ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Youngsoo
Department
AI computing Planning Team
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2023 An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks   Cheolhee Park   IEEE Internet of Things Journal, v.10, no.3, pp.2330-2345 60
Conference
2022 Security Requirements and Countermeasures in a Cloud-native Environment   Youngsoo Kim   International Symposium on Mobile Internet Security (MobiSec) 2022, pp.1-10
Conference
2022 AI-based Network Security Enhancement for 5G Industrial IoT Environments   Jonghoon Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.971-975 2
Journal
2022 Review of Cyber Attack and Response System for Smart Factory   장종수   주간기술동향, v.2029, pp.17-30
Journal
2021 Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack   Cheolhee Park   IEEE Access, v.9, pp.167412-167425 4
Journal
2021 Analysis of Current 5G Open-Source Projects   김민재   전자통신동향분석, v.36, no.2, pp.83-92
Conference
2021 Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset   Gyeoul Lee   International Conference on Advanced Communications Technology (ICACT) 2021, pp.254-258 0
Journal
2020 5G Edge Security Technology Trend   박종근   정보보호학회지, v.30, no.6, pp.7-16
Conference
2020 Long-Term Evolution Vulnerability Focusing on System Information Block Messages   Minjae Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.837-842 0
Conference
2020 Security Threats in 5G Edge Computing Environments   Youngsoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.905-907 11
Journal
2020 Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments   김영수   정보과학회지, v.38, no.9, pp.16-24
Conference
2019 Deep Learning based PowerShell Analysis with the Abstract Syntax Tree   Jihyeon Song   USENIX Security Symposium 2019, pp.1-1
Conference
2019 Real-time Multi-process Tracing Decoder Architecture   Youngsoo Kim   Workshop on Systems and Network Telemetry and Analytics (SNTA) 2019, pp.49-52 0
Journal
2019 Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization   Hyunjoo Kim   Cluster Computing, v.22, no.Supp.1, pp.921-929 45
Journal
2019 Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing   Hyunjoo Kim   Cluster Computing, v.22, no.Supp.1, pp.2341-2350 35
Conference
2018 Similarity Hash Index   Sunoh Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1298-1300 0
Conference
2018 Intelligent Security Event Threat Case Management System on Dynamically Reconfigurable Cloud Security Infrastructures   김영수   한국통신학회 종합 학술 발표회 (하계) 2018, pp.907-908
Conference
2018 Intelligent Security Event Threat Ticket Management System on Secure Cloud Security Infrastructures being able to Dynamic Reconfiguration   Youngsoo Kim   International Conference on Multimedia and Ubiquitous Engineering (MUE) 2018 (LNEE 518), pp.1-6 0
Conference
2017 Malware Detection using Malware Image and Deep Learning   Sunoh Choi   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1194-1196 28
Conference
2017 Building a Big Data Platform for Large-scale Security Data Analysis   Jong-Hoon Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 5
Conference
2017 Toward the SIEM Architecture for Cloud-based Security Services   Jong-Hoon Lee   Conference on Communications and Network Security (CNS) 2017, pp.1-2 21
Journal
2017 Malware Detection using Deep Learning   최선오   정보보호학회지, v.27, no.3, pp.5-11
Conference
2017 Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security   Hyunjoo Kim   iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 3
Conference
2016 HTTP Get Flooding Detection Technique based on Netflow Information   Youngsoo Kim   International Conference on Evolving Internet (INTERNET) 2016, pp.26-29
Conference
2016 A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks   Youngsoo Kim   International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322
Conference
2015 Testing Data Set for Analyzing Behaviors of Malicious Codes   Youngsoo Kim   International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2015, pp.4-9
Conference
2014 Involvers’ Behavior-based Modeling in Cyber Targeted Attack   Youngsoo Kim   International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2014, pp.132-137
Conference
2014 The Phased Classification of Attacking Methods used for Advanced Persistent Threat   Youngsoo Kim   International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014, pp.1-7
Conference
2013 Cooperative Security Monitoring System   Jong-Hyun Kim   Workshop on Visualization for Cyber Security (VizSec) 2013, pp.1-2
Journal
2013 Cyber Attacks and Security Intelligence   Youngsoo Kim   Research Notes in Information Science, v.14, pp.106-108 0
Conference
2013 Recent Cyber Attacks and Security Intelligence   김영수   한국 컴퓨터 종합 학술 대회 2013, pp.718-719
Journal
2012 A Survey of Forensic Techniques Applicable to a New Paradigm   김영수   한국포렌식학회논문지, pp.55-67
Conference
2012 An Advanced Data Loss Prevention System Being Able to Respond Data-Leaking Incidents Using e-Discovery Primitives   Youngsoo Kim   International Conference on Security and Management (SAM) 2012, pp.1-5
Conference
2012 Data Loss Prevention System having a function of Responding Data-Leaking Incidents   김영수   대한전자공학회 종합 학술 대회 (하계) 2012, pp.1872-1874
Conference
2011 Component Technologies for E-Discovery & Prototyping of Suit-Coping System   Youngsoo Kim   Australian Digital Forensics Conference 2011, pp.76-83
Journal
2011 E-Discovery 솔루션 동향   김영수   주간기술동향, pp.13-25
Journal
2011 E-Discovery 프로젝트 : EDRM과 Sedona Conference   김영수   주간기술동향, pp.14-27
Conference
2011 Core Technologies for Advancing Curling Performances of ESI Concerning E-Discovery   김영수   한국통신학회 종합 학술 발표회 (하계) 2011, pp.650-651
Conference
2011 Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits   Young Soo Kim   International Conference on Computers, Networks, Systems, and Industrial Engineering (CNSI) 2011 (SCI 365), v.365, pp.201-208 13
Journal
2010 FRCP와 e-Discovery   김영수   주간기술동향, pp.1-14
Journal
2010 ESI 관점에서의 e-Discovery   김영수   주간기술동향, pp.14-28
Conference
2010 Management, Identification and Preservation of ESI in E-Discovery   김영수   디지털 포렌식 기술 워크샵 2010, pp.85-93
Conference
2010 Agent-based Information Management and Control System for Enterprises considering Digital Forensic Analysis   김영수   한국통신학회 종합 학술 발표회 (하계) 2010, pp.1153-1154
Conference
2009 Method of Forensic Evidence Analysis for Mobile Devices as Tag Readers on Mobile RFID Environment   김영수   한국통신학회 종합 학술 대회 (하계) 2009, pp.1665-1667
Journal
2009 Context-Based Classification for Harmful Web Documents and Comparison of Feature Selecting Algorithms   Young Soo Kim   한국멀티미디어학회지, v.12, no.6, pp.1-9
Journal
2009 Adult Certification System on Mobile RFID Service Environments   김영수   한국콘텐츠학회논문지, v.9, no.1, pp.131-138
Conference
2008 A Forensic Investigation for Suspects' Digital Evidences Using Image Categorization   Young Soo Kim   Advanced Software Engineering and Its Applications (ASEA) 2008, pp.241-244 1
Conference
2008 Windows Registry and Hiding Suspects' Secret in Registry   Youn Soo Kim   International Conference on Information Security and Assurance (ISA) 2008, pp.393-398 7
Conference
2008 Suspects' Data Hiding at Remaining Registry Values of Uninstalled Programs   Young Soo Kim   International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics) 2008, pp.1-4 3
Conference
2007 Windows Registry and Hiding Suspect's Data in Registry   김영수   안티포렌식 대 응기술 워크샵 2007, pp.1-8
Conference
2007 Privacy-Enhanced Adult Certification Method for Multimedia Contents on Mobile RFID Environments   Young Soo Kim   International Symposium on Consumer Electronics (ISCE) 2007, pp.1-4 12
Journal
2007 Trusted Computing & Trusted Computing Group Standardization Trends   김영수   전자통신동향분석, v.22, no.1, pp.83-96
Conference
2006 2-Way Text Classification for Harmful Web Documents   Young Soo Kim   International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3981), v.3981, pp.545-551 2
Conference
2006 An Efficient Text Filter for Adult Web Documents   Young Soo Kim   International Conference on Advanced Communication Technology (ICACT) 2006, pp.438-440 13
Conference
2005 Distinction Technology for Harmful Web Documents   김영수   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.345-349
Conference
2005 Method of Securely Transferring Programmable Packet Using Digital Signatures Having AccessControlled High-Security Verification Key   Young Soo Kim   International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211
Conference
2003 Access Policy Transfer Between Active Nodes Using Identities   Youngsoo Kim   International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2178-2181
Journal
2003 보안 프로세서의 동향 및 성능 비교   이상수   정보보호학회지, v.13, no.4, pp.15-24
Journal
2002 A Secure Active Packet Transfer using Cryptographic Techniques   김영수   정보보호학회논문지, v.12, no.2, pp.135-145
Conference
2001 A secure method for delivering active packets   김영수   한국통신학회 종합 학술 발표회 (추계) 2001, pp.606-609