Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2023 | A Study on FHSS based Drone RF Vulnerability 강재구 정보처리학회지, v.30, no.4, pp.25-31 | ||
Conference
|
2022 | Vulnerability Risk Score Recalculation for the Devices in Critical Infrastructure Yangseo Choi International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2179-2181 | 2 | |
Journal
|
2021 | Trends of Hardware-based Trojan Detection Technologies 최양서 전자통신동향분석, v.36, no.6, pp.78-87 | ||
Conference
|
2020 | Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS Daewon Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 | 1 | |
Journal
|
2020 | Trends in Supply-Chain Security Technologies 김대원 전자통신동향분석, v.35, no.4, pp.149-157 | ||
Journal
|
2016 | Secure Firmware Validation and Update for Consumer Devices in Home Networking Byung-Chul Choi IEEE Transactions on Consumer Electronics, v.62, no.1, pp.39-44 | 50 | |
Conference
|
2013 | Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android Platform Jae-Deok Lim International Conference on Computer Science and its Applications (CSA) 2013 (LNEE 279), v.279, pp.161-166 | 1 | |
Conference
|
2013 | Flight-Plan States Modeling for Air Traffic Management Byengcheol Choi International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.1-4 | ||
Conference
|
2013 | A Network Theoretic Analysis of Flight Plan States Management System 최병철 통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2 | ||
Journal
|
2012 | Implementation of Automatic X-rated Video Classification and Management System based on Multimodal Features JaeDeok Lim International Journal of Advancements in Computing Technology, v.4, no.23, pp.178-186 | 1 | |
Conference
|
2012 | Adult Movie Classification System Based on Multimodal Approach with Visual and Auditory Features laeDeok Lim International Conference on Information Science and Digital Content Technology (ICIDT) 2012, pp.745-748 | ||
Journal
|
2011 | Automatic Classification of X-rated Videos using Obscene Sound Analysis based on a Repeated Curve-like Spectrum Feature JaeDeok Lim International Journal of Multimedia & Its Applications, v.3, no.4, pp.1-17 | ||
Conference
|
2011 | Improvement of Processing Performance of Audio Feature Extraction Algorithm for Detecting Objectionable Sounds by Controlling Frame Size 임재덕 통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-3 | ||
Conference
|
2011 | Design and Performance Evaluation of the Statistical Combining of Decision Models using Novel Video-based Features for Malicious Video Detection 최병철 통신 정보 합동 학술 대회 (JCCI) 2011, pp.1-5 | ||
Conference
|
2011 | Classification and Detection of Objectionable Sounds Using Repeated Curve-like Spectrum Feature Jae Deok Lim International Conference on Information Science and Applications (ICISA) 2011, pp.1-5 | 6 | |
Conference
|
2011 | 모션 에너지, 컬러 에너지, 그리고 컬러 히스토그램의 시간적 특성을 이용한 새로운 유해 비디오 분류 방법 설계 및 성능 분석 최병철 영상 처리 및 이해에 관한 워크샵 (IPIU) 2011, pp.1-3 | ||
Conference
|
2011 | Human Body Parts Candidate Segmentation using Laws Texture Energy Measures with Skin Color Byeongcheol Choi International Conference on Advanced Communication Technology (ICACT) 2011, pp.556-560 | ||
Conference
|
2010 | Design and Performance Evaluation of Temporal Motion and Color Energy Features for Objectionable Video Classification Byeong Cheol Choi International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA) 2010, pp.37-41 | ||
Conference
|
2010 | Classifying of Objectionable Contents with Various Audio Signal Features Jae Deok Lim International Conference on Information Technology Convergence and Services (ITCS) 2010, pp.1-5 | 2 | |
Conference
|
2010 | Classification Performance of Pornographic Contents by analyzing the Correlation of Audio Signal 임재덕 대한전자공학회 종합 학술 대회 (하계) 2010, pp.1422-1424 | ||
Conference
|
2010 | Classification Performance of Audio Feature-based Pornographic Contents According to Various Audio Frame Sizes 임재덕 대한전자공학회 종합 학술 대회 (하계) 2010, pp.1446-1448 | ||
Conference
|
2009 | A Study of Classifying the Objectionable Content by using the MFCCsbased Audio Feature Set Jae Deok Lim International Conference on Computer and Communications Security (ICCCS) 2009, pp.1-2 | ||
Journal
|
2009 | The Technology of the Audio Feature Extraction for Classifying Contents 임재덕 전자통신동향분석, v.24, no.6, pp.121-132 | ||
Conference
|
2009 | Adult Image Detection using Bayesian Decision Rule weighted by SVM Probability Byeong Cheol Choi International Conference on Computer Sciences and Convergence Information Technology (ICCIT) 2009, pp.659-662 | 23 | |
Conference
|
2009 | Adult Image Detection with Close-Up Face Classification Byeong Cheol Choi International Conference on Consumer Electronics (ICCE) 2009, pp.1-2 | 4 | |
Conference
|
2008 | Retrieval of Illegal and Objectionable Multimedia Byeong Cheol Cho International Conference on Networked Computing and Advanced Information Management (NCM) 2008, pp.645-647 | 3 | |
Conference
|
2008 | A Study of Providing the Integrity on Cluster System Jae Deok Lim International Conference on Advanced Communication Technology (ICACT) 2008, pp.1925-1928 | 2 | |
Conference
|
2007 | Anonymous PKI Framework for Privacy-guaranteed e-Services Byeong Cheol Choi International Conference on Convergence Information Technology (ICCIT) 2007, pp.687-690 | 1 | |
Journal
|
2007 | A Survey of Intelligent Vehicle Security 최병철 전자통신동향분석, v.22, no.1, pp.114-118 | ||
Journal
|
2006 | DoI(Denial of Information) 공격 동향과 대응 프레임 워크 분석 김국한 정보보호학회지, v.16, no.1, pp.21-30 | ||
Conference
|
2006 | On the Study of Service Security Model for Privacy using Global User Management Framework Byeong Cheol Choi International Conference on Advanced Communication Technology (ICACT) 2006, pp.113-116 | 2 | |
Conference
|
2005 | On the Study of Mitigating Pro-Hacker 최병철 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.381-384 | ||
Conference
|
2005 | The Study about Requirement for Information Security of the Next Generation Network 김국한 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.360-363 | ||
Journal
|
2005 | 광대역 통신망 정보 보호 기술 개발 현황 유종호 정보보호학회지, v.15, no.5, pp.90-99 | ||
Conference
|
2005 | QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF) Byeong-Cheol Choi International Conference on Control, Automation and Systems (ICCAS) 2005, pp.1586-1589 | ||
Conference
|
2005 | QoS Guaranteed Secure Network Service Realization using Global User Management Framework(GUMF) 최병철 통신 정보 합동 학술 대회 (JCCI) 2005, pp.90-90 | ||
Journal
|
2005 | Information Security Strategy for Secure u-Korea - “Security Belt” 최병철 전자통신동향분석, v.20, no.2, pp.93-102 | ||
Conference
|
2005 | A Statistical Approach for Optimal Watermark Coefficients Extraction in HVS-based Blind Watermarking System Byeong C. Choi International Conference on Advanced Communication Technology (ICACT) 2005, pp.1085-1088 | 2 | |
Conference
|
2004 | Two-step Rule Estimation (TRE) - Intrusion Detection Method against Eluding NIDS Byeong-Cheol Choi International Conference on Advanced Communication Technology (ICACT) 2004, pp.504-507 | ||
Conference
|
2003 | Stepping Stones Attack Simulator for TCP Connection Traceback Test Byeong Cheol Choi International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2112-2115 | ||
Conference
|
2003 | Construction of S-ESM with Open Source 최양서 통신 정보 합동 학술 대회 (JCCI) 2003, pp.182-182 | ||
Conference
|
2003 | Stepping Stones Attack Simulator (SSAS) Development for TCP Connection Traceback Test 최병철 통신 정보 합동 학술 대회 (JCCI) 2003, pp.215-215 | ||
Conference
|
2002 | Two-Step Detection Algorithm in a HVS-Based Blind Watermarking of Still Images Yong C. Kim International Workshop on Digital Watermarking (IWDW) 2002 (LNCS 2613), v.2613, pp.235-248 | 5 | |
Conference
|
2002 | Adaptive Rule Estimation (ARE) Algorithm against Eluding NIDS 최병철 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.975-978 | ||
Conference
|
2002 | 인터넷 패킷 워터마크 검출 시스템 구현 최병철 한국정보과학회 학술 발표 (가을) 2002, pp.493-495 | ||
Journal
|
2002 | Intranet Security Evaluation Using Hacking Techniques 서동일 정보처리학회논문지 C, v.9C, no.3, pp.337-342 | ||
Conference
|
2002 | Design for Network based Real Time Traceback System 최양서 통신 정보 합동 학술 대회 (JCCI) 2002, pp.50-50 | ||
Conference
|
2001 | Construction of Intrusion Inspection System Using the Open Sources 최병철 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.973-976 | ||
Journal
|
2001 | A Full-Capacity DCT-based Blind Watermarking 최병철 한국통신학회지, v.26, no.5, pp.669-676 |