• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1995 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2000

    Task scheduling using a block dependency DAG for block-oriented sparse Cholesky factorization

    Lee, H., Kim, J., Hong, S. J. & Lee, S., 2000, Proceedings of the 2000 ACM Symposium on Applied Computing, SAC 2000. p. 641-648 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2005

    PCAV: Internet attack visualization on parallel coordinates

    Choi, H. & Lee, H., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 454-466 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • 2006

    A simple congestion-resilient link adaptation algorithm for IEEE 802.11 WLANs

    Kim, H., Yun, S., Lee, H., Kang, I. & Choi, K. Y., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151441. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Cascade damage estimation model for internet attacks

    Lee, T., In, H. P., Im, E. G. & Lee, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. Springer Verlag, p. 163-164 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Detecting unknown worms using randomness check

    Park, H. & Lee, H., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 775-784 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Filtering out unfair recommendations for trust model in ubiquitous environments

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Bagchi, A. & Atluri, V. (eds.). Springer Verlag, p. 357-360 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Improving resiliency of network topology with enhanced evolving strategies

    Kim, S., Lee, H. & Lee, W. Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 149 1 p. 4019940. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Improving VoIP call capacity of multi-hop wireless networks through self-controlled frame aggregation

    Yun, S., Kim, H., Lee, H. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2181-2185 5 p. 4109716. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • One touch logon: Replacing multiple passwords with single fingerprint recognition

    Park, B., Hong, S., Oh, J., Lee, H. & Won, Y., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. IEEE Computer Society, p. 163 1 p. 4019947. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the cross-layer impact of TCP ACK thinning on IEEE 802.11 wireless MAC dynamics

    Kim, H., Lee, H., Shin, S. & Kang, I., 2006, 2006 IEEE 64th Vehicular Technology Conference, VTC-2006 Fall. p. 2241-2246 6 p. 4109728. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2007

    Activity-based access control model to hospital information

    Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 488-493 6 p. 4296888. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • A flexible trust-based access control mechanism for security and privacy enhancement in ubiquitous systems

    Giang, P. D., Hung, L. X., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 698-703 6 p. 4197354. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A location-aware key predistribution scheme for distributed wireless sensor networks

    Canh, N. T., Van Phuong, T., Lee, Y. K., Lee, S. & Lee, H., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. p. 188-193 6 p. 4444084. (ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A password stretching method using user specific salts

    Lee, C. & Lee, H., 2007, 16th International World Wide Web Conference, WWW2007. p. 1215-1216 2 p. (16th International World Wide Web Conference, WWW2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A privacy preserving access control scheme using anonymous identification for ubiquitous environments

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H. J., 2007, Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007. p. 482-487 6 p. 4296887. (Proceedings - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • A trust-based approach to control privacy exposure in Ubiquitous Computing environments

    Giang, P. D., Hung, L. X., Shaikh, R. A., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, 2007 IEEE International Conference on Pervasive Services, ICPS. p. 149-152 4 p. 4283905. (2007 IEEE International Conference on Pervasive Services, ICPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • BASE: An incrementally deployable mechanism for viable IP spoofing prevention

    Lee, H., Kwon, M., Hasker, G. & Perrig, A., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. p. 20-31 12 p. (Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • Bayesian memory-based reputation system

    Yuan, W., Guan, D., Lee, S., Lee, Y. K. & Lee, H., 2007 Aug 27, MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications. Association for Computing Machinery, Inc, 1385300. (MobiMedia 2007 - Proceedings of the 3rd International Conference on Mobile Multimedia Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Botnet detection by monitoring group activities in DNS traffic

    Choi, H., Lee, H., Lee, H. & Kim, H., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 715-720 6 p. 4385169. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    183 Citations (Scopus)
  • Contextual risk-based access control

    Diep, N. N., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings of The 2007 International Conference on Security and Management, SAM'07. p. 406-412 7 p. (Proceedings of The 2007 International Conference on Security and Management, SAM'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Cyber threat trend analysis model using HMM

    Kim, D. H., Lee, T., Jung, S. O. D., In, H. P. & Lee, H. J., 2007, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security. p. 177-182 6 p. 4299771. (Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • Energy-aware QoS adjustment of multimedia tasks with uncertain execution time

    Lee, W. Y., Lee, H. & Kim, H., 2007, Computational Science - ICCS 2007 - 7th International Conference, Proceedings. PART 4 ed. Springer Verlag, p. 709-712 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4490 LNCS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Enforcing access control using risk assessment

    Diep, N. N., Hung, L. X., Zhung, Y., Lee, S., Lee, Y. K. & Lee, H., 2007, Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks. p. 419-424 6 p. 4115226. (Proceedings - ECUMN 2007: Fourth European Conference on Universal Multiservice Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Citations (Scopus)
  • Human identification through image evaluation using secret predicates

    Jameel, H., Shaikh, R. A., Lee, H. & Lee, S., 2007, Topics in Cryptology: CT-RSA 2007 - The Cryptographers Track at the RSA Conference 2007, Proceedings. Abe, M. (ed.). Springer Verlag, p. 67-84 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4377 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Multiple-objective metric for placing multiple base stations in wireless sensor networks

    Kim, S., Ko, J. G., Yoon, J. & Lee, H., 2007, 2007 2nd International Symposium on Wireless Pervasive Computing. p. 627-631 5 p. 4147138. (2007 2nd International Symposium on Wireless Pervasive Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • SRMT: A lightweight encryption scheme for secure real-time multimedia transmission

    Choo, E., Lee, J., Lee, H. & Nam, G., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. IEEE Computer Society, p. 60-65 6 p. 4197250. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • Transmission time-based mechanism to detect wormhole attacks

    Van Phuong, T., Canh, N. T., Lee, Y. K., Lee, S. & Lee, H., 2007, Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007. p. 172-178 7 p. 4414457. (Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks

    Van Tran, P., Hung, L. X., Lee, Y. K., Lee, S. & Lee, H., 2007, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. p. 593-598 6 p. 4199210. (2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Citations (Scopus)
  • Using reputation system in ubiquitous healthcare

    Weiwei, Y., Donghai, G., Sungyoung, L. & Heejo, L., 2007, HEALTHCOM 2007: Ubiquitous Health in Aging Societies - 2007 9th International Conference on e-Health Networking, Application and Services. p. 182-186 5 p. 4265820. (HEALTHCOM 2007: Ubiquitous Health in Aging Societies - 2007 9th International Conference on e-Health Networking, Application and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • 2008

    Activity-based security scheme for ubiquitous environments

    Hung, L. X., Hassan, J., Riaz, A. S., Raazi, S. M. K., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y., Fernandes, M., Kim, M. & Zhung, Y., 2008, 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008. p. 475-481 7 p. 4745102. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Code graph for malware detection

    Kyoochang, J. & Heejo, L., 2008, 2008 International Conference on Information Networking, ICOIN. 4472801. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Detecting more SIP attacks on VoIP services by combining rule matching and state transition models

    Seo, D., Lee, H. & Nuwere, E., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 397-411 15 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Distinguishing between FE and DDoS using randomness check

    Park, H., Li, P., Gao, D., Lee, H. & Deng, R. H., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 131-145 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Energy-efficient and fault-tolerant positioning of multiple base stations

    Kim, S., Ko, J., Yoon, J. & Lee, H., 2008, Information Networking: Towards Ubiquitous Networking and Services - International Conference, ICOIN 2007, Revised Selected Papers. Springer Verlag, p. 584-593 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5200 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • HoneyID: Unveiling hidden spywares by generating bogus events

    Han, J., Kwon, J. & Lee, H., 2008, Proceedings of The Ifip Tc 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08. Springer New York, p. 669-673 5 p. (IFIP International Federation for Information Processing; vol. 278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Network level privacy for wireless sensor networks

    Shaikh, R. A., Jameel, H., d'Auriol, B., Lee, S., Lee, H. & Song, Y. J., 2008, Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008. IEEE Computer Society, p. 261-266 6 p. 4627096. (Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • PROBE: A process behavior-based host intrusion prevention system

    Kwon, M., Jeong, K. & Lee, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 203-217 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Reducing payload scans for attack signature matching using rule classification

    Kim, S. & Lee, H., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. Springer Verlag, p. 350-360 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

    Shaikh, R. A., Jameel, H., D'Auriol, B. J., Lee, S., Song, Y. J. & Lee, H., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 2038-2043 6 p. 4709287. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Unified rate limiting in broadband access networks for defeating Internet worms and DDoS attacks

    Park, K., Seo, D., Yoo, J., Lee, H. & Kim, H., 2008, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings. p. 176-187 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    Activity-oriented access control for ubiquitous environments

    Hung, L. X., Shaikh, R. A., Jameel, H., Raazi, S. M. K. R., Weiwei, Y., Canh, N. T., Truc, P. T. H., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784990. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • BARI: A distributed key management approach for wireless body area networks

    Raazi, S. M. K. U. R., Lee, S., Lee, Y. K. & Lee, H., 2009, CIS 2009 - 2009 International Conference on Computational Intelligence and Security. p. 324-329 6 p. 5376103. (CIS 2009 - 2009 International Conference on Computational Intelligence and Security; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • BotGAD: Detecting botnets by capturing group activities in network traffic

    Choi, H., Lee, H. & Kim, H., 2009, Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09. 1621893. (Proceedings of the 4th International ICST Conference on Communication System Software and Middleware, COMSWARE '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    76 Citations (Scopus)
  • Dynamic multimedia scheduling against Motion based DoS attacks

    Choo, E., Lee, H. & Lee, W. Y., 2009, 2009 International Conference on Information Networking, ICOIN 2009. 4897288. (2009 International Conference on Information Networking, ICOIN 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores

    Lee, W. Y., Ko, Y. W., Lee, H. & Kim, H., 2009, ICHIT 2009 - International Conference on Convergence and Hybrid Information Technology 2009. p. 273-277 5 p. (ACM International Conference Proceeding Series; vol. 321).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Flow traffic classification with support vector machine by using payload length

    Kohara, M., Hori, Y., Sakurai, K., Lee, H. & Ryou, J. C., 2009, Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 5404180. (Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Image-feature based human identification protocols on limited display devices

    Jameel, H., Shaikh, R. A., Hung, L. X., Wei, Y. W., Raazi, S. M. K. U. R., Canh, N. T., Lee, S., Lee, H., Son, Y. & Fernandes, M., 2009, Information Security Applications - 9th International Workshop, WISA 2008, Revised Selected Papers. p. 211-224 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5379 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2010

    Detecting metamorphic malwares using code graphs

    Lee, J., Jeong, K. & Lee, H., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1970-1977 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    71 Citations (Scopus)
  • Generic unpacking using entropy analysis

    Jeong, G., Choo, E., Lee, J., Bat-Erdene, M. & Lee, H., 2010, Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. p. 98-105 8 p. 5665789. (Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Citations (Scopus)
  • State of the art of network security perspectives in cloud computing

    Oh, T. H., Lim, S., Choi, Y. B., Park, K. R., Lee, H. & Choi, H., 2010, Security-Enriched Urban Computing and Smart Grid - First International Conference, SUComS 2010, Proceedings. p. 629-637 9 p. (Communications in Computer and Information Science; vol. 78 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)