• 3141 Citations
  • 23 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2011

OMAP: One-way memory attestation protocol for smart meters

Song, K., Seo, D., Park, H., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 111-118 8 p. 5951959. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

PFS: Probabilistic filter scheduling against distributed denial-of-service attacks

Seo, D., Lee, H. & Perrig, A., 2011, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, LCN 2011. p. 9-17 9 p. 6114645. (Proceedings - Conference on Local Computer Networks, LCN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Secure and efficient capability-based power management in the smart grid

Seo, D., Lee, H. & Perrig, A., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011. p. 119-126 8 p. 5951960. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011 - ICASE 2011, SGH 2011, GSDP 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)
2010

Abnormal policy detection and correction using overlapping transition

Kim, S. & Lee, H., 2010, In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1053-1061 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Achieving network level privacy in wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2010 Mar, In : Sensors. 10, 3, p. 1447-1472 26 p.

Research output: Contribution to journalArticle

35 Citations (Scopus)

Activity-oriented access control to ubiquitous hospital information and services

Le, X. H., Lee, S., Lee, Y. K., Lee, H., Khalid, M. & Sankar, R., 2010 Aug 15, In : Information Sciences. 180, 16, p. 2979-2990 12 p.

Research output: Contribution to journalArticle

32 Citations (Scopus)

BARI+: A biometric based distributed key management approach for wireless body area networks

Muhammad, K. U. R. R. S., Lee, H., Lee, S. & Lee, Y. K., 2010 Apr, In : Sensors. 10, 4, p. 3911-3933 23 p.

Research output: Contribution to journalArticle

34 Citations (Scopus)

Classifying rules by in-out traffic direction to avoid security policy anomaly

Kim, S. & Lee, H., 2010 Aug 27, In : KSII Transactions on Internet and Information Systems. 4, 4, p. 671-690 20 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Detecting metamorphic malwares using code graphs

Lee, J., Jeong, K. & Lee, H., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1970-1977 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

66 Citations (Scopus)

Enhancing resiliency of networks: Evolving strategy vs. multihoming

Lee, W. Y., Kim, S., Lee, H. & Kim, H., 2010, In : IEICE Transactions on Communications. E93-B, 1, p. 174-177 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Generic unpacking using entropy analysis

Jeong, G., Choo, E., Lee, J., Bat-Erdene, M. & Lee, H., 2010, Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. p. 98-105 8 p. 5665789. (Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks

Syed, M. K. U. R. R., Lee, H., Lee, S. & Lee, Y. K., 2010 Feb, In : Annales des Telecommunications/Annals of Telecommunications. 65, 1-2, p. 101-116 16 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

Privacy and trust management schemes of wireless sensor networks: A survey

Shaikh, R. A., d'Auriol, B. J., Lee, H. & Lee, S., 2010, Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice. IGI Global, p. 290-309 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

State of the art of network security perspectives in cloud computing

Oh, T. H., Lim, S., Choi, Y. B., Park, K. R., Lee, H. & Choi, H., 2010, Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Proceedings. p. 629-637 9 p. (Communications in Computer and Information Science; vol. 78 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Tracking multiple C&C botnets by analyzing DNS traffic

Lee, J., Kwon, J., Shin, H. J. & Lee, H., 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 67-72 6 p. 5634445. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)
2009

Activity-oriented access control for ubiquitous environments

Hung, L. X., Shaikh, R. A., Jameel, H., Raazi, S. M. K. R., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784990. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography

Le, X. H., Lee, S., Butun, I., Khalid, M., Sankar, R., Kim, M., Han, M., Lee, Y. K. & Lee, H., 2009 Dec, In : Journal of Communications and Networks. 11, 6, p. 599-606 8 p.

Research output: Contribution to journalArticle

38 Citations (Scopus)

BARI: A distributed key management approach for wireless body area networks

Raazi, S. M. K. U. R., Lee, S., Lee, Y. K. & Lee, H., 2009, CIS 2009 - 2009 International Conference on Computational Intelligence and Security. p. 324-329 6 p. 5376103. (CIS 2009 - 2009 International Conference on Computational Intelligence and Security; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

BotGAD: Detecting botnets by capturing group activities in network traffic

Choi, H., Lee, H. & Kim, H., 2009, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09. 1621893. (Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Citations (Scopus)

Dynamic multimedia scheduling against Motion based DoS attacks

Choo, E., Lee, H. & Lee, W. Y., 2009, 2009 International Conference on Information Networking, ICOIN 2009. 4897288. (2009 International Conference on Information Networking, ICOIN 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores

Lee, W. Y., Ko, Y. W., Lee, H. & Kim, H., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 273-277 5 p. (ACM International Conference Proceeding Series; vol. 321).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Fast detection and visualization of network attacks on parallel coordinates

Choi, H., Lee, H. & Kim, H., 2009 Jul, In : Computers and Security. 28, 5, p. 276-288 13 p.

Research output: Contribution to journalArticle

59 Citations (Scopus)

Flow traffic classification with support vector machine by using payload length

Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Group-based trust management scheme for clustered wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2009, In : IEEE Transactions on Parallel and Distributed Systems. 20, 11, p. 1698-1712 15 p.

Research output: Contribution to journalArticle

246 Citations (Scopus)

Image-feature based human identification protocols on limited display devices

Jameel, H., Shaikh, R. A., Hung, L. X., Wei, Y. W., Raazi, S. M. K. U. R., Canh, N. T., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 211-224 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B. J., Lee, H., Lee, S. & Song, Y. J., 2009 Jun, In : Sensors. 9, 8, p. 5989-6007 19 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Is early warning of an imminent worm epidemic possible?

Park, H., Kim, H. & Lee, H., 2009, In : IEEE Network. 23, 5, p. 14-20 7 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
3 Citations (Scopus)
3 Citations (Scopus)

Reducing payload inspection cost using rule classification for fast attack signature matching

Kim, S. & Lee, H., 2009, In : IEICE Transactions on Information and Systems. E92-D, 10, p. 1971-1978 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

SCODE: A secure coordination-based data dissemination tomobile sinks in sensor networks

Hung, L., Lee, S., Lee, Y. K. & Lee, H., 2009, In : IEICE Transactions on Communications. E92-B, 1, p. 131-142 12 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Secure wireless networking

Perrig, A., Trappe, W., Gligor, V., Poovendran, R. & Lee, H., 2009 Dec, In : Journal of Communications and Networks. 11, 6, p. 533-537 5 p.

Research output: Contribution to journalEditorial

2008

A connection management protocol for stateful inspection firewalls in multi-homed networks

Kim, J. H., Lee, H. & Bahk, S., 2008 Dec, In : Journal of Communications and Networks. 10, 4, p. 455-464 10 p.

Research output: Contribution to journalArticle

Activity-based security scheme for ubiquitous environments

Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y., Fernandes, M., Kim, M. & Zhung, Y., 2008, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008. p. 475-481 7 p. 4745102. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge

Hung, L. X., Canh, N. T., Lee, S., Lee, Y. K. & Lee, H., 2008 Dec, In : Sensors. 8, 12, p. 7753-7782 30 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Code graph for malware detection

Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Detecting more SIP attacks on VoIP services by combining rule matching and state transition models

Seo, D., Lee, H. & Nuwere, E., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 397-411 15 p. (IFIP International Federation for Information Processing; vol. 278).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Distinguishing between FE and DDoS using randomness check

Park, H., Li, P., Gao, D., Lee, H. & Deng, R. H., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Citations (Scopus)

Energy-efficient and fault-tolerant positioning of multiple base stations

Kim, S., Ko, J., Yoon, J. & Lee, H., 2008, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. p. 584-593 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

HoneyID: Unveiling hidden spywares by generating bogus events

Han, J., Kwon, J. & Lee, H., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 669-673 5 p. (IFIP International Federation for Information Processing; vol. 278).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Network level privacy for wireless sensor networks

Shaikh, R. A., Jameel, H., d'Auriol, B., Lee, S., Lee, H. & Song, Y. J., 2008, Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008. IEEE Computer Society, p. 261-266 6 p. 4627096. (Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

PROBE: A process behavior-based host intrusion prevention system

Kwon, M., Jeong, K. & Lee, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 203-217 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Reducing payload scans for attack signature matching using rule classification

Kim, S. & Lee, H., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. p. 350-360 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

Shaikh, R. A., Jameel, H., D'Auriol, B. J., Lee, S., Song, Y. J. & Lee, H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2038-2043 6 p. 4709287. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Unified rate limiting in broadband access networks for defeating Internet worms and DDoS attacks

Park, K., Seo, D., Yoo, J., Lee, H. & Kim, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 176-187 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007
20 Citations (Scopus)

Activity-based access control model to hospital information

Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

A location-aware key predistribution scheme for distributed wireless sensor networks

Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A password stretching method using user specific salts

Lee, C. & Lee, H., 2007, 16th International World Wide Web Conference, WWW2007. p. 1215-1216 2 p. (16th International World Wide Web Conference, WWW2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution