Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • Conference contribution

    DroidGraph: Discovering Android malware by analyzing semantic behavior

    Kwon, J., Jeong, J., Lee, J. & Lee, H., 2014 Dec 23, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 498-499 2 p. 6997523. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Dynamic classification of packing algorithms for inspecting executables using entropy analysis

    Bat-Erdene, M., Kim, T., Li, H. & Lee, H., 2013, Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013. IEEE Computer Society, p. 19-26 8 p. 6703681. (Proceedings of the 2013 8th International Conference on Malicious and Unwanted Software: "The Americas", MALWARE 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Dynamic multimedia scheduling against Motion based DoS attacks

    Choo, E., Lee, H. & Lee, W. Y., 2009, 2009 International Conference on Information Networking, ICOIN 2009. 4897288. (2009 International Conference on Information Networking, ICOIN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Dynamic surveillance: A case study with Enron email data set

    Do, H., Choi, P. & Lee, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8267 LNCS. p. 81-99 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8267 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Energy-aware QoS adjustment of multimedia tasks with uncertain execution time

    Lee, W. Y., Lee, H. & Kim, H., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 709-712 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4490 LNCS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Energy-efficient and fault-tolerant positioning of multiple base stations

    Kim, S., Ko, J., Yoon, J. & Lee, H., 2008, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. Springer Verlag, p. 584-593 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores

    Lee, W. Y., Ko, Y. W., Lee, H. & Kim, H., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 273-277 5 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Enforcing access control using risk assessment

    Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Citations (Scopus)
  • Enhancing the Reliability of IoT Data Marketplaces through Security Validation of IoT Devices

    Na, Y., Joo, Y., Lee, H., Zhao, X., Sajan, K. K., Ramachandran, G. & Krishnamachari, B., 2020 May, Proceedings - 16th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2020. Institute of Electrical and Electronics Engineers Inc., p. 265-272 8 p. 9183447. (Proceedings - 16th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • FassKey: A secure and convenient authentication system

    Milburn, J. & Lee, H., 2016 Jun 30, IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services. Institute of Electrical and Electronics Engineers Inc., p. 489-495 7 p. 7502490. (IEEE NETSOFT 2016 - 2016 IEEE NetSoft Conference and Workshops: Software-Defined Infrastructure for Networks, Clouds, IoT and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Filtering out unfair recommendations for trust model in ubiquitous environments

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Bagchi, A. & Atluri, V. (eds.). Springer Verlag, p. 357-360 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Flooding DDoS mitigation and traffic management with software defined networking

    Kalliola, A., Lee, K., Lee, H. & Aura, T., 2015 Nov 20, 2015 IEEE 4th International Conference on Cloud Networking, CloudNet 2015. Institute of Electrical and Electronics Engineers Inc., p. 248-254 7 p. 7335317

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Citations (Scopus)
  • Flow traffic classification with support vector machine by using payload length

    Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Generic unpacking using entropy analysis

    Jeong, G., Choo, E., Lee, J., Bat-Erdene, M. & Lee, H., 2010, Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. p. 98-105 8 p. 5665789. (Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Hidden bot detection by tracing non-human generated traffic at the zombie host

    Kwon, J., Lee, J. & Lee, H., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 343-361 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • HoneyID: Unveiling hidden spywares by generating bogus events

    Han, J., Kwon, J. & Lee, H., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 669-673 5 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • How to divide a permission token in the delegation process of blockchain-based access control for IoT

    Heo, J., Jang, H. & Lee, H., 2022, SysCon 2022 - 16th Annual IEEE International Systems Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., (SysCon 2022 - 16th Annual IEEE International Systems Conference, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Human identification through image evaluation using secret predicates

    Jameel, H., Shaikh, R. A., Lee, H. & Lee, S., 2007, Topics in Cryptology: CT-RSA 2007 - The Cryptographers Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Springer Verlag, p. 67-84 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4377 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Image-feature based human identification protocols on limited display devices

    Jameel, H., Shaikh, R. A., Hung, L. X., Wei, Y. W., Raazi, S. M. K. U. R., Canh, N. T., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 211-224 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Improving resiliency of network topology with enhanced evolving strategies

    Kim, S., Lee, H. & Lee, W. Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 149 1 p. 4019940. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Improving VoIP call capacity of multi-hop wireless networks through self-controlled frame aggregation

    Yun, S., Kim, H., Lee, H. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2181-2185 5 p. 4109716. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing

    Park, H., Nkuba, C. K., Woo, S. & Lee, H., 2022, Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022. Institute of Electrical and Electronics Engineers Inc., p. 343-354 12 p. (Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Lightweight resource management for DDoS traffic isolation in a cloud environment

    Mubarok, I., Lee, K., Lee, S. & Lee, H., 2014, IFIP Advances in Information and Communication Technology. Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Kalam, A. A. E. & Sans, T. (eds.). Springer New York LLC, p. 44-51 8 p. (IFIP Advances in Information and Communication Technology; vol. 428).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components

    Woo, S., Hong, H., Choi, E. & Lee, H., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 3037-3053 17 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Multiple-objective metric for placing multiple base stations in wireless sensor networks

    Kim, S., Ko, J. G., Yoon, J. & Lee, H., 2007, 2007 2nd International Symposium on Wireless Pervasive Computing. p. 627-631 5 p. 4147138. (2007 2nd International Symposium on Wireless Pervasive Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • MysteryChecker: Unpredictable attestation to detect repackaged malicious applications in Android

    Jeong, J., Seo, D., Lee, C., Kwon, J., Lee, H. & Milburn, J., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 50-57 8 p. 6999415. (Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Network level privacy for wireless sensor networks

    Shaikh, R. A., Jameel, H., d'Auriol, B., Lee, S., Lee, H. & Song, Y. J., 2008, Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008. IEEE Computer Society, p. 261-266 6 p. 4627096. (Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Obfuscated VBA macro detection using machine learning

    Kim, S., Hong, S., Oh, J. & Lee, H., 2018 Jul 19, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 490-501 12 p. 8416509. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept

    Kwon, S., Woo, S., Seong, G. & Lee, H., 2021 Jun, Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021. Institute of Electrical and Electronics Engineers Inc., p. 174-185 12 p. (Proceedings - 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • OMAP: One-way memory attestation protocol for smart meters

    Song, K., Seo, D., Park, H., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 111-118 8 p. 5951959. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • One touch logon: Replacing multiple passwords with single fingerprint recognition

    Park, B., Hong, S., Oh, J., Lee, H. & Won, Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 163 1 p. 4019947. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Online detection of fake access points using received signal strengths

    Kim, T., Park, H., Jung, H. & Lee, H., 2012, IEEE 75th Vehicular Technology Conference, VTC Spring 2012 - Proceedings. 6240312. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

    Kim, H., Lee, H., Shin, S. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2241-2246 6 p. 4109728. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • PCAV: Internet attack visualization on parallel coordinates

    Choi, H. & Lee, H., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 454-466 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • PFS: Probabilistic filter scheduling against distributed denial-of-service attacks

    Seo, D., Lee, H. & Perrig, A., 2011, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, LCN 2011. p. 9-17 9 p. 6114645. (Proceedings - Conference on Local Computer Networks, LCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles

    Yang, K., Mohan, S., Kwon, Y., Lee, H. & Kim, C. H., 2022 Nov 7, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3503-3505 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Prett: Protocol reverse engineering using binary tokens and network traces

    Lee, C., Bae, J. & Lee, H., 2018, ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Proceedings. Janczewski, L. J. & Kutyłowski, M. (eds.). Springer, p. 141-155 15 p. (IFIP Advances in Information and Communication Technology; vol. 529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • PROBE: A process behavior-based host intrusion prevention system

    Kwon, M., Jeong, K. & Lee, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 203-217 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • PsyBoG: Power spectral density analysis for detecting botnet groups

    Kwon, J., Kim, J., Lee, J., Lee, H. & Perrig, A., 2014 Dec 29, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 85-92 8 p. 6999414. (Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection

    Jang, H., Yang, K., Lee, G., Na, Y., Seideman, J. D., Luo, S., Lee, H. & Dietrich, S., 2021, ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings. Jøsang, A., Futcher, L. & Hagen, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 66-82 17 p. (IFIP Advances in Information and Communication Technology; vol. 625).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Reducing payload scans for attack signature matching using rule classification

    Kim, S. & Lee, H., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. Springer Verlag, p. 350-360 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Screening smartphone applications using behavioral signatures

    Lee, S., Lee, J. & Lee, H., 2013, Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Proceedings. Janczewski, L. J., Wolfe, H. B. & Shenoi, S. (eds.). Springer New York LLC, p. 14-27 14 p. (IFIP Advances in Information and Communication Technology; vol. 405).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Citations (Scopus)
  • Secure and efficient capability-based power management in the smart grid

    Seo, D., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 119-126 8 p. 5951960. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC Security

    Lee, J. & Lee, H., 2021, ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Proceedings. Jøsang, A., Futcher, L. & Hagen, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 287-301 15 p. (IFIP Advances in Information and Communication Technology; vol. 625).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sigmata: Storage integrity guaranteeing mechanism against tampering attempts for video event data recorders

    Kwon, H., Kim, S. & Lee, H., 2016, 7th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2016 and 7th International Conference on Society and Information Technologies, ICSIT 2016 - Proceedings. Callaos, N. C., Sanchez, B., Chu, H-W., Ferrer, J. & Fernandes, S. L. (eds.). International Institute of Informatics and Systemics, IIIS, p. 101-106 6 p. (7th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2016 and 7th International Conference on Society and Information Technologies, ICSIT 2016 - Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • SMATT: Smart meter ATTestation using multiple target selection and copy-proof memory

    Park, H., Seo, D., Lee, H. & Perrig, A., 2012, Computer Science and Its Applications, CSA 2012. p. 875-887 13 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Software vulnerability detection using backward trace analysis and symbolic execution

    Li, H., Kim, T., Bat-Erdene, M. & Lee, H., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. p. 446-454 9 p. 6657275. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • SRMT: A lightweight encryption scheme for secure real-time multimedia transmission

    Choo, E., Lee, J., Lee, H. & Nam, G., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. IEEE Computer Society, p. 60-65 6 p. 4197250. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • State of the art of network security perspectives in cloud computing

    Oh, T. H., Lim, S., Choi, Y. B., Park, K. R., Lee, H. & Choi, H., 2010, Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Proceedings. p. 629-637 9 p. (Communications in Computer and Information Science; vol. 78 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization

    Lee, H., Kim, J., Hong, S. J. & Lee, S., 2000, Proceedings of the 2000 ACM Symposium on Applied Computing, SAC 2000. p. 641-648 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)