Type | Year | Title | Cited | Download |
---|---|---|---|---|
Journal
|
2023 | An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks Cheolhee Park IEEE Internet of Things Journal, v.10, no.3, pp.2330-2345 | 76 | |
Conference
|
2022 | Security Requirements and Countermeasures in a Cloud-native Environment Youngsoo Kim International Symposium on Mobile Internet Security (MobiSec) 2022, pp.1-10 | ||
Conference
|
2022 | AI-based Network Security Enhancement for 5G Industrial Internet of Things Environments Jonghoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.971-975 | 3 | |
Journal
|
2022 | Review of Cyber Attack and Response System for Smart Factory 장종수 주간기술동향, v.2029, pp.17-30 | ||
Journal
|
2021 | Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack Cheolhee Park IEEE Access, v.9, pp.167412-167425 | 5 | |
Journal
|
2021 | Analysis of Current 5G Open-Source Projects 김민재 전자통신동향분석, v.36, no.2, pp.83-92 | ||
Conference
|
2021 | Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset Gyeoul Lee International Conference on Advanced Communications Technology (ICACT) 2021, pp.254-258 | 0 | |
Journal
|
2020 | 5G Edge Security Technology Trend 박종근 정보보호학회지, v.30, no.6, pp.7-16 | ||
Conference
|
2020 | Security Threats in 5G Edge Computing Environments Youngsoo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.905-907 | 13 | |
Conference
|
2020 | Long-Term Evolution Vulnerability Focusing on System Information Block Messages Minjae Kim International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.837-842 | 0 | |
Journal
|
2020 | Security Threat and Response Technology for Multi-access Edge Computing in 5G Environments 김영수 정보과학회지, v.38, no.9, pp.16-24 | ||
Conference
|
2019 | Deep Learning based PowerShell Analysis with the Abstract Syntax Tree Jihyeon Song USENIX Security Symposium 2019, pp.1-1 | ||
Conference
|
2019 | Real-time Multi-process Tracing Decoder Architecture Youngsoo Kim Workshop on Systems and Network Telemetry and Analytics (SNTA) 2019, pp.49-52 | 0 | |
Journal
|
2019 | Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization Hyunjoo Kim Cluster Computing, v.22, no.Supp.1, pp.921-929 | 47 | |
Journal
|
2019 | Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing Hyunjoo Kim Cluster Computing, v.22, no.Supp.1, pp.2341-2350 | 36 | |
Conference
|
2018 | Similarity Hash Index Sunoh Choi International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1298-1300 | 0 | |
Conference
|
2018 | Intelligent Security Event Threat Case Management System on Dynamically Reconfigurable Cloud Security Infrastructures 김영수 한국통신학회 종합 학술 발표회 (하계) 2018, pp.907-908 | ||
Conference
|
2018 | Intelligent Security Event Threat Ticket Management System on Secure Cloud Security Infrastructures being able to Dynamic Reconfiguration Youngsoo Kim International Conference on Multimedia and Ubiquitous Engineering (MUE) 2018 (LNEE 518), pp.1-6 | 0 | |
Conference
|
2017 | Toward the SIEM Architecture for Cloud-based Security Services Jong-Hoon Lee Conference on Communications and Network Security (CNS) 2017, pp.1-2 | 22 | |
Conference
|
2017 | Building a Big Data Platform for Large-scale Security Data Analysis Jong-Hoon Lee International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.977-981 | 5 | |
Conference
|
2017 | Malware Detection using Malware Image and Deep Learning Sunoh Choi International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1194-1196 | 28 | |
Journal
|
2017 | Malware Detection using Deep Learning 최선오 정보보호학회지, v.27, no.3, pp.5-11 | ||
Conference
|
2017 | Dynamic Information Extraction and Integrity Verification Scheme for Cloud Security Hyunjoo Kim iCatse International Symposium on Software Networking (ICSN) 2017 (LNEE 425), pp.424-429 | 3 | |
Conference
|
2016 | HTTP Get Flooding Detection Technique based on Netflow Information Youngsoo Kim International Conference on Evolving Internet (INTERNET) 2016, pp.26-29 | ||
Conference
|
2016 | A Platform of Processing and Visualizing Multi-Source Data for Analyzing Symptoms of Cyber Attacks Youngsoo Kim International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.318-322 | ||
Conference
|
2015 | Testing Data Set for Analyzing Behaviors of Malicious Codes Youngsoo Kim International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2015, pp.4-9 | ||
Conference
|
2014 | Involvers’ Behavior-based Modeling in Cyber Targeted Attack Youngsoo Kim International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2014, pp.132-137 | ||
Conference
|
2014 | The Phased Classification of Attacking Methods used for Advanced Persistent Threat Youngsoo Kim International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014, pp.1-7 | ||
Conference
|
2013 | Cooperative Security Monitoring System Jong-Hyun Kim Workshop on Visualization for Cyber Security (VizSec) 2013, pp.1-2 | ||
Conference
|
2013 | Recent Cyber Attacks and Security Intelligence 김영수 한국 컴퓨터 종합 학술 대회 2013, pp.718-719 | ||
Journal
|
2013 | Cyber Attacks and Security Intelligence Youngsoo Kim Research Notes in Information Science, v.14, pp.106-108 | 0 | |
Journal
|
2012 | A Survey of Forensic Techniques Applicable to a New Paradigm 김영수 한국포렌식학회논문지, pp.55-67 | ||
Conference
|
2012 | An Advanced Data Loss Prevention System Being Able to Respond Data-Leaking Incidents Using e-Discovery Primitives Youngsoo Kim International Conference on Security and Management (SAM) 2012, pp.1-5 | ||
Conference
|
2012 | Data Loss Prevention System having a function of Responding Data-Leaking Incidents 김영수 대한전자공학회 종합 학술 대회 (하계) 2012, pp.1872-1874 | ||
Conference
|
2011 | Component Technologies for E-Discovery & Prototyping of Suit-Coping System Youngsoo Kim Australian Digital Forensics Conference 2011, pp.76-83 | ||
Journal
|
2011 | E-Discovery 솔루션 동향 김영수 주간기술동향, v.1514, pp.13-25 | ||
Journal
|
2011 | E-Discovery 프로젝트: EDRM과 Sedona Conference 김영수 주간기술동향, v.1509, pp.14-27 | ||
Conference
|
2011 | Core Technologies for Advancing Curling Performances of ESI Concerning E-Discovery 김영수 한국통신학회 종합 학술 발표회 (하계) 2011, pp.650-651 | ||
Conference
|
2011 | Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits Young Soo Kim International Conference on Computers, Networks, Systems, and Industrial Engineering (CNSI) 2011 (SCI 365), v.365, pp.201-208 | 13 | |
Journal
|
2010 | FRCP와 e-Discovery 김영수 주간기술동향, v.1467, pp.1-14 | ||
Journal
|
2010 | ESI 관점에서의 e-Discovery 김영수 주간기술동향, v.1463, pp.14-28 | ||
Conference
|
2010 | Management, Identification and Preservation of ESI in E-Discovery 김영수 디지털 포렌식 기술 워크샵 2010, pp.85-93 | ||
Conference
|
2010 | Agent-based Information Management and Control System for Enterprises considering Digital Forensic Analysis 김영수 한국통신학회 종합 학술 발표회 (하계) 2010, pp.1153-1154 | ||
Journal
|
2009 | Context-Based Classification for Harmful Web Documents and Comparison of Feature Selecting Algorithms Young Soo Kim 한국멀티미디어학회지, v.12, no.6, pp.1-9 | ||
Conference
|
2009 | Method of Forensic Evidence Analysis for Mobile Devices as Tag Readers on Mobile RFID Environment 김영수 한국통신학회 종합 학술 대회 (하계) 2009, pp.1665-1667 | ||
Journal
|
2009 | Adult Certification System on Mobile RFID Service Environments 김영수 한국콘텐츠학회논문지, v.9, no.1, pp.131-138 | ||
Conference
|
2008 | A Forensic Investigation for Suspects' Digital Evidences Using Image Categorization Young Soo Kim Advanced Software Engineering and Its Applications (ASEA) 2008, pp.241-244 | 1 | |
Conference
|
2008 | Windows Registry and Hiding Suspects' Secret in Registry Youn Soo Kim International Conference on Information Security and Assurance (ISA) 2008, pp.393-398 | 7 | |
Conference
|
2008 | Suspects' Data Hiding at Remaining Registry Values of Uninstalled Programs Young Soo Kim International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop (e-Forensics) 2008, pp.1-4 | 3 | |
Conference
|
2007 | Windows Registry and Hiding Suspect's Data in Registry 김영수 안티포렌식 대 응기술 워크샵 2007, pp.1-8 | ||
Conference
|
2007 | Privacy-Enhanced Adult Certification Method for Multimedia Contents on Mobile RFID Environments Young Soo Kim International Symposium on Consumer Electronics (ISCE) 2007, pp.1-4 | 12 | |
Journal
|
2007 | Trusted Computing & Trusted Computing Group Standardization Trends 김영수 전자통신동향분석, v.22, no.1, pp.83-96 | ||
Conference
|
2006 | 2-Way Text Classification for Harmful Web Documents Young Soo Kim International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3981), v.3981, pp.545-551 | 2 | |
Conference
|
2006 | An Efficient Text Filter for Adult Web Documents Young Soo Kim International Conference on Advanced Communication Technology (ICACT) 2006, pp.438-440 | 13 | |
Conference
|
2005 | Distinction Technology for Harmful Web Documents 김영수 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.345-349 | ||
Conference
|
2005 | Method of securely transferring programmable packet using digital signatures having access-controlled high-security verification key Young Soo Kim International Conference on Advanced Communication Technology (ICACT) 2005, pp.1208-1211 | ||
Conference
|
2003 | Access Policy Transfer Between Active Nodes Using Identities Youngsoo Kim International Conference on Control, Automation and Systems (ICCAS) 2003, pp.2178-2181 | ||
Journal
|
2003 | 보안프로세서의 동향 및 성능 비교 이상수 정보보호학회지, v.13, no.4, pp.15-24 | ||
Journal
|
2002 | A Secure Active Packet Transfer using Cryptographic Techniques 김영수 정보보호학회논문지, v.12, no.2, pp.135-145 | ||
Conference
|
2001 | A secure method for delivering active packets 김영수 한국통신학회 종합 학술 발표회 (추계) 2001, pp.606-609 |