Graduate School of Information Security

  • Korea, Republic of

Research Output 1995 2019

Filter
Conference contribution
2019

ADSaS: Comprehensive real-time anomaly detection system

Lee, S. & Kim, H. K., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 29-41 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anomaly Detection
Real-time
Anomaly
Time series
Moving Average Model

Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning

Baek, H., Joo, M., Park, W., You, Y. & Lee, K. H., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669424. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Learning systems
Mobile devices
Decision making
Android (operating system)

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Bayesian Approach
Computer systems
Attack
Monitoring

A Scheduler Considering Characteristics of VM for Mitigation of Unstable Performance

Bak, B., Kang, J., Choi, H., Lee, J., Yu, H. & Chung, K., 2019 Apr 29, Proceedings - 2018 9th International Conference on Parallel Architectures, Algorithms and Programming, PAAP 2018. IEEE Computer Society, p. 49-53 5 p. 8701858. (Proceedings - International Symposium on Parallel Architectures, Algorithms and Programming, PAAP; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network performance
Virtual reality
Program processors
Deterioration
Virtualization

Automated Reverse Engineering and Attack for CAN Using OBD-II

Kang, T. U., Song, H. M., Jeong, S. & Kim, H. K., 2019 Apr 12, 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8690781. (IEEE Vehicular Technology Conference; vol. 2018-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Reverse Engineering
Diagnostics
Attack
Controller

Detecting In-vehicle CAN Message Attacks Using Heuristics and RNNs

Tariq, S., Lee, S., Kim, H. K. & Woo, S. S., 2019 Jan 1, Information and Operational Technology Security Systems - 1st International Workshop, IOSec 2018, CIPSEC Project, Revised Selected Papers. Marín Tordera, E., Fournaris, A. P. & Lampropoulos, K. (eds.). Springer Verlag, p. 39-45 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11398 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recurrent neural networks
Recurrent Neural Networks
Attack
Heuristics
Controller

FAIR-Based cyber influence damage assessment for exploit in mobile device

Park, M., Han, J., Seo, J., Oh, H. & Lee, K. H., 2019 Jan 1, Mobile Internet Security - 2nd International Symposium, MobiSec 2017, Revised Selected Papers. Sharma, V., Chen, H-C., You, I. & Kotenko, I. (eds.). Springer Verlag, p. 51-64 14 p. (Communications in Computer and Information Science; vol. 971).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Damage Assessment
Factor analysis
Factor Analysis
Mobile devices
Mobile Devices

I would not plant apple trees if the world will be wiped: Analyzing hundreds of millions of behavioral records of players during an MMORPG beta test

Kang, A. R., Blackburn, J., Kwak, H. & Kim, H. K., 2019 Jan 1, 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, p. 435-444 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Logarithm design on encrypted data with bitwise operation

Yoo, J. S., Song, B. K. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 105-116 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logarithm
Cryptography
Homomorphic Encryption
Privacy Preserving
Taylor Expansion

VODKA: Virtualization obfuscation using dynamic key approach

Lee, J. Y., Suk, J. H. & Lee, D. H., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Virtualization
Software Security
Debugging
Instrumentation
2018
1 Citation (Scopus)

Andro-Simnet: Android Malware Family Classification using Social Network Analysis

Kim, H. M., Song, H. M., Seo, J. W. & Kim, H. K., 2018 Oct 29, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514216. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Malware
Social network analysis
Mobile devices
Computer systems
1 Citation (Scopus)

A privacy-preserving data sharing solution for mobile healthcare

Huang, C., Yan, K., Wei, S. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 260-265 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Health
mHealth
Biometrics
Access control
1 Citation (Scopus)

A Review of Cyber Security Controls from An ICS Perspective

You, Y., Lee, J., Oh, J. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472757

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Control systems
Security of data
Critical infrastructures

A study on the priority decision making of processes for IT governance based on the IT-related goals of COBIT 5

Lee, J., Lee, J. & Lee, K. H., 2018 Jan 1, Proceedings of the 31st International Business Information Management Association Conference, IBIMA 2018: Innovation Management and Education Excellence through Vision 2020. Soliman, K. S. (ed.). International Business Information Management Association, IBIMA, p. 5445-5455 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making
Industry
Planning
IT governance
Methodology

Breaking Text CAPTCHA by Repeated Information

Woo, J. H., Park, M. & Lee, K. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 127-136 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Joining
Web Portal
High Accuracy
Choose
Calculate

Complex Network of Damage Assessment Using GMM Based FAIR

Park, M., Joo, M., Seo, J., Kim, K., Park, M. & Lee, K. H., 2018 May 25, Proceedings - 2018 IEEE International Conference on Big Data and Smart Computing, BigComp 2018. Institute of Electrical and Electronics Engineers Inc., p. 627-630 4 p. 8367191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Complex networks
Factor analysis
Routers
Macros
Switches

Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident

Park, M., Park, M. & Lee, K. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 224-235 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Elections
Deception
Influence
Classify

DDoS Mitigation: Decentralized CDN Using Private Blockchain

Kim, K., You, Y., Park, M. & Lee, K. H., 2018 Aug 14, ICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2018-July. p. 693-696 4 p. 8436643

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Denial-of-service attack
3 Citations (Scopus)

Efficient anonymous attribute-based encryption with access policy hidden for cloud computing

Huang, C., Yan, K., Wei, S., Zhang, G. & Lee, D. H., 2018 May 15, Proceedings of 2017 International Conference on Progress in Informatics and Computing, PIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 266-270 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Cryptography
Access control
Security of data
Information technology

Forward secure searchable encryption using key-based blocks chain technique

Lv, S., Huang, Y., Li, B., Wei, Y., Liu, Z., Liu, J. K. & Lee, D. H., 2018 Jan 1, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 85-97 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11337 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Privacy
Range Query
Tree Structure
2 Citations (Scopus)

G-code conversion from 3D model data for 3D printers on Hadoop systems

Kim, S., Chung, K., Yu, H. & Yang, S. O., 2018 Mar 20, Proceedings of the 2017 4th International Conference on Computer Applications and Information Processing Technology, CAIPT 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3D printers
Printing
Hadoop
Software
6 Citations (Scopus)

GIDS: GAN based Intrusion Detection System for In-Vehicle Network

Seo, E., Song, H. M. & Kim, H. K., 2018 Oct 29, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514157. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Controllers
Intrusion detection system
Internet
Communication

Intrusion detection and mitigation system using blockchain analysis for bitcoin exchange

Kim, S., Kim, B. & Kim, H. J., 2018 Oct 29, Proceedings of 2018 International Conference on Cloud Computing and Internet of Things, CCIOT 2018. Association for Computing Machinery, p. 40-44 5 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection

Money Laundering in the Bitcoin Network: Perspective of Mixing Services

Seo, J., Park, M., Oh, H. & Lee, K. H., 2018 Nov 16, 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018. Institute of Electrical and Electronics Engineers Inc., p. 1403-1405 3 p. 8539548

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
18 Citations (Scopus)

OTIDS: A novel intrusion detection system for in-vehicle network by using remote frame

Lee, H., Jeong, S. H. & Kim, H. K., 2018 Sep 28, Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017. Institute of Electrical and Electronics Engineers Inc., p. 57-66 10 p. 8476919

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Controllers
Transmitters
Network protocols
Monitoring

Possibility of using cyber-pysop through nuclear weapon: Symbolic meaning and risk measurement of nuclear weapon in social network

Joo, M., Seo, J., Park, M., Oh, H. R. & Lee, K. H., 2018 Jan 1, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Curran Associates Inc., Vol. 2018-June. p. 233-239 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear weapons
Missiles
Military operations
Factor analysis
Risk measurement

Recipient revocable broadcast encryption with dealership

Kim, J. S., Lee, Y., Eom, J. & Lee, D. H., 2018 Jan 1, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Springer Verlag, p. 214-228 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcast Encryption
Cryptography
Revocation
Random Oracle
Security Model

Reminder as 'Watch-Out': The Role of Privacy Salience at the Point of Interaction with Biometric Systems

Oh, J., Lee, U. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472767

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watches
Biometrics
Biological systems
2 Citations (Scopus)

Risk Management to Cryptocurrency Exchange and Investors: Guidelines to Prevent Potential Threats

Kim, C. Y. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472760

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk management
Servers
Electronic money
1 Citation (Scopus)

Single Trace Side Channel Analysis on Quantum Key Distribution

Kim, S., Jin, S., Lee, Y., Park, B., Kim, H. & Hong, S., 2018 Nov 16, 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018. Institute of Electrical and Electronics Engineers Inc., p. 736-739 4 p. 8539703

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum cryptography
Network protocols
Quantum computers
Modulators
Program processors

Situational awareness for hybrid warfare: Risk measurement between cyber warfare and nuclear warfare

Park, M., Seo, J., Han, J., Oh, H. & Lee, K. H., 2018 Jan 1, Proceedings of the 17th European Conference on Cyber Warfare and Security, ECCWS 2018. Curran Associates Inc., Vol. 2018-June. p. 360-369 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Military operations
Missiles
Nuclear energy
Experiments
Risk measurement

Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System

Joo, M., Seo, J., Oh, J., Park, M. & Lee, K. H., 2018 Aug 14, ICUFN 2018 - 10th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, Vol. 2018-July. p. 837-842 6 p. 8436591

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Factor analysis
Artificial intelligence
Cyber Physical System

The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture

Hwang, D. M. & Kim, I-S., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual Worlds
Digit
Game
Population Size
Costs

Threat Analysis of Wi-Fi Connected Dashboard Camera

Park, W., Choi, D. & Lee, K. H., 2018 Sep 25, 2018 International Conference on Platform Technology and Service, PlatCon 2018. Institute of Electrical and Electronics Engineers Inc., 8472768

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wi-Fi
Cameras
Authentication
Smartphones
Security of data

Update state tampering: A novel adversary post-compromise technique on cyber threats

Kim, S. J., Kim, B. J., Kim, H. C. & Lee, D. H., 2018 Jan 1, Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings. Springer Verlag, p. 141-161 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10885 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Update
Servers
Vulnerability
Target
Countermeasures

VcBalancer: Dynamic Volunteer Manager for Self-Adaptive Task Pulling

Song, C., Bak, B., Myung, R., Lee, J., Lee, J. & Yu, H., 2018 Dec 4, Proceedings - 2017 International Conference on Computational Science and Computational Intelligence, CSCI 2017. Tinetti, F. G., Tran, Q-N., Deligiannidis, L., Yang, M. Q., Yang, M. Q. & Arabnia, H. R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 271-274 4 p. 8560800

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Managers
Experiments
1 Citation (Scopus)

What are the optimum quasi-identifiers to re-identify medical records?

Lee, Y. J. & Lee, K. H., 2018 Mar 23, IEEE 20th International Conference on Advanced Communication Technology: Opening New Era of Intelligent Things, ICACT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-February. p. 1025-1033 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

WheelLogger: Driver Tracing Using Smart Watch

Park, J. Y., Yun, J. P. & Lee, D. H., 2018 Jan 1, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Springer Verlag, p. 87-100 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Watches
Tracing
Driver
Apple
Leakage
2017
7 Citations (Scopus)

An analysis of economic impact on IoT under GDPR

Seo, J., Kim, K., Park, M., Park, M. & Lee, K. H., 2017 Dec 12, International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-December. p. 879-881 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Economics
Costs
Cost estimating
Industry
Internet of things
1 Citation (Scopus)

A New Technique Using a Shuffling Method to Protect Confidential Documents from Shoulder Surfers

Kim, H., Kim, H. & Yoon, J. W., 2017 Jan 10, Proceedings - 2015 1st International Conference on Software Security and Assurance, ICSSA 2015. Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 7812939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

A practical approach to constructing triple-blind review process with maximal anonymity and fairness

Jung, J., Kim, J. I. & Yoon, J. W., 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Springer Verlag, Vol. 10144 LNCS. p. 198-209 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anonymity
Fairness
Disclosure
Learning systems
Machine Learning
1 Citation (Scopus)

A study on the priority decision making of IT goals in COBIT 5 goals cascade

Lee, J., You, Y. & Lee, K. H., 2017 Oct 9, 2017 9th International Conference on Information Management and Engineering, ICIME 2017. Association for Computing Machinery, p. 221-225 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making
Industry
Analytic hierarchy process
3 Citations (Scopus)

Automated vulnerability analysis technique for smart grid infrastructure

Kwon, Y., Kim, H. K., Koumadi, K. M., Lim, Y. H. & Lim, J. I., 2017 Oct 26, 2017 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2017. Institute of Electrical and Electronics Engineers Inc., 8085965

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart Grid
Vulnerability
Electricity
Infrastructure
Embedded software
4 Citations (Scopus)

Classification of home appliance by using Probabilistic KNN with sensor data

Kang, S. & Yoon, J. W., 2017 Jan 17, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2016. Institute of Electrical and Electronics Engineers Inc., 7820745

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Domestic appliances
Monitoring
Sensors
Atmospheric humidity
Temperature
1 Citation (Scopus)

Construction of a national scale ENF map using online multimedia data

Kim, H., Jeon, Y. & Yoon, J. W., 2017 Nov 6, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, Vol. Part F131841. p. 19-28 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multimedia
Grid
Uncertainty
Build-to-order
Evaluation
1 Citation (Scopus)

Crime scene re-investigation: A postmortem analysis of game account stealers' behaviors

Kim, H., Yang, S. & Kim, H. K., 2017 Jul 25, NetGames 2017 - 15th Annual Workshop on Network and Systems Support for Games. IEEE Computer Society, p. 1-6 6 p. 7991540

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Servers
Gold
Industry

Criminal minds: Reasoning prime suspect in Russian hacking scandal by perspective of insiders

Park, M., Seo, J., Kim, K., Park, M. & Lee, K. H., 2017 Oct 30, MIST 2017 - Proceedings of the 2017 International Workshop on Managing Insider Security Threats, co-located with CCS 2017. Association for Computing Machinery, Inc, Vol. 2017-January. p. 97-100 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Cyber situational awareness enhancement with regular expressions and an evaluation methodology

Park, H. K., Kim, M. S., Park, M. & Lee, K. H., 2017 Dec 7, MILCOM 2017 - 2017 IEEE Military Communications Conference. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-October. p. 406-411 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security systems
Inspection
Military operations
Intrusion detection
Information systems
1 Citation (Scopus)

Developing Criteria for Invasion of Privacy by Personal Drone

Park, S. H. & Lee, K. H., 2017 Mar 20, 2017 International Conference on Platform Technology and Service, PlatCon 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7883702

Research output: Chapter in Book/Report/Conference proceedingConference contribution

invasion
privacy
Aviation
air traffic
Drones
1 Citation (Scopus)

Elaborate synthetic data generation for internet of things services at smart home environment

Myung, R., Choi, S., Choi, W., Yu, H., Lee, D. & Lee, E., 2017 Mar 17, Proceedings - 2016 International Conference on Computational Science and Computational Intelligence, CSCI 2016. Institute of Electrical and Electronics Engineers Inc., p. 226-229 4 p. 7881343

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Domestic appliances
Internet
Industry
Internet of things