2003, pp.182-182 |
|
|
Conference
|
2002 |
Adaptive Rule Estimation (ARE) Algorithm against Eluding NIDS
최병철
한국정보처리학회 학술 발표 대회 (추계) 2002, pp.975-978 |
|
|
Conference
|
2002 |
Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images
Yong C. Kim
International Workshop on Digital Watermarking (IWDW) 2002 (LNCS 2613), v.2613, pp.235-248 |
5 |
원문
|
Conference
|
2002 |
인터넷 패킷 워터마크 검출 시스템 구현
최병철
한국정보과학회 학술 발표 (가을) 2002, pp.493-495 |
|
|
Journal
|
2002 |
Intranet Security Evaluation Using Hacking Techniques
서동일
정보처리학회논문지 C, v.9C no.3, pp.337-342 |
|
|
Conference
|
2002 |
Design for Network based Real Time Traceback System
최양서
통신 정보 합동 학술 대회 (JCCI) 2002, pp.50-50 |
|
|
Conference
|
2001 |
Construction of Intrusion Inspection System Using the Open Sources
최병철
한국정보처리학회 학술 발표 대회 (추계) 2001, pp.973-976 |
|
|
Journal
|
2001 |
A Full-Capacity DCT-based Blind Watermarking
최병철
한국통신학회지, v.26 no.5, pp.669-676 |
|
|