• 3141 Citations
  • 23 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

20 Citations (Scopus)

Abnormal policy detection and correction using overlapping transition

Kim, S. & Lee, H., 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1053-1061 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Achieving network level privacy in wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2010 Mar, In : Sensors. 10, 3, p. 1447-1472 26 p.

Research output: Contribution to journalArticle

35 Citations (Scopus)

A connection management protocol for stateful inspection firewalls in multi-homed networks

Kim, J. H., Bahk, S. & Lee, H., 2004, In : IEEE International Conference on Communications. 4, p. 1887-1891 5 p.

Research output: Contribution to journalConference article

2 Citations (Scopus)

A connection management protocol for stateful inspection firewalls in multi-homed networks

Kim, J. H., Lee, H. & Bahk, S., 2008 Dec, In : Journal of Communications and Networks. 10, 4, p. 455-464 10 p.

Research output: Contribution to journalArticle

Activity-based access control model to hospital information

Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Activity-based security scheme for ubiquitous environments

Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y., Fernandes, M., Kim, M. & Zhung, Y., 2008, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008. p. 475-481 7 p. 4745102. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Activity-oriented access control for ubiquitous environments

Hung, L. X., Shaikh, R. A., Jameel, H., Raazi, S. M. K. R., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784990. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Activity-oriented access control to ubiquitous hospital information and services

Le, X. H., Lee, S., Lee, Y. K., Lee, H., Khalid, M. & Sankar, R., 2010 Aug 15, In : Information Sciences. 180, 16, p. 2979-2990 12 p.

Research output: Contribution to journalArticle

32 Citations (Scopus)

A digital forensic framework for automated user activity reconstruction

Kang, J., Lee, S. & Lee, H., 2013, Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Proceedings. p. 263-277 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7863 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control

Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2015 Nov 1, In : Wireless Networks. 21, 8, p. 2631-2647 17 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

A location-aware key predistribution scheme for distributed wireless sensor networks

Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography

Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., Han, M., Lee, Y. K. & Lee, H., 2009 Dec, In : Journal of Communications and Networks. 11, 6, p. 599-606 8 p.

Research output: Contribution to journalArticle

38 Citations (Scopus)

An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge

Hung, L. X., Canh, N. T., Lee, S., Lee, Y. K. & Lee, H., 2008 Dec, In : Sensors. 8, 12, p. 7753-7782 30 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

An incrementally deployable anti-spoofing mechanism for software-defined networks

Kwon, J., Seo, D., Kwon, M., Lee, H., Perrig, A. & Kim, H., 2015 Jun 15, In : Computer Communications. 64, p. 1-20 20 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

A password stretching method using user specific salts

Lee, C. & Lee, H., 2007, 16th International World Wide Web Conference, WWW2007. p. 1215-1216 2 p. (16th International World Wide Web Conference, WWW2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks

Seo, D., Lee, H. & Perrig, A., 2013, In : Computers and Security. 39, PART B, p. 366-385 20 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

A privacy preserving access control scheme using anonymous identification for ubiquitous environments

Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

A scalable approach for vulnerability discovery based on security patches

Li, H., Kwon, H., Kwon, J. & Lee, H., 2014, In : Communications in Computer and Information Science. 490, p. 109-122 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

A taxonomy of online game security

Park, K. & Lee, H., 2007, Encyclopedia of Internet Technologies and Applications. IGI Global, p. 606-611 6 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

A trust-based approach to control privacy exposure in Ubiquitous Computing environments

Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Attack resiliency of network topologies

Lee, H. & Kim, J., 2004, In : Lecture Notes in Computer Science. 3320, p. 638-641 4 p.

Research output: Contribution to journalConference article

Automated source code instrumentation for verifying potential vulnerabilities

Li, H., Oh, J., Oh, H. & Lee, H., 2016, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 471. p. 211-226 16 p. (IFIP Advances in Information and Communication Technology; vol. 471).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

BARI: A distributed key management approach for wireless body area networks

Raazi, S. M. K. U. R., Lee, S., Lee, Y. K. & Lee, H., 2009, CIS 2009 - 2009 International Conference on Computational Intelligence and Security. p. 324-329 6 p. 5376103. (CIS 2009 - 2009 International Conference on Computational Intelligence and Security; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

BARI+: A biometric based distributed key management approach for wireless body area networks

Muhammad, K. U. R. R. S., Lee, H., Lee, S. & Lee, Y. K., 2010 Apr, In : Sensors. 10, 4, p. 3911-3933 23 p.

Research output: Contribution to journalArticle

34 Citations (Scopus)

BASE: An incrementally deployable mechanism for viable IP spoofing prevention

Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Citations (Scopus)

Bayesian memory-based reputation system

Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, Inc, 1385300

Research output: Chapter in Book/Report/Conference proceedingConference contribution

BinGraph: Discovering mutant malware using hierarchical semantic signatures

Kwon, J. & Lee, H., 2012, Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012. p. 104-111 8 p. 6461015. (Proceedings of the 2012 7th International Conference on Malicious and Unwanted Software, Malware 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Boosting VoIP capacity of wireless mesh networks through lazy frame aggregation

Kim, H., Yun, S. & Lee, H., 2007 May, In : IEICE Transactions on Communications. E90-B, 5, p. 1283-1285 3 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

BotGAD: Detecting botnets by capturing group activities in network traffic

Choi, H., Lee, H. & Kim, H., 2009, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09. 1621893. (Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Citations (Scopus)

Botnet detection by monitoring group activities in DNS traffic

Choi, H., Lee, H., Lee, H. & Kim, H., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 715-720 6 p. 4385169. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

179 Citations (Scopus)

Broken integrity detection of video files in video event data recorders

Lee, C., Lee, J., Pyo, Y. & Lee, H., 2016 Aug 31, In : KSII Transactions on Internet and Information Systems. 10, 8, p. 3943-3957 15 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Carving secure Wi-Fi zones with defensive jamming

Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 53-54 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Cascade damage estimation model for internet attacks

Lee, T., In, H. P., Im, E. G. & Lee, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. Springer Verlag, p. 163-164 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classifying rules by in-out traffic direction to avoid security policy anomaly

Kim, S. & Lee, H., 2010 Aug 27, In : KSII Transactions on Internet and Information Systems. 4, 4, p. 671-690 20 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

CLORIFI: Software vulnerability discovery using code clone verification

Li, H., Kwon, H., Kwon, J. & Lee, H., 2015, (Accepted/In press) In : Concurrency Computation Practice and Experience.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Code graph for malware detection

Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233]

Lee, W. Y., Kwon, H. & Lee, H., 2015, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Contextual risk-based access control

Diep, N. N., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings of The 2007 International Conference on Security and Management, SAM'07. p. 406-412 7 p. (Proceedings of The 2007 International Conference on Security and Management, SAM'07).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Coordination of anti-spoofing mechanisms in partial deployments

An, H., Lee, H. & Perrig, A., 2016 Dec 1, In : Journal of Communications and Networks. 18, 6, p. 948-961 14 p., 000129.

Research output: Contribution to journalArticle

Cyber-physical security of a smart grid infrastructure

Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A. & Sinopoli, B., 2012 Jan, In : Proceedings of the IEEE. 100, 1, p. 195-209 15 p., 6016202.

Research output: Contribution to journalArticle

611 Citations (Scopus)

Cyber threat trend analysis model using HMM

Kim, D. H., Lee, T., Jung, S. O. D., In, H. P. & Lee, H. J., 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 177-182 6 p. 4299771. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Cyber weather forecasting: Forecasting unknown Internet worms using randomness analysis

Park, H., Jung, S. O. D., Lee, H. & In, H. P., 2012, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings. p. 376-387 12 p. (IFIP Advances in Information and Communication Technology; vol. 376 AICT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection

Seo, I., Lee, H. & Han, S. C., 2014 Jan 1, In : Computers and Security. 46, p. 141-153 13 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Defending a web browser against spying with Browser Helper Objects

Park, B., Hong, S., Oh, J. & Lee, H., 2005, In : Lecture Notes in Computer Science. 3495, p. 638-639 2 p.

Research output: Contribution to journalConference article

1 Citation (Scopus)

Detecting metamorphic malwares using code graphs

Lee, J., Jeong, K. & Lee, H., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1970-1977 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

66 Citations (Scopus)

Detecting more SIP attacks on VoIP services by combining rule matching and state transition models

Seo, D., Lee, H. & Nuwere, E., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 397-411 15 p. (IFIP International Federation for Information Processing; vol. 278).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Detecting unknown worms using randomness check

Park, H. & Lee, H., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 775-784 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)