• 3141 Citations
  • 23 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Article
20 Citations (Scopus)

Abnormal policy detection and correction using overlapping transition

Kim, S. & Lee, H., 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1053-1061 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Achieving network level privacy in wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2010 Mar, In : Sensors. 10, 3, p. 1447-1472 26 p.

Research output: Contribution to journalArticle

35 Citations (Scopus)

A connection management protocol for stateful inspection firewalls in multi-homed networks

Kim, J. H., Lee, H. & Bahk, S., 2008 Dec, In : Journal of Communications and Networks. 10, 4, p. 455-464 10 p.

Research output: Contribution to journalArticle

Activity-oriented access control to ubiquitous hospital information and services

Le, X. H., Lee, S., Lee, Y. K., Lee, H., Khalid, M. & Sankar, R., 2010 Aug 15, In : Information Sciences. 180, 16, p. 2979-2990 12 p.

Research output: Contribution to journalArticle

32 Citations (Scopus)

A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control

Kim, Y. S., Tague, P., Lee, H. & Kim, H., 2015 Nov 1, In : Wireless Networks. 21, 8, p. 2631-2647 17 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography

Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., Han, M., Lee, Y. K. & Lee, H., 2009 Dec, In : Journal of Communications and Networks. 11, 6, p. 599-606 8 p.

Research output: Contribution to journalArticle

38 Citations (Scopus)

An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge

Hung, L. X., Canh, N. T., Lee, S., Lee, Y. K. & Lee, H., 2008 Dec, In : Sensors. 8, 12, p. 7753-7782 30 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

An incrementally deployable anti-spoofing mechanism for software-defined networks

Kwon, J., Seo, D., Kwon, M., Lee, H., Perrig, A. & Kim, H., 2015 Jun 15, In : Computer Communications. 64, p. 1-20 20 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks

Seo, D., Lee, H. & Perrig, A., 2013, In : Computers and Security. 39, PART B, p. 366-385 20 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

A scalable approach for vulnerability discovery based on security patches

Li, H., Kwon, H., Kwon, J. & Lee, H., 2014, In : Communications in Computer and Information Science. 490, p. 109-122 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

BARI+: A biometric based distributed key management approach for wireless body area networks

Muhammad, K. U. R. R. S., Lee, H., Lee, S. & Lee, Y. K., 2010 Apr, In : Sensors. 10, 4, p. 3911-3933 23 p.

Research output: Contribution to journalArticle

34 Citations (Scopus)

Boosting VoIP capacity of wireless mesh networks through lazy frame aggregation

Kim, H., Yun, S. & Lee, H., 2007 May, In : IEICE Transactions on Communications. E90-B, 5, p. 1283-1285 3 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Broken integrity detection of video files in video event data recorders

Lee, C., Lee, J., Pyo, Y. & Lee, H., 2016 Aug 31, In : KSII Transactions on Internet and Information Systems. 10, 8, p. 3943-3957 15 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Classifying rules by in-out traffic direction to avoid security policy anomaly

Kim, S. & Lee, H., 2010 Aug 27, In : KSII Transactions on Internet and Information Systems. 4, 4, p. 671-690 20 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

CLORIFI: Software vulnerability discovery using code clone verification

Li, H., Kwon, H., Kwon, J. & Lee, H., 2015, (Accepted/In press) In : Concurrency Computation Practice and Experience.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233]

Lee, W. Y., Kwon, H. & Lee, H., 2015, (Accepted/In press) In : Digital Investigation.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Coordination of anti-spoofing mechanisms in partial deployments

An, H., Lee, H. & Perrig, A., 2016 Dec 1, In : Journal of Communications and Networks. 18, 6, p. 948-961 14 p., 000129.

Research output: Contribution to journalArticle

Cyber-physical security of a smart grid infrastructure

Mo, Y., Kim, T. H. J., Brancik, K., Dickinson, D., Lee, H., Perrig, A. & Sinopoli, B., 2012 Jan, In : Proceedings of the IEEE. 100, 1, p. 195-209 15 p., 6016202.

Research output: Contribution to journalArticle

611 Citations (Scopus)

Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection

Seo, I., Lee, H. & Han, S. C., 2014 Jan 1, In : Computers and Security. 46, p. 141-153 13 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Detecting Unknown Worms Using Randomness Check

Park, H., Lee, H. & Kim, H., 2007 Apr, In : IEICE Transactions on Communications. E90-B, 4, p. 894-903 10 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Detecting violations of security requirements for vulnerability discovery in source code

Li, H., Oh, J. & Lee, H., 2016 Sep 1, In : IEICE Transactions on Information and Systems. E99D, 9, p. 2385-2389 5 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Energy-efficient scheduling for multiprocessors

Lee, W. Y. & Lee, H., 2006, In : Electronics Letters. 42, 21, p. 1200-1201 2 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Enhancing resiliency of networks: Evolving strategy vs. multihoming

Lee, W. Y., Kim, S., Lee, H. & Kim, H., 2010, In : IEICE Transactions on Communications. E93-B, 1, p. 174-177 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Entropy analysis to classify unknown packing algorithms for malware detection

Bat-Erdene, M., Park, H., Li, H., Lee, H. & Choi, M-S., 2017 Jun 1, In : International Journal of Information Security. 16, 3, p. 227-248 22 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Error bound of collision probability estimation in non-saturated IEEE 802.11 WLANs

Kim, H., Yoon, J. & Lee, H., 2007 Jul, In : IEICE Transactions on Communications. E90-B, 7, p. 1884-1885 2 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Evaluation of authentication interworking methods among multiple WLAN service providers

Lee, W. Y. & Lee, H., 2007 May, In : International Journal of Communication Systems. 20, 5, p. 515-531 17 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Evaluation of two load-balancing primary-backup process allocation schemes

Lee, H. & Kim, J., 1999, In : IEICE Transactions on Information and Systems. E82-D, 12, p. 1535-1544 10 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Extraction of creation-time for recovered files on windows FAT32 file system

Lee, W. Y., Kim, K. H. & Lee, H., 2019 Dec 1, In : Applied Sciences (Switzerland). 9, 24, 5522.

Research output: Contribution to journalArticle

Open Access
2 Citations (Scopus)

Fast detection and visualization of network attacks on parallel coordinates

Choi, H., Lee, H. & Kim, H., 2009 Jul, In : Computers and Security. 28, 5, p. 276-288 13 p.

Research output: Contribution to journalArticle

59 Citations (Scopus)

GMAD: Graph-based malware activity detection by DNS traffic analysis

Lee, J. & Lee, H., 2014 Aug 1, In : Computer Communications. 49, p. 33-47 15 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)

Group-based trust management scheme for clustered wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2009, In : IEEE Transactions on Parallel and Distributed Systems. 20, 11, p. 1698-1712 15 p.

Research output: Contribution to journalArticle

246 Citations (Scopus)

Identifying botnets by capturing group activities in DNS traffic

Choi, H. & Lee, H., 2012 Jan 12, In : Computer Networks. 56, 1, p. 20-33 14 p.

Research output: Contribution to journalArticle

82 Citations (Scopus)

Integrity verification of the ordered data structures in manipulated video content

Song, J., Lee, K., Lee, W. Y. & Lee, H., 2016 Sep 1, In : Digital Investigation. 18, p. 1-7 7 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Integrity verification scheme of video contents in surveillance cameras for digital forensic investigations

Lee, S., Song, J. E., Lee, W. Y., Ko, Y. W. & Lee, H., 2015 Jan 1, In : IEICE Transactions on Information and Systems. E98D, 1, p. 95-97 3 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Introduction to the Issue on Signal and Information Processing for Privacy

Trappe, W., Sankar, L., Poovendran, R., Lee, H. & Capkun, S., 2015 Oct 1, In : IEEE Journal on Selected Topics in Signal Processing. 9, 7, p. 1173-1175 3 p., 7265126.

Research output: Contribution to journalArticle

Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2009 Jun, In : Sensors. 9, 8, p. 5989-6007 19 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Is early warning of an imminent worm epidemic possible?

Park, H., Kim, H. & Lee, H., 2009, In : IEEE Network. 23, 5, p. 14-20 7 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
3 Citations (Scopus)
3 Citations (Scopus)

Minimum-energy semi-static scheduling of a periodic real-time task on DVFS-enabled multi-core processors

Lee, W. Y., Kim, H. & Lee, H., 2011 Dec, In : IEICE Transactions on Information and Systems. E94-D, 12, p. 2389-2392 4 p.

Research output: Contribution to journalArticle

MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks

Syed, M. K. U. R. R., Lee, H., Lee, S. & Lee, Y. K., 2010 Feb, In : Annales des Telecommunications/Annals of Telecommunications. 65, 1-2, p. 101-116 16 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

Kim, H., Lee, H. & Shin, S., 2007 Feb, In : IEICE Transactions on Communications. E90-B, 2, p. 412-416 5 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Optimal scheduling for real-time parallel tasks

Lee, W. Y. & Lee, H., 2006 Jun, In : IEICE Transactions on Information and Systems. E89-D, 6, p. 1962-1966 5 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Packer detection for multi-layer executables using entropy analysis

Bat-Erdene, M., Kim, T., Park, H. & Lee, H., 2017 Mar 16, In : Entropy. 19, 3, 125.

Research output: Contribution to journalArticle

10 Citations (Scopus)

PA-DHK: Polarity analysis for discovering hidden knowledge

Kim, J. D., Son, J., Peter In, H., Hwang, S. H., Lee, H. & Baik, D. K., 2015, In : Scientia Iranica. 22, 6, p. 2198-2208 11 p.

Research output: Contribution to journalArticle

Processor allocation and task scheduling of matrix chain products on parallel systems

Lee, H., Kim, J., Hong, S. J. & Lee, S., 2003 Apr, In : IEEE Transactions on Parallel and Distributed Systems. 14, 4, p. 394-407 14 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)

PsyBoG: A scalable botnet detection method for large-scale DNS traffic

Kwon, J., Lee, J., Lee, H. & Perrig, A., 2016 Mar 14, In : Computer Networks. 97, p. 48-73 26 p.

Research output: Contribution to journalArticle

52 Citations (Scopus)

Reducing payload inspection cost using rule classification for fast attack signature matching

Kim, S. & Lee, H., 2009, In : IEICE Transactions on Information and Systems. E92-D, 10, p. 1971-1978 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Replicated process allocation for load distribution in fault-tolerant multicomputers

Kim, J., Lee, H. & Lee, S., 1997, In : IEEE Transactions on Computers. 46, 4, p. 499-505 7 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)