Department of Computer Science and Engineering

Filter
Conference contribution

Search results

  • 2008

    Code graph for malware detection

    Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • Distinguishing between FE and DDoS using randomness check

    Park, H., Li, P., Gao, D., Lee, H. & Deng, R. H., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • HoneyID: Unveiling hidden spywares by generating bogus events

    Han, J., Kwon, J. & Lee, H., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 669-673 5 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • 2007

    Activity-based access control model to hospital information

    Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

    Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A location-aware key predistribution scheme for distributed wireless sensor networks

    Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A privacy preserving access control scheme using anonymous identification for ubiquitous environments

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A trust-based approach to control privacy exposure in Ubiquitous Computing environments

    Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • BASE: An incrementally deployable mechanism for viable IP spoofing prevention

    Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Bayesian memory-based reputation system

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, 1385300. (MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Enforcing access control using risk assessment

    Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    50 Citations (Scopus)
  • HICCUP: Hierarchical clustering based value imputation using heterogeneous gene expression microarray datasets

    Zhao, Q., Mitra, P., Lee, D. & Kang, J., 2007, Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE. p. 71-78 8 p. 4375547. (Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Transmission time-based mechanism to detect wormhole attacks

    Van Phuong, T., Canh, N. T., Lee, Y. K., Lee, S. & Lee, H., 2007, Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007. p. 172-178 7 p. 4414457. (Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Citations (Scopus)
  • TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks

    Van Tran, P., Hung, L. X., Lee, Y. K., Lee, S. & Lee, H., 2007, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. p. 593-598 6 p. 4199210. (2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    47 Citations (Scopus)
  • Using reputation system in ubiquitous healthcare

    Weiwei, Y., Donghai, G., Sungyoung, L. & Heejo, L., 2007, HEALTHCOM 2007: Ubiquitous Health in Aging Societies - 2007 9th International Conference on e-Health Networking, Application and Services. p. 182-186 5 p. 4265820. (HEALTHCOM 2007: Ubiquitous Health in Aging Societies - 2007 9th International Conference on e-Health Networking, Application and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • 2006

    A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

    Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Improving grouped-entity resolution using Quasi-Cliques

    On, B. W., Elmacioglu, E., Lee, D., Kangt, J. & Pei, J., 2006, Proceedings - Sixth International Conference on Data Mining, ICDM 2006. Institute of Electrical and Electronics Engineers Inc., p. 1008-1015 8 p. 4053144. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Citations (Scopus)