Graduate School of Information Security

  • Korea, Republic of

Research Output 1995 2019

Filter
Article
2019
1 Citation (Scopus)

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2019 Jan 1, In : IEEE Access. 7, p. 47582-47592 11 p., 8681035.

Research output: Contribution to journalArticle

Open Access
Microcontrollers
Recovery
Side channel attack
1 Citation (Scopus)

CCA security for self-updatable encryption:Protecting cloud data when clients read/write ciphertexts

Lee, K., Lee, D. H., Park, J. H. & Yung, M., 2019 Apr 1, In : Computer Journal. 62, 4, p. 545-562 18 p.

Research output: Contribution to journalArticle

Cryptography
Servers
Cloud computing
Access control
1 Citation (Scopus)
Authentication
Network protocols
Glossaries
Telecommunication networks
Hardware

DQN-based OpenCL workload partition for performance optimization

Park, S. & Suh, T., 2019 Jan 1, In : Journal of Supercomputing.

Research output: Contribution to journalArticle

Performance Optimization
Reinforcement learning
Learning algorithms
Workload
Decoding

Enhanced android app-repackaging attack on in-vehicle network

Lee, Y., Woo, S., Lee, J., Song, Y., Moon, H., Lee, D. H. & Andersson, K., 2019 Jan 1, In : Wireless Communications and Mobile Computing. 2019, 5650245.

Research output: Contribution to journalArticle

Open Access
Application programs
Railroad cars
Automobiles
Communication
Android (operating system)

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts

Jeong, D. & Lee, S., 2019 Jun 1, In : Digital Investigation. 29, p. 21-27 7 p.

Research output: Contribution to journalArticle

Firmware
Copying
Computer operating systems
Artifacts
artifact

Lightweight conversion from arithmetic to Boolean masking for embedded IoT processor

Kim, H. B., Hong, S. & Kim, H. S., 2019 Apr 1, In : Applied Sciences (Switzerland). 9, 7, 1438.

Research output: Contribution to journalArticle

Open Access
masking
central processing units
Data storage equipment
attack
Internet of things

New technique for chosen-ciphertext security based on non-interactive zero-knowledge

Seo, M., Abdalla, M., Lee, D. H. & Park, J. H., 2019 Jul 1, In : Information Sciences. 490, p. 18-35 18 p.

Research output: Contribution to journalArticle

Chosen-ciphertext Security
Zero-knowledge
Encapsulation
Zero-knowledge Proof
Discrete Logarithm
1 Citation (Scopus)

T-Box: A Forensics-Enabled Trusted Automotive Data Recording Method

Lee, S., Choi, W., Jo, H. J. & Lee, D. H., 2019 Jan 1, In : IEEE Access. 7, p. 49738-49755 18 p., 8689029.

Research output: Contribution to journalArticle

Data recording
Accidents
Insurance
Authentication
Automobiles
1 Citation (Scopus)
Open Access
Smartphones
Mobile devices
Learning algorithms
Learning systems
Internet of things
1 Citation (Scopus)

Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model

Oh, J., Lee, U. & Lee, K. H., 2019 Jan 1, In : Security and Communication Networks. 2019, 8715264.

Research output: Contribution to journalArticle

Open Access
Biometrics
Decision making
Students
2018
Servers
Intrusion detection
Experiments
Botnet

A cyber command and control framework for psychological operation using social media

Kim, K., Seo, J., Park, M., Park, M. & Lee, K. H., 2018 Oct 1, In : Journal of Telecommunication, Electronic and Computer Engineering. 10, 4, p. 101-105 5 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

A distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments

Lim, J. B., Gil, J. M. & Yu, H., 2018 Jan 1, In : Symmetry. 10, 1, 30.

Research output: Contribution to journalArticle

artificial intelligence
Snapshot
Cloud computing
Cloud Computing
Artificial intelligence

Advanced approach to information security management system utilizing maturity models in critical infrastructure

You, Y., Oh, J., Kim, S. & Lee, K. H., 2018 Jan 1, In : KSII Transactions on Internet and Information Systems. 12, 10, p. 4995-5014 20 p.

Research output: Contribution to journalArticle

Critical infrastructures
Security of data
2 Citations (Scopus)

A Low-Cost Surveillance and Information System for Museum Using Visible Light Communication

Kim, M. & Suh, T., 2018 Jan 1, (Accepted/In press) In : IEEE Sensors Journal.

Research output: Contribution to journalArticle

Flashlights
museums
information systems
Museums
surveillance
1 Citation (Scopus)

An analysis of economic impact on IoT industry under GDPR

Seo, J., Kim, K., Park, M., Park, M. & Lee, K. H., 2018 Jan 1, In : Mobile Information Systems. 2018, 6792028.

Research output: Contribution to journalArticle

Economics
Costs
Industry
Internet of things
5 Citations (Scopus)

An intelligent residual resource monitoring scheme in cloud computing environments

Lim, J. B., Yu, H. & Gil, J. M., 2018 Jan 1, In : Journal of Information Processing Systems. 14, 6, p. 1480-1493 14 p.

Research output: Contribution to journalArticle

Cloud computing
Artificial intelligence
Monitoring
Quality of service
Computer science
7 Citations (Scopus)

Anomaly intrusion detection method for vehicular networks based on survival analysis

Han, M. L., Kwak, B. I. & Kim, H. K., 2018 Oct 1, In : Vehicular Communications. 14, p. 52-63 12 p.

Research output: Contribution to journalArticle

Intrusion detection
Communication
Network security
Semantics

Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment

Xu, L., Lee, J., Kim, S. H., Zheng, Q., Xu, S., Suh, T., Ro, W. W. & Shi, W., 2018 Apr 1, In : IEEE Transactions on Cloud Computing. 6, 2, p. 478-491 14 p.

Research output: Contribution to journalArticle

Computer monitors
Data privacy
Computer operating systems
Cloud computing
Computer hardware

Construction of a New Biometric-Based Key Derivation Function and Its Application

Seo, M., Park, J. H., Kim, Y., Cho, S., Lee, D. H. & Hwang, J. Y., 2018 Jan 1, In : Security and Communication Networks. 2018, 6107912.

Research output: Contribution to journalArticle

Biometrics
Authentication
Cryptography
Servers
2 Citations (Scopus)

Contagion of Cheating Behaviors in Online Social Networks

Woo, J., Kang, S. W., Kim, H. K. & Park, J., 2018 May 5, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Reinforcement
1 Citation (Scopus)

Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2018 Mar 13, (Accepted/In press) In : Journal of Supercomputing. 1 p.

Research output: Contribution to journalArticle

Pairing-based Cryptography
Efficient Implementation
Cryptography
3 Citations (Scopus)

Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media

Park, W., You, Y. & Lee, K. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 7243296.

Research output: Contribution to journalArticle

Learning algorithms
Learning systems
Unsupervised learning
Supervised learning
Security of data
Microcontrollers
multiplication
scalars
central processing units
ARM processors
4 Citations (Scopus)

Efficient Isogeny Computations on Twisted Edwards Curves

Kim, S., Yoon, K., Kwon, J., Hong, S. & Park, Y. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 5747642.

Research output: Contribution to journalArticle

Cryptography
Costs

Energy-aware key exchange for securing implantable medical devices

Choi, W., Lee, Y., Lee, D., Kim, H., Park, J. H., Kim, I-S. & Lee, D. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 1809302.

Research output: Contribution to journalArticle

Open Access
Medical problems
Communication
3 Citations (Scopus)

Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers

Yoon, J. W., Hong, T. Y., Choi, J. W., Park, C. Y., Kim, K. B. & Yu, H., 2018 Mar 27, (Accepted/In press) In : Peer-to-Peer Networking and Applications. p. 1-11 11 p.

Research output: Contribution to journalArticle

Cloud computing
Parallel processing systems
Cryptography
Distributed computer systems
Scalability
3 Citations (Scopus)

Feature selection practice for unsupervised learning of credit card fraud detection

Lee, H., Choi, D., Yim, H., Choi, E., Go, W., Lee, T., Kim, I-S. & Lee, K. H., 2018 Jan 1, In : Journal of Theoretical and Applied Information Technology. 96, 2, p. 408-417 10 p.

Research output: Contribution to journalArticle

Fraud Detection
Unsupervised learning
Unsupervised Learning
Feature Selection
Feature extraction

Further analysis on smart TV forensics

Park, M., Kang, H., Baek, S. & Kim, S-J., 2018 Jan 1, In : Journal of Internet Technology. 19, 4, p. 1055-1061 7 p.

Research output: Contribution to journalArticle

Cameras
1 Citation (Scopus)

Interactive digital textbook development methodology for higher education

Chung, K. S., Byun, H. W., Kim, S. & Yu, H., 2018 Jan 1, In : International Journal on Advanced Science, Engineering and Information Technology. 8, 4-2, p. 1534-1539 6 p.

Research output: Contribution to journalArticle

Textbooks
higher education
learning
Education
Learning
3 Citations (Scopus)

Mitigation technique for performance degradation of virtual machine owing to GPU pass-through in fog computing

Kang, J. & Yu, H., 2018 Jun 1, In : Journal of Communications and Networks. 20, 3, p. 257-265 9 p., 8437206.

Research output: Contribution to journalArticle

Fog
Degradation
Graphics processing unit
Virtual machine
Program processors
2 Citations (Scopus)

Multi-Client Order-Revealing Encryption

Eom, J., Lee, D. H. & Lee, K., 2018 Aug 11, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Cryptography
2 Citations (Scopus)

Reversible Data Hiding with Automatic Brightness Preserving Contrast Enhancement

Kim, S., Lussi, R., Qu, X., Huang, F. & Kim, H. J., 2018 Sep 11, (Accepted/In press) In : IEEE Transactions on Circuits and Systems for Video Technology.

Research output: Contribution to journalArticle

Luminance
Image enhancement
Bins
1 Citation (Scopus)

Security Evaluation Framework for Military IoT Devices

Cha, S., Baek, S., Kang, S. & Kim, S-J., 2018 Jan 1, In : Security and Communication Networks. 2018, 6135845.

Research output: Contribution to journalArticle

Internet of things

Security of self-driving car from the point of view of in-vehicle system

Seo, E. & Kim, H. K., 2018 Mar 1, In : Transactions of the Korean Society of Automotive Engineers. 26, 2, p. 240-253 14 p.

Research output: Contribution to journalArticle

Railroad cars
Communication

Security Paper Design with Frequency-Selective Structure for X-Band Electromagnetic Detection System

Lee, S. H., Kim, M. S., Kim, J. K., Lim, J. I. & Hong, I. P., 2018 Jan 1, In : International Journal of Antennas and Propagation. 2018, 9836937.

Research output: Contribution to journalArticle

Screen printing
Antenna arrays
Ink
Electromagnetic waves
Silver
1 Citation (Scopus)

Single trace analysis on constant time CDT sampler and its countermeasure

Kim, S. & Hong, S., 2018 Oct 3, In : Applied Sciences (Switzerland). 8, 10, 1809.

Research output: Contribution to journalArticle

Trace analysis
samplers
countermeasures
time constant
Cryptography
5 Citations (Scopus)

Situational awareness framework for threat intelligence measurement of android malware

Park, M., Seo, J., Han, J., Oh, H. & Lee, K. H., 2018 Sep 1, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 9, 3, p. 25-38 14 p.

Research output: Contribution to journalArticle

Mobile devices
Learning algorithms
Learning systems
Availability
Malware
6 Citations (Scopus)

Skewed Histogram Shifting for Reversible Data Hiding using a Pair of Extreme Predictions

Kim, S., Qu, X., Sachnev, V. & Kim, H. J., 2018 Jan 1, (Accepted/In press) In : IEEE Transactions on Circuits and Systems for Video Technology.

Research output: Contribution to journalArticle

Pixels
Experiments
7 Citations (Scopus)

Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System

Choi, W., Seo, M. & Lee, D. H., 2018 Jan 1, In : Journal of Advanced Transportation. 2018, 1935974.

Research output: Contribution to journalArticle

Authentication
Railroad cars
Acoustic waves
Audio systems
Factors
2 Citations (Scopus)

UnThemida: Commercial obfuscation technique analysis with a fully obfuscated program

Suk, J. H., Lee, J. Y., Jin, H., Kim, I-S. & Lee, D. H., 2018 Jan 1, (Accepted/In press) In : Software - Practice and Experience.

Research output: Contribution to journalArticle

Flow control
Application programming interfaces (API)
Flow patterns
Data structures
Engineers
26 Citations (Scopus)

VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System

Choi, W., Joo, K., Jo, H. J., Park, M. C. & Lee, D. H., 2018 Mar 3, (Accepted/In press) In : IEEE Transactions on Information Forensics and Security.

Research output: Contribution to journalArticle

Intrusion detection
Communication
Network protocols
Authentication
Controllers
2017
2 Citations (Scopus)
Cloud computing
Workload
managers
Managers
Environment Design
27 Citations (Scopus)

Alexa, Can i Trust You?

Chung, H., Iorga, M., Voas, J. & Lee, S., 2017, Computer, 50, 9, p. 100-104 5 p.

Research output: Contribution to specialist publicationArticle

Ecosystems
Testing
2 Citations (Scopus)

A method and tool to recover data deleted from a MongoDB

Yoon, J. & Lee, S., 2017 Jan 1, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

Information Storage and Retrieval
Research
Recovery
Servers
Engines

Analysis and Security Evaluation of Security Threat on Broadcasting Service

Lee, J. H. & Kim, S-J., 2017 Mar 2, (Accepted/In press) In : Wireless Personal Communications. p. 1-21 21 p.

Research output: Contribution to journalArticle

Broadcasting
IPTV
Cables
Network security
Industry
7 Citations (Scopus)

An efficient and energy-aware cloud consolidation algorithm for multimedia big data applications

Lim, J. B., Yu, H. & Gil, J. M., 2017 Sep 1, In : Symmetry. 9, 9, 184.

Research output: Contribution to journalArticle

consolidation
Consolidation
multimedia
Multimedia
Cloud computing
1 Citation (Scopus)

An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2017 Jul 17, (Accepted/In press) In : Journal of Supercomputing. p. 1-24 24 p.

Research output: Contribution to journalArticle

Pairing-based Cryptography
Efficient Implementation
Pairing
Cryptography
Field extension
24 Citations (Scopus)

A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments

Moon, Y. J., Yu, H., Gil, J. M. & Lim, J. B., 2017 Dec 1, In : Human-centric Computing and Information Sciences. 7, 1, 28.

Research output: Contribution to journalArticle

Ant colony optimization
Cloud computing
Scheduling
Scheduling algorithms
Global optimization