ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Choi Byeong Cheol
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2023 A Study on FHSS based Drone RF Vulnerability   강재구   정보처리학회지, v.30, no.4, pp.25-31
Conference
2022 Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure   Yangseo Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2179-2181 2
Journal
2021 Trends of Hardware-based Trojan Detection Technologies   최양서   전자통신동향분석, v.36, no.6, pp.78-87
Conference
2020 Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 1
Journal
2020 Trends in Supply-Chain Security Technologies   김대원   전자통신동향분석, v.35, no.4, pp.149-157
Journal
2016 Secure Firmware Validation and Update for Consumer Devices in Home Networking   Byung-Chul Choi   IEEE Transactions on Consumer Electronics, v.62, no.1, pp.39-44 50
Conference
2013 Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform   Jae-Deok Lim   International Conference on Computer Science and its Applications (CSA) 2013 (LNEE 279), v.279, pp.161-166 1
Conference
2013 Flight-Plan States Modeling for Air Traffic Management   Byengcheol Choi   International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.1-4
Conference
2013 A Network Theoretic Analysis of Flight Plan States Management System   최병철   통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2
Journal
2012 Implementation of Automatic X-rated Video Classification and Management System based on Multimodal Features   JaeDeok Lim   International Journal of Advancements in Computing Technology, v.4, no.23, pp.178-186 1
Conference
2012 Adult Movie Classification System Based on Multimodal Approach with Visual and Auditory Features   laeDeok Lim   International Conference on Information Science and Digital Content Technology (ICIDT) 2012, pp.745-748
Journal
2011 Automatic Classification of X-rated Videos using Obscene Sound Analysis based on a Repeated Curve-like Spectrum Feature   JaeDeok Lim   International Journal of Multimedia & Its Applications, v.3, no.4, pp.1-17
Conference
2011 Improvement of Processing Performance of Audio Feature Extraction Algorithm for Detecting Objectionable Sounds by Controlling Frame Size   임재덕   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3
Conference
2011 Design and Performance Evaluation of the Statistical Combining of Decision Models using Novel Video-based Features for Malicious Video Detection   최병철   통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-5
Conference
2011 Classification and Detection of Objectionable Sounds Using Repeated Curve-like Spectrum Feature   Jae Deok Lim   International Conference on Information Science and Applications (ICISA) 2011, pp.1-5 6
Conference
2011 모션 에너지, 컬러 에너지, 그리고 컬러 히스토그램의 시간적 특성을 이용한 새로운 유해 비디오 분류 방법 설계 및 성능 분석   최병철   영상 처리 및 이해에 관한 워크샵 (IPIU) 2011, pp.1-3
Conference
2011 Human Body Parts Candidate Segmentation using Laws Texture Energy Measures with Skin Color   Byeongcheol Choi   International Conference on Advanced Communication Technology (ICACT) 2011, pp.556-560
Conference
2010 Design and Performance Evaluation of Temporal Motion and Color Energy Features for Objectionable Video Classification   Byeong Cheol Choi   International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA) 2010, pp.37-41
Conference
2010 Classifying of Objectionable Contents with Various Audio Signal Features   Jae Deok Lim   International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 2
Conference
2010 Classification Performance of Pornographic Contents by analyzing the Correlation of Audio Signal   임재덕   대한전자공학회 종합 학술 대회 (하계) 2010, pp.1422-1424
Conference
2010 Classification Performance of Audio Feature-based Pornographic Contents According to Various Audio Frame Sizes   임재덕   대한전자공학회 종합 학술 대회 (하계) 2010, pp.1446-1448
Conference
2009 A Study of Classifying the Objectionable Content by using the MFCCsbased Audio Feature Set   Jae Deok Lim   International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-2
Journal
2009 The Technology of the Audio Feature Extraction for Classifying Contents   임재덕   전자통신동향분석, v.24, no.6, pp.121-132
Conference
2009 Adult Image Detection using Bayesian Decision Rule weighted by SVM Probability   Byeong Cheol Choi   International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2009, pp.659-662 23
Conference
2009 Adult Image Detection with Close-Up Face Classification   Byeong Cheol Choi   International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 4
Conference
2008 Retrieval of Illegal and Objectionable Multimedia   Byeong Cheol Cho   International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.645-647 3
Conference
2008 A Study of Providing the Integrity on Cluster System   Jae Deok Lim   International Conference on Advanced Communication Technology (ICACT) 2008, pp.1925-1928 2
Conference
2007 Anonymous PKI Framework for Privacy-guaranteed e-Services   Byeong Cheol Choi   International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 1
Journal
2007 A Survey of Intelligent Vehicle Security   최병철   전자통신동향분석, v.22, no.1, pp.114-118
Journal
2006 DoI(Denial of Information) 공격 동향과 대응 프레임 워크 분석   김국한   정보보호학회지, v.16, no.1, pp.21-30
Conference
2006 On the Study of Service Security Model for Privacy using Global User Management Framework   Byeong Cheol Choi   International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 2
Conference
2005 On the Study of Mitigating Pro-Hacker   최병철   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.381-384
Conference
2005 The Study about Requirement for Information Security of the Next Generation Network   김국한   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.360-363
Journal
2005 광대역 통신망 정보 보호 기술 개발 현황   유종호  정보보호학회지, v.15, no.5, pp.90-99
Conference
2005 QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF)   Byeong-Cheol Choi   International Conference on Control, Automation and Systems (ICCAS) 2005, pp.1586-1589
Conference
2005 QoS Guaranteed Secure Network Service Realization using Global User Management Framework(GUMF)   최병철   통신 정보 합동 학술 대회 (JCCI) 2005, pp.90-90
Journal
2005 Information Security Strategy for Secure u-Korea - “Security Belt”   최병철   전자통신동향분석, v.20, no.2, pp.93-102
Conference
2005 A Statistical Approach for Optimal Watermark Coefficients Extraction in HVS-based Blind Watermarking System   Byeong C. Choi   International Conference on Advanced Communication Technology (ICACT) 2005, pp.1085-1088 2
Conference
2004 Two-step Rule Estimation (TRE) - Intrusion Detection Method against Eluding NIDS   Byeong-Cheol Choi   International Conference on Advanced Communication Technology (ICACT) 2004, pp.504-507
Conference
2003 Stepping Stones Attack Simulator for TCP Connection Traceback Test   Byeong Cheol Choi   International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2112-2115
Conference
2003 Construction of S-ESM with Open Source   최양서   통신 정보 합동 학술 대회 (JCCI) 2003, pp.182-182
Conference
2003 Stepping Stones Attack Simulator (SSAS) Development for TCP Connection Traceback Test   최병철   통신 정보 합동 학술 대회 (JCCI) 2003, pp.215-215
Conference
2002 Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images   Yong C. Kim  International Workshop on Digital Watermarking (IWDW) 2002 (LNCS 2613), v.2613, pp.235-248 5
Conference
2002 Adaptive Rule Estimation (ARE) Algorithm against Eluding NIDS   최병철   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.975-978
Conference
2002 인터넷 패킷 워터마크 검출 시스템 구현   최병철   한국정보과학회 학술 발표 (가을) 2002, pp.493-495
Journal
2002 Intranet Security Evaluation Using Hacking Techniques   서동일   정보처리학회논문지 C, v.9C, no.3, pp.337-342
Conference
2002 Design for Network based Real Time Traceback System   최양서   통신 정보 합동 학술 대회 (JCCI) 2002, pp.50-50
Conference
2001 Construction of Intrusion Inspection System Using the Open Sources   최병철   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.973-976
Journal
2001 A Full-Capacity DCT-based Blind Watermarking   최병철   한국통신학회지, v.26, no.5, pp.669-676