• 3141 Citations
  • 23 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

1995

Performance comparison of real-time architectures using simulation

Lee, H., Toda, K., Kim, J., Nishida, K., Takahashi, E. & Yamaguchi, Y., 1995, p. 150-157. 8 p.

Research output: Contribution to conferencePaper

Process allocation for load distribution in fault-tolerant multicomputers

Kim, J., Lee, H. & Lee, S., 1995, In : Proceedings - Annual International Conference on Fault-Tolerant Computing. p. 174-183 10 p.

Research output: Contribution to journalConference article

3 Citations (Scopus)
1997

Replicated process allocation for load distribution in fault-tolerant multicomputers

Kim, J., Lee, H. & Lee, S., 1997, In : IEEE Transactions on Computers. 46, 4, p. 499-505 7 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
1999

Evaluation of two load-balancing primary-backup process allocation schemes

Lee, H. & Kim, J., 1999, In : IEICE Transactions on Information and Systems. E82-D, 12, p. 1535-1544 10 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2000

Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization

Lee, H., Kim, J., Hong, S. J. & Lee, S., 2000, Proceedings of the 2000 ACM Symposium on Applied Computing, SAC 2000. p. 641-648 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2001

On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack

Park, K. & Lee, H., 2001, In : Proceedings - IEEE INFOCOM. 1, p. 338-347 10 p.

Research output: Contribution to journalConference article

226 Citations (Scopus)

On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets

Park, K. & Lee, H., 2001, In : Computer Communication Review. 31, 4, p. 15-26 12 p.

Research output: Contribution to journalConference article

260 Citations (Scopus)
2003

Processor allocation and task scheduling of matrix chain products on parallel systems

Lee, H., Kim, J., Hong, S. J. & Lee, S., 2003 Apr, In : IEEE Transactions on Parallel and Distributed Systems. 14, 4, p. 394-407 14 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization

Lee, H., Kim, J., Hong, S. J. & Lee, S., 2003 Jan, In : Parallel Computing. 29, 1, p. 135-159 25 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2004

A connection management protocol for stateful inspection firewalls in multi-homed networks

Kim, J. H., Bahk, S. & Lee, H., 2004, In : IEEE International Conference on Communications. 4, p. 1887-1891 5 p.

Research output: Contribution to journalConference article

2 Citations (Scopus)

Attack resiliency of network topologies

Lee, H. & Kim, J., 2004, In : Lecture Notes in Computer Science. 3320, p. 638-641 4 p.

Research output: Contribution to journalConference article

2005

Defending a web browser against spying with Browser Helper Objects

Park, B., Hong, S., Oh, J. & Lee, H., 2005, In : Lecture Notes in Computer Science. 3495, p. 638-639 2 p.

Research output: Contribution to journalConference article

1 Citation (Scopus)

HackSim: An automation of penetration testing for remote buffer overflow vulnerabilities

Kwon, O. H., Lee, S. M., Lee, H., Kim, J., Kim, S. C., Nam, G. W. & Park, J. G., 2005, In : Lecture Notes in Computer Science. 3391, p. 652-661 10 p.

Research output: Contribution to journalConference article

3 Citations (Scopus)

PCAV: Internet attack visualization on parallel coordinates

Choi, H. & Lee, H., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 454-466 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)
2006

A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Cascade damage estimation model for internet attacks

Lee, T., In, H. P., Im, E. G. & Lee, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. Springer Verlag, p. 163-164 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting unknown worms using randomness check

Park, H. & Lee, H., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 775-784 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Energy-efficient scheduling for multiprocessors

Lee, W. Y. & Lee, H., 2006, In : Electronics Letters. 42, 21, p. 1200-1201 2 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Filtering out unfair recommendations for trust model in ubiquitous environments

Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Bagchi, A. & Atluri, V. (eds.). Springer Verlag, p. 357-360 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Improving resiliency of network topology with enhanced evolving strategies

Kim, S., Lee, H. & Lee, W. Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 149 1 p. 4019940. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Improving VoIP call capacity of multi-hop wireless networks through self-controlled frame aggregation

Yun, S., Kim, H., Lee, H. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2181-2185 5 p. 4109716. (IEEE Vehicular Technology Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

One touch logon: Replacing multiple passwords with single fingerprint recognition

Park, B., Hong, S., Oh, J., Lee, H. & Won, Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 163 1 p. 4019947. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

Kim, H., Lee, H., Shin, S. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2241-2246 6 p. 4109728. (IEEE Vehicular Technology Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Optimal scheduling for real-time parallel tasks

Lee, W. Y. & Lee, H., 2006 Jun, In : IEICE Transactions on Information and Systems. E89-D, 6, p. 1962-1966 5 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Resiliency of network topologies under path-based attacks

Lee, H., Kim, J. & Lee, W. Y., 2006 Oct, In : IEICE Transactions on Communications. E89-B, 10, p. 2878-2884 7 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2007
20 Citations (Scopus)

Activity-based access control model to hospital information

Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

A location-aware key predistribution scheme for distributed wireless sensor networks

Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A password stretching method using user specific salts

Lee, C. & Lee, H., 2007, 16th International World Wide Web Conference, WWW2007. p. 1215-1216 2 p. (16th International World Wide Web Conference, WWW2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A privacy preserving access control scheme using anonymous identification for ubiquitous environments

Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

A taxonomy of online game security

Park, K. & Lee, H., 2007, Encyclopedia of Internet Technologies and Applications. IGI Global, p. 606-611 6 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

A trust-based approach to control privacy exposure in Ubiquitous Computing environments

Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

BASE: An incrementally deployable mechanism for viable IP spoofing prevention

Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)

Bayesian memory-based reputation system

Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, Inc, 1385300

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Boosting VoIP capacity of wireless mesh networks through lazy frame aggregation

Kim, H., Yun, S. & Lee, H., 2007 May, In : IEICE Transactions on Communications. E90-B, 5, p. 1283-1285 3 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Botnet detection by monitoring group activities in DNS traffic

Choi, H., Lee, H., Lee, H. & Kim, H., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 715-720 6 p. 4385169. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

179 Citations (Scopus)

Contextual risk-based access control

Diep, N. N., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings of The 2007 International Conference on Security and Management, SAM'07. p. 406-412 7 p. (Proceedings of The 2007 International Conference on Security and Management, SAM'07).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Cyber threat trend analysis model using HMM

Kim, D. H., Lee, T., Jung, S. O. D., In, H. P. & Lee, H. J., 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 177-182 6 p. 4299771. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Detecting Unknown Worms Using Randomness Check

Park, H., Lee, H. & Kim, H., 2007 Apr, In : IEICE Transactions on Communications. E90-B, 4, p. 894-903 10 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Energy-aware QoS adjustment of multimedia tasks with uncertain execution time

Lee, W. Y., Lee, H. & Kim, H., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 709-712 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4490 LNCS, no. PART 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2 Citations (Scopus)

Enforcing access control using risk assessment

Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Citations (Scopus)

Error bound of collision probability estimation in non-saturated IEEE 802.11 WLANs

Kim, H., Yoon, J. & Lee, H., 2007 Jul, In : IEICE Transactions on Communications. E90-B, 7, p. 1884-1885 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Evaluation of authentication interworking methods among multiple WLAN service providers

Lee, W. Y. & Lee, H., 2007 May, In : International Journal of Communication Systems. 20, 5, p. 515-531 17 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Human identification through image evaluation using secret predicates

Jameel, H., Shaikh, R. A., Lee, H. & Lee, S., 2007, Topics in Cryptology: CT-RSA 2007 - The Cryptographers Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Springer Verlag, p. 67-84 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4377 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

Multiple-objective metric for placing multiple base stations in wireless sensor networks

Kim, S., Ko, J. G., Yoon, J. & Lee, H., 2007, 2007 2nd International Symposium on Wireless Pervasive Computing. p. 627-631 5 p. 4147138. (2007 2nd International Symposium on Wireless Pervasive Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Citations (Scopus)

On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

Kim, H., Lee, H. & Shin, S., 2007 Feb, In : IEICE Transactions on Communications. E90-B, 2, p. 412-416 5 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

SRMT: A lightweight encryption scheme for secure real-time multimedia transmission

Choo, E., Lee, J., Lee, H. & Nam, G., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. IEEE Computer Society, p. 60-65 6 p. 4197250. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Citations (Scopus)

Transmission time-based mechanism to detect wormhole attacks

Van Phuong, T., Canh, N. T., Lee, Y. K., Lee, S. & Lee, H., 2007, Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007. p. 172-178 7 p. 4414457. (Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks

Van Tran, P., Hung, L. X., Lee, Y. K., Lee, S. & Lee, H., 2007, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. p. 593-598 6 p. 4199210. (2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)